CN103106432A - Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark - Google Patents

Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106432A
CN103106432A CN2013100223630A CN201310022363A CN103106432A CN 103106432 A CN103106432 A CN 103106432A CN 2013100223630 A CN2013100223630 A CN 2013100223630A CN 201310022363 A CN201310022363 A CN 201310022363A CN 103106432 A CN103106432 A CN 103106432A
Authority
CN
China
Prior art keywords
binary system
binary
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100223630A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100223630A priority Critical patent/CN103106432A/en
Publication of CN103106432A publication Critical patent/CN103106432A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

Disclosed is a multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark. The multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark can enable binary system anti-fake information to be generated into a binary system modulating signal through unitary encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multi-parameter variable gradient unitary circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multi-parameter variable gradient unitary circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100223630100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100223630100002DEST_PATH_IMAGE002
Figure 2013100223630100002DEST_PATH_IMAGE003
Figure 2013100223630100002DEST_PATH_IMAGE004
Figure 2013100223630100002DEST_PATH_IMAGE006
Figure 2013100223630100002DEST_PATH_IMAGE008
With
Figure 2013100223630100002DEST_PATH_IMAGE009
, encryption parameter
Figure 878369DEST_PATH_IMAGE002
Figure 326667DEST_PATH_IMAGE003
Figure 637563DEST_PATH_IMAGE004
Figure 263082DEST_PATH_IMAGE007
Figure 61274DEST_PATH_IMAGE008
With
Figure 791333DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223630100002DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE011
Figure 2013100223630100002DEST_PATH_IMAGE012
Figure 2013100223630100002DEST_PATH_IMAGE013
Figure 2013100223630100002DEST_PATH_IMAGE014
Figure 2013100223630100002DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 234001DEST_PATH_IMAGE011
Figure 519489DEST_PATH_IMAGE012
Figure 787659DEST_PATH_IMAGE013
Figure 842203DEST_PATH_IMAGE014
Figure 575990DEST_PATH_IMAGE016
Figure 382272DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 556901DEST_PATH_IMAGE010
Figure 423226DEST_PATH_IMAGE011
Figure 293279DEST_PATH_IMAGE013
Figure 322415DEST_PATH_IMAGE014
Figure 625220DEST_PATH_IMAGE015
Figure 107017DEST_PATH_IMAGE016
Figure 520681DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 404323DEST_PATH_IMAGE010
Figure 878030DEST_PATH_IMAGE011
Figure 847123DEST_PATH_IMAGE012
Figure 978393DEST_PATH_IMAGE015
Figure 434782DEST_PATH_IMAGE016
Figure 190248DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 782904DEST_PATH_IMAGE010
Figure 598413DEST_PATH_IMAGE011
Figure 542098DEST_PATH_IMAGE012
Figure 101256DEST_PATH_IMAGE013
Figure 813997DEST_PATH_IMAGE014
Figure 534828DEST_PATH_IMAGE015
Figure 965809DEST_PATH_IMAGE016
Figure 63078DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 787638DEST_PATH_IMAGE011
Figure 705915DEST_PATH_IMAGE012
Figure 606875DEST_PATH_IMAGE013
Figure 28629DEST_PATH_IMAGE014
Figure 368561DEST_PATH_IMAGE015
Figure 508555DEST_PATH_IMAGE016
Figure 213206DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 755046DEST_PATH_IMAGE010
Figure 254161DEST_PATH_IMAGE011
Figure 881451DEST_PATH_IMAGE012
Figure 124213DEST_PATH_IMAGE013
Figure 520560DEST_PATH_IMAGE014
Figure 190575DEST_PATH_IMAGE015
Figure 305162DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 602468DEST_PATH_IMAGE010
Figure 443385DEST_PATH_IMAGE011
Figure 45268DEST_PATH_IMAGE012
Figure 629833DEST_PATH_IMAGE013
Figure 771DEST_PATH_IMAGE014
Figure 12590DEST_PATH_IMAGE015
Figure 224445DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 449890DEST_PATH_IMAGE010
Figure 632610DEST_PATH_IMAGE011
Figure 135453DEST_PATH_IMAGE013
Figure 215404DEST_PATH_IMAGE014
Figure 834604DEST_PATH_IMAGE015
Figure 632796DEST_PATH_IMAGE016
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 828471DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE019
Figure 149731DEST_PATH_IMAGE011
Figure 2013100223630100002DEST_PATH_IMAGE020
Figure 966377DEST_PATH_IMAGE012
Figure 2013100223630100002DEST_PATH_IMAGE021
Figure 765706DEST_PATH_IMAGE013
Figure 2013100223630100002DEST_PATH_IMAGE022
Figure 351408DEST_PATH_IMAGE014
Figure 2013100223630100002DEST_PATH_IMAGE023
Figure 843569DEST_PATH_IMAGE015
Figure 2013100223630100002DEST_PATH_IMAGE024
Figure 881932DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE025
Figure 484952DEST_PATH_IMAGE017
Figure 2013100223630100002DEST_PATH_IMAGE026
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 721898DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE030
Figure 910620DEST_PATH_IMAGE012
Figure 520593DEST_PATH_IMAGE031
Figure 549729DEST_PATH_IMAGE013
Figure 2013100223630100002DEST_PATH_IMAGE032
Figure 118113DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE033
Figure 927806DEST_PATH_IMAGE015
Figure 872629DEST_PATH_IMAGE016
Figure 287430DEST_PATH_IMAGE017
Figure 2013100223630100002DEST_PATH_IMAGE036
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100223630100002DEST_PATH_IMAGE037
Figure 823453DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE038
Figure 335423DEST_PATH_IMAGE011
Figure 2013100223630100002DEST_PATH_IMAGE041
Figure 353244DEST_PATH_IMAGE013
Figure 2013100223630100002DEST_PATH_IMAGE042
Figure 263431DEST_PATH_IMAGE014
Figure 2013100223630100002DEST_PATH_IMAGE043
Figure 2013100223630100002DEST_PATH_IMAGE044
Figure 537603DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE045
Figure 926996DEST_PATH_IMAGE017
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 2013100223630100002DEST_PATH_IMAGE047
Figure 804823DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE048
Figure 279666DEST_PATH_IMAGE011
Figure 2013100223630100002DEST_PATH_IMAGE049
Figure 104403DEST_PATH_IMAGE012
Figure 2013100223630100002DEST_PATH_IMAGE051
Figure 348302DEST_PATH_IMAGE013
Figure 2013100223630100002DEST_PATH_IMAGE052
Figure 865871DEST_PATH_IMAGE014
Figure 2013100223630100002DEST_PATH_IMAGE053
Figure 828011DEST_PATH_IMAGE015
Figure 456439DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE055
Figure 554845DEST_PATH_IMAGE017
Figure 2013100223630100002DEST_PATH_IMAGE056
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 2013100223630100002DEST_PATH_IMAGE057
Figure 774473DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE058
Figure 2013100223630100002DEST_PATH_IMAGE059
Figure 390448DEST_PATH_IMAGE012
Figure 2013100223630100002DEST_PATH_IMAGE060
Figure 608940DEST_PATH_IMAGE013
Figure 186421DEST_PATH_IMAGE014
Figure 2013100223630100002DEST_PATH_IMAGE063
Figure 857574DEST_PATH_IMAGE015
Figure 2013100223630100002DEST_PATH_IMAGE064
Figure 93383DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE065
Figure 166381DEST_PATH_IMAGE017
Figure 2013100223630100002DEST_PATH_IMAGE066
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 727812DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE068
Figure 886261DEST_PATH_IMAGE011
Figure 2013100223630100002DEST_PATH_IMAGE069
Figure 394603DEST_PATH_IMAGE012
Figure 2013100223630100002DEST_PATH_IMAGE070
Figure 587687DEST_PATH_IMAGE013
Figure 2013100223630100002DEST_PATH_IMAGE071
Figure 800580DEST_PATH_IMAGE014
Figure 2013100223630100002DEST_PATH_IMAGE073
Figure 446325DEST_PATH_IMAGE015
Figure 2013100223630100002DEST_PATH_IMAGE074
Figure 758358DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE075
Figure 805948DEST_PATH_IMAGE017
Figure 2013100223630100002DEST_PATH_IMAGE076
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 709182DEST_PATH_IMAGE010
Figure 2013100223630100002DEST_PATH_IMAGE078
Figure 957947DEST_PATH_IMAGE012
Figure 2013100223630100002DEST_PATH_IMAGE080
Figure 2013100223630100002DEST_PATH_IMAGE081
Figure 403020DEST_PATH_IMAGE014
Figure 757778DEST_PATH_IMAGE015
Figure 677193DEST_PATH_IMAGE016
Figure 2013100223630100002DEST_PATH_IMAGE085
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 678833DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE088
Figure 786466DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE089
Figure 680210DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE091
Figure 441679DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE092
Figure DEST_PATH_IMAGE093
Figure 235508DEST_PATH_IMAGE016
Figure 966704DEST_PATH_IMAGE017
Figure DEST_PATH_IMAGE096
, set encryption parameter
Figure 776714DEST_PATH_IMAGE003
Figure 310464DEST_PATH_IMAGE004
Figure 365007DEST_PATH_IMAGE005
Figure 833215DEST_PATH_IMAGE007
Figure 905076DEST_PATH_IMAGE008
With
Figure 814126DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 946030DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure DEST_PATH_IMAGE097
Carry out H1=
Figure 483408DEST_PATH_IMAGE010
Figure 358960DEST_PATH_IMAGE019
Figure 388096DEST_PATH_IMAGE011
Figure 425322DEST_PATH_IMAGE020
Figure 172699DEST_PATH_IMAGE012
Figure 1163DEST_PATH_IMAGE013
Figure 678132DEST_PATH_IMAGE022
Figure 864580DEST_PATH_IMAGE023
Figure 602729DEST_PATH_IMAGE015
Figure 247337DEST_PATH_IMAGE024
Figure 459192DEST_PATH_IMAGE025
Figure 317427DEST_PATH_IMAGE017
Figure 601778DEST_PATH_IMAGE026
Unitary circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 279884DEST_PATH_IMAGE097
Carry out H1=
Figure 839041DEST_PATH_IMAGE098
Figure 551782DEST_PATH_IMAGE010
Figure 538193DEST_PATH_IMAGE019
Figure 969174DEST_PATH_IMAGE011
Figure 66443DEST_PATH_IMAGE020
Figure 633691DEST_PATH_IMAGE012
Figure 791002DEST_PATH_IMAGE021
Figure 813502DEST_PATH_IMAGE022
Figure 829049DEST_PATH_IMAGE023
Figure 408114DEST_PATH_IMAGE024
Figure 790347DEST_PATH_IMAGE025
Figure 417637DEST_PATH_IMAGE017
Figure 660400DEST_PATH_IMAGE026
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H2=
Figure 322325DEST_PATH_IMAGE027
Figure 992341DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE100
Figure 841348DEST_PATH_IMAGE011
Figure 887802DEST_PATH_IMAGE030
Figure 415952DEST_PATH_IMAGE012
Figure 256869DEST_PATH_IMAGE031
Figure 593173DEST_PATH_IMAGE013
Figure 177738DEST_PATH_IMAGE032
Figure 548676DEST_PATH_IMAGE014
Figure 560495DEST_PATH_IMAGE033
Figure 732216DEST_PATH_IMAGE016
Figure 914936DEST_PATH_IMAGE035
Figure 225831DEST_PATH_IMAGE017
Figure 152199DEST_PATH_IMAGE036
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE101
Carry out H2=
Figure 28888DEST_PATH_IMAGE027
Figure 649542DEST_PATH_IMAGE100
Figure 379601DEST_PATH_IMAGE011
Figure 579638DEST_PATH_IMAGE030
Figure 104160DEST_PATH_IMAGE012
Figure 389648DEST_PATH_IMAGE031
Figure 923398DEST_PATH_IMAGE013
Figure 977941DEST_PATH_IMAGE032
Figure 673365DEST_PATH_IMAGE014
Figure 446149DEST_PATH_IMAGE033
Figure 986852DEST_PATH_IMAGE015
Figure 895902DEST_PATH_IMAGE034
Figure 429017DEST_PATH_IMAGE017
Figure 661416DEST_PATH_IMAGE036
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H3=
Figure 964221DEST_PATH_IMAGE037
Figure 446018DEST_PATH_IMAGE010
Figure 453157DEST_PATH_IMAGE038
Figure DEST_PATH_IMAGE103
Figure 341664DEST_PATH_IMAGE012
Figure 91183DEST_PATH_IMAGE041
Figure 308538DEST_PATH_IMAGE013
Figure 46687DEST_PATH_IMAGE042
Figure 691295DEST_PATH_IMAGE014
Figure 886019DEST_PATH_IMAGE044
Figure 435949DEST_PATH_IMAGE016
Figure 379634DEST_PATH_IMAGE045
Figure 938792DEST_PATH_IMAGE017
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 637943DEST_PATH_IMAGE001
Carry out unitary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, unitary circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 803345DEST_PATH_IMAGE002
Figure 900614DEST_PATH_IMAGE003
Figure 202283DEST_PATH_IMAGE004
Figure 359594DEST_PATH_IMAGE005
Figure 24011DEST_PATH_IMAGE006
Figure 924971DEST_PATH_IMAGE007
Figure 612305DEST_PATH_IMAGE008
With
Figure 940518DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by unitary circulation ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 519584DEST_PATH_IMAGE010
Figure 61423DEST_PATH_IMAGE019
Figure 560538DEST_PATH_IMAGE011
Figure 899432DEST_PATH_IMAGE012
Figure 295779DEST_PATH_IMAGE021
Figure 965794DEST_PATH_IMAGE013
Figure 80381DEST_PATH_IMAGE022
Figure 126834DEST_PATH_IMAGE014
Figure 377687DEST_PATH_IMAGE023
Figure 218604DEST_PATH_IMAGE015
Figure 289328DEST_PATH_IMAGE024
Figure 244832DEST_PATH_IMAGE025
Figure 256650DEST_PATH_IMAGE017
Figure 345829DEST_PATH_IMAGE026
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 468506DEST_PATH_IMAGE027
Figure 693951DEST_PATH_IMAGE010
Figure 142250DEST_PATH_IMAGE029
Figure 921987DEST_PATH_IMAGE011
Figure 848355DEST_PATH_IMAGE030
Figure 193885DEST_PATH_IMAGE012
Figure 547506DEST_PATH_IMAGE031
Figure 345698DEST_PATH_IMAGE013
Figure 75757DEST_PATH_IMAGE032
Figure 275794DEST_PATH_IMAGE014
Figure 800316DEST_PATH_IMAGE033
Figure 85804DEST_PATH_IMAGE015
Figure 533152DEST_PATH_IMAGE016
Figure 494154DEST_PATH_IMAGE035
Figure 266938DEST_PATH_IMAGE017
Figure 73220DEST_PATH_IMAGE036
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 247850DEST_PATH_IMAGE037
Figure 114174DEST_PATH_IMAGE010
Figure 374255DEST_PATH_IMAGE038
Figure 984227DEST_PATH_IMAGE011
Figure 482205DEST_PATH_IMAGE040
Figure 785010DEST_PATH_IMAGE012
Figure 266807DEST_PATH_IMAGE041
Figure 680471DEST_PATH_IMAGE013
Figure 564113DEST_PATH_IMAGE042
Figure 37820DEST_PATH_IMAGE014
Figure 6913DEST_PATH_IMAGE043
Figure 958688DEST_PATH_IMAGE015
Figure 431258DEST_PATH_IMAGE044
Figure 75866DEST_PATH_IMAGE016
Figure 532255DEST_PATH_IMAGE045
Figure 287722DEST_PATH_IMAGE017
Figure 880377DEST_PATH_IMAGE046
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 695886DEST_PATH_IMAGE047
Figure 198729DEST_PATH_IMAGE048
Figure 380311DEST_PATH_IMAGE011
Figure 101143DEST_PATH_IMAGE049
Figure 532124DEST_PATH_IMAGE012
Figure 629393DEST_PATH_IMAGE051
Figure 462220DEST_PATH_IMAGE013
Figure 353953DEST_PATH_IMAGE052
Figure 173190DEST_PATH_IMAGE053
Figure 606663DEST_PATH_IMAGE015
Figure 934876DEST_PATH_IMAGE054
Figure 248363DEST_PATH_IMAGE055
Figure 790202DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 447766DEST_PATH_IMAGE057
Figure 690528DEST_PATH_IMAGE010
Figure 555716DEST_PATH_IMAGE058
Figure 225732DEST_PATH_IMAGE011
Figure 340318DEST_PATH_IMAGE059
Figure 637624DEST_PATH_IMAGE060
Figure 478541DEST_PATH_IMAGE013
Figure 80424DEST_PATH_IMAGE062
Figure 664989DEST_PATH_IMAGE014
Figure 35928DEST_PATH_IMAGE063
Figure 47746DEST_PATH_IMAGE015
Figure 728443DEST_PATH_IMAGE016
Figure 667766DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 250560DEST_PATH_IMAGE010
Figure 667952DEST_PATH_IMAGE011
Figure 398011DEST_PATH_IMAGE069
Figure 801310DEST_PATH_IMAGE012
Figure 591412DEST_PATH_IMAGE070
Figure 876900DEST_PATH_IMAGE013
Figure 145070DEST_PATH_IMAGE071
Figure 199614DEST_PATH_IMAGE014
Figure 222933DEST_PATH_IMAGE073
Figure 801999DEST_PATH_IMAGE074
Figure 570104DEST_PATH_IMAGE016
Figure 436429DEST_PATH_IMAGE075
Figure 696509DEST_PATH_IMAGE017
Figure 306482DEST_PATH_IMAGE076
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 335617DEST_PATH_IMAGE077
Figure 372844DEST_PATH_IMAGE010
Figure 120220DEST_PATH_IMAGE078
Figure 533884DEST_PATH_IMAGE011
Figure 417526DEST_PATH_IMAGE079
Figure 360074DEST_PATH_IMAGE012
Figure 329167DEST_PATH_IMAGE080
Figure 280943DEST_PATH_IMAGE013
Figure 284671DEST_PATH_IMAGE081
Figure 663700DEST_PATH_IMAGE014
Figure 120089DEST_PATH_IMAGE082
Figure 875555DEST_PATH_IMAGE015
Figure 733790DEST_PATH_IMAGE084
Figure 18140DEST_PATH_IMAGE016
Figure 961826DEST_PATH_IMAGE085
Figure 255404DEST_PATH_IMAGE017
Figure 968145DEST_PATH_IMAGE086
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 954555DEST_PATH_IMAGE087
Figure 385537DEST_PATH_IMAGE010
Figure 50053DEST_PATH_IMAGE011
Figure 207365DEST_PATH_IMAGE089
Figure 594484DEST_PATH_IMAGE012
Figure 229865DEST_PATH_IMAGE090
Figure 741417DEST_PATH_IMAGE013
Figure 69630DEST_PATH_IMAGE091
Figure 209624DEST_PATH_IMAGE014
Figure 914275DEST_PATH_IMAGE092
Figure 456115DEST_PATH_IMAGE015
Figure 955229DEST_PATH_IMAGE093
Figure 582520DEST_PATH_IMAGE016
Figure 559703DEST_PATH_IMAGE095
Figure 690470DEST_PATH_IMAGE017
Figure 891644DEST_PATH_IMAGE096
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 6231DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 303537DEST_PATH_IMAGE097
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 144454DEST_PATH_IMAGE001
Carry out unitary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 215178DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the Multi-parameter variable gradient unitary being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100223630100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100223630100001DEST_PATH_IMAGE002
Figure 2013100223630100001DEST_PATH_IMAGE003
Figure 2013100223630100001DEST_PATH_IMAGE004
Figure 2013100223630100001DEST_PATH_IMAGE005
Figure 2013100223630100001DEST_PATH_IMAGE006
Figure 2013100223630100001DEST_PATH_IMAGE007
Figure 2013100223630100001DEST_PATH_IMAGE008
With
Figure 2013100223630100001DEST_PATH_IMAGE009
, encryption parameter
Figure 305371DEST_PATH_IMAGE002
Figure 160194DEST_PATH_IMAGE003
Figure 126882DEST_PATH_IMAGE004
Figure 522091DEST_PATH_IMAGE005
Figure 274146DEST_PATH_IMAGE006
With
Figure 375592DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223630100001DEST_PATH_IMAGE010
Figure 2013100223630100001DEST_PATH_IMAGE011
Figure 2013100223630100001DEST_PATH_IMAGE012
Figure 2013100223630100001DEST_PATH_IMAGE013
Figure 2013100223630100001DEST_PATH_IMAGE014
Figure 2013100223630100001DEST_PATH_IMAGE015
Figure 2013100223630100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 471123DEST_PATH_IMAGE011
Figure 913868DEST_PATH_IMAGE012
Figure 298899DEST_PATH_IMAGE014
Figure 666426DEST_PATH_IMAGE015
Figure 596467DEST_PATH_IMAGE016
Figure 809274DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 452745DEST_PATH_IMAGE010
Figure 974862DEST_PATH_IMAGE011
Figure 641466DEST_PATH_IMAGE012
Figure 408696DEST_PATH_IMAGE013
Figure 802955DEST_PATH_IMAGE015
Figure 753593DEST_PATH_IMAGE016
Figure 573781DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 608822DEST_PATH_IMAGE010
Figure 489053DEST_PATH_IMAGE011
Figure 113938DEST_PATH_IMAGE012
Figure 534555DEST_PATH_IMAGE013
Figure 944808DEST_PATH_IMAGE014
Figure 746673DEST_PATH_IMAGE015
Figure 609587DEST_PATH_IMAGE016
Figure 20845DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 20025DEST_PATH_IMAGE010
Figure 405319DEST_PATH_IMAGE012
Figure 371001DEST_PATH_IMAGE013
Figure 739534DEST_PATH_IMAGE014
Figure 866890DEST_PATH_IMAGE015
Figure 958922DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 447541DEST_PATH_IMAGE010
Figure 745798DEST_PATH_IMAGE011
Figure 815473DEST_PATH_IMAGE012
Figure 122958DEST_PATH_IMAGE013
Figure 200504DEST_PATH_IMAGE014
Figure 935242DEST_PATH_IMAGE015
Figure 405986DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 354350DEST_PATH_IMAGE010
Figure 543072DEST_PATH_IMAGE012
Figure 943092DEST_PATH_IMAGE013
Figure 808279DEST_PATH_IMAGE014
Figure 655199DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 516287DEST_PATH_IMAGE010
Figure 826045DEST_PATH_IMAGE011
Figure 74810DEST_PATH_IMAGE013
Figure 852273DEST_PATH_IMAGE014
Figure 38926DEST_PATH_IMAGE015
Figure 269051DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 596630DEST_PATH_IMAGE011
Figure 663254DEST_PATH_IMAGE013
Figure 424723DEST_PATH_IMAGE015
Figure 516755DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100223630100001DEST_PATH_IMAGE018
Figure 2013100223630100001DEST_PATH_IMAGE019
Figure 929730DEST_PATH_IMAGE011
Figure 871010DEST_PATH_IMAGE012
Figure 2013100223630100001DEST_PATH_IMAGE021
Figure 165944DEST_PATH_IMAGE013
Figure 2013100223630100001DEST_PATH_IMAGE022
Figure 813963DEST_PATH_IMAGE014
Figure 2013100223630100001DEST_PATH_IMAGE023
Figure 869906DEST_PATH_IMAGE015
Figure 511289DEST_PATH_IMAGE016
Figure 154760DEST_PATH_IMAGE025
Figure 178342DEST_PATH_IMAGE017
Figure 844946DEST_PATH_IMAGE026
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 110711DEST_PATH_IMAGE027
Figure 894756DEST_PATH_IMAGE011
Figure 964212DEST_PATH_IMAGE029
Figure 316696DEST_PATH_IMAGE012
Figure 317418DEST_PATH_IMAGE013
Figure 335238DEST_PATH_IMAGE014
Figure 410456DEST_PATH_IMAGE016
Figure 632490DEST_PATH_IMAGE034
Figure 733432DEST_PATH_IMAGE017
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 620486DEST_PATH_IMAGE010
Figure 2013100223630100001DEST_PATH_IMAGE037
Figure 428167DEST_PATH_IMAGE011
Figure 2013100223630100001DEST_PATH_IMAGE038
Figure 821102DEST_PATH_IMAGE012
Figure 2013100223630100001DEST_PATH_IMAGE039
Figure 845559DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE040
Figure 94225DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE041
Figure 254948DEST_PATH_IMAGE015
Figure 2013100223630100001DEST_PATH_IMAGE042
Figure 507200DEST_PATH_IMAGE016
Figure 2013100223630100001DEST_PATH_IMAGE043
Figure 18953DEST_PATH_IMAGE017
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 2013100223630100001DEST_PATH_IMAGE045
Figure 749274DEST_PATH_IMAGE010
Figure 2013100223630100001DEST_PATH_IMAGE046
Figure 30083DEST_PATH_IMAGE011
Figure 2013100223630100001DEST_PATH_IMAGE047
Figure 453236DEST_PATH_IMAGE012
Figure 2013100223630100001DEST_PATH_IMAGE048
Figure 186706DEST_PATH_IMAGE013
Figure 2013100223630100001DEST_PATH_IMAGE049
Figure DEST_PATH_IMAGE050
Figure 2013100223630100001DEST_PATH_IMAGE051
Figure 44829DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE052
Figure DEST_PATH_IMAGE053
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure DEST_PATH_IMAGE054
Figure 337718DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE055
Figure 94584DEST_PATH_IMAGE011
Figure 420392DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE057
Figure 629919DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE058
Figure 941951DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE059
Figure 609781DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE060
Figure DEST_PATH_IMAGE061
Figure 740996DEST_PATH_IMAGE017
Figure DEST_PATH_IMAGE062
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 358185DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE064
Figure 880521DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE065
Figure 485814DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE067
Figure 199135DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE068
Figure 18055DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE069
Figure 295715DEST_PATH_IMAGE016
Figure 465665DEST_PATH_IMAGE017
Figure DEST_PATH_IMAGE071
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure DEST_PATH_IMAGE072
Figure 486973DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE073
Figure 160400DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE074
Figure 930998DEST_PATH_IMAGE012
Figure 322665DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE076
Figure 882084DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE077
Figure 872223DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE079
Figure DEST_PATH_IMAGE080
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 114297DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE082
Figure 263781DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE083
Figure DEST_PATH_IMAGE084
Figure 500299DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE085
Figure DEST_PATH_IMAGE086
Figure 481210DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE087
Figure 708054DEST_PATH_IMAGE016
Figure 358347DEST_PATH_IMAGE088
Figure 640424DEST_PATH_IMAGE017
Figure 138401DEST_PATH_IMAGE089
, set encryption parameter
Figure 332885DEST_PATH_IMAGE002
Figure 486785DEST_PATH_IMAGE003
Figure 556242DEST_PATH_IMAGE004
Figure 846409DEST_PATH_IMAGE005
Figure 649728DEST_PATH_IMAGE007
Figure 273607DEST_PATH_IMAGE008
With
Figure 667548DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 718681DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 326468DEST_PATH_IMAGE090
Carry out H1=
Figure 550776DEST_PATH_IMAGE091
Figure 815535DEST_PATH_IMAGE010
Figure 286836DEST_PATH_IMAGE019
Figure 371467DEST_PATH_IMAGE011
Figure 87881DEST_PATH_IMAGE020
Figure 207147DEST_PATH_IMAGE012
Figure 849350DEST_PATH_IMAGE021
Figure 749173DEST_PATH_IMAGE013
Figure 252966DEST_PATH_IMAGE022
Figure 725329DEST_PATH_IMAGE023
Figure 846868DEST_PATH_IMAGE015
Figure 154353DEST_PATH_IMAGE024
Figure 998943DEST_PATH_IMAGE016
Figure 733681DEST_PATH_IMAGE025
Figure 529468DEST_PATH_IMAGE017
Figure 375064DEST_PATH_IMAGE026
Unitary circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 68301DEST_PATH_IMAGE090
Carry out H1=
Figure 36257DEST_PATH_IMAGE091
Figure 70072DEST_PATH_IMAGE010
Figure 968627DEST_PATH_IMAGE019
Figure 37077DEST_PATH_IMAGE011
Figure 864350DEST_PATH_IMAGE020
Figure 182199DEST_PATH_IMAGE012
Figure 807401DEST_PATH_IMAGE013
Figure 54843DEST_PATH_IMAGE022
Figure 548404DEST_PATH_IMAGE014
Figure 379273DEST_PATH_IMAGE015
Figure 46884DEST_PATH_IMAGE024
Figure 542587DEST_PATH_IMAGE016
Figure 822521DEST_PATH_IMAGE025
Figure 720070DEST_PATH_IMAGE017
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H2=
Figure 338319DEST_PATH_IMAGE027
Figure 671211DEST_PATH_IMAGE010
Figure 191577DEST_PATH_IMAGE092
Figure 951723DEST_PATH_IMAGE011
Figure 218756DEST_PATH_IMAGE029
Figure 604607DEST_PATH_IMAGE012
Figure 211169DEST_PATH_IMAGE030
Figure 892948DEST_PATH_IMAGE013
Figure 584961DEST_PATH_IMAGE031
Figure 329877DEST_PATH_IMAGE033
Figure 808263DEST_PATH_IMAGE016
Figure 373105DEST_PATH_IMAGE034
Figure 911534DEST_PATH_IMAGE017
Figure 374876DEST_PATH_IMAGE035
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 407686DEST_PATH_IMAGE093
Carry out H2=
Figure 577767DEST_PATH_IMAGE027
Figure 536364DEST_PATH_IMAGE010
Figure 424686DEST_PATH_IMAGE092
Figure 989748DEST_PATH_IMAGE011
Figure 342231DEST_PATH_IMAGE029
Figure 222463DEST_PATH_IMAGE012
Figure 847348DEST_PATH_IMAGE030
Figure 471227DEST_PATH_IMAGE013
Figure 366633DEST_PATH_IMAGE031
Figure 168498DEST_PATH_IMAGE014
Figure 280680DEST_PATH_IMAGE032
Figure 442671DEST_PATH_IMAGE015
Figure 414617DEST_PATH_IMAGE016
Figure 827144DEST_PATH_IMAGE034
Figure 42094DEST_PATH_IMAGE017
Figure 161359DEST_PATH_IMAGE035
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H3=
Figure 299168DEST_PATH_IMAGE036
Figure 871094DEST_PATH_IMAGE010
Figure 925824DEST_PATH_IMAGE011
Figure 489660DEST_PATH_IMAGE094
Figure 299616DEST_PATH_IMAGE012
Figure 950226DEST_PATH_IMAGE013
Figure 747280DEST_PATH_IMAGE040
Figure 890128DEST_PATH_IMAGE041
Figure 838493DEST_PATH_IMAGE015
Figure 993399DEST_PATH_IMAGE042
Figure 27214DEST_PATH_IMAGE016
Figure 738818DEST_PATH_IMAGE043
Figure 292422DEST_PATH_IMAGE017
Figure 368962DEST_PATH_IMAGE044
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 139341DEST_PATH_IMAGE001
Carry out unitary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100223630A 2013-01-22 2013-01-22 Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark Pending CN103106432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100223630A CN103106432A (en) 2013-01-22 2013-01-22 Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100223630A CN103106432A (en) 2013-01-22 2013-01-22 Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106432A true CN103106432A (en) 2013-05-15

Family

ID=48314278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100223630A Pending CN103106432A (en) 2013-01-22 2013-01-22 Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106432A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515