CN103106435A - Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark - Google Patents

Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106435A
CN103106435A CN201310022372XA CN201310022372A CN103106435A CN 103106435 A CN103106435 A CN 103106435A CN 201310022372X A CN201310022372X A CN 201310022372XA CN 201310022372 A CN201310022372 A CN 201310022372A CN 103106435 A CN103106435 A CN 103106435A
Authority
CN
China
Prior art keywords
binary
counterfeiting information
group
trade mark
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310022372XA
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022372XA priority Critical patent/CN103106435A/en
Publication of CN103106435A publication Critical patent/CN103106435A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark. The multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark can process binary anti-fake information to generate binary modulation signals through ternary variable cycle encryption and channel coding. The anti-fake information is embedded in a whole trademark page through orderly change of amplitude-modulated dot conductivity with a circular table lookup modulation mode method. The anti-fake information can be identified from any fragment at the time of trademark identification and the multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark can be used for all kinds of anti-fake trademarks.

Description

Multiparameter single argument three metavariable circulation encryption anti-counterfeiting information storage trade marks
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of multiparameter single argument three metavariable circulation encryption anti-counterfeiting information are stored trade marks, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 473690DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 453148DEST_PATH_IMAGE002
,
Figure 232885DEST_PATH_IMAGE003
,
Figure 441143DEST_PATH_IMAGE004
, , ,
Figure 279765DEST_PATH_IMAGE007
,
Figure 478665DEST_PATH_IMAGE008
With , encryption parameter
Figure 16274DEST_PATH_IMAGE002
, ,
Figure 382981DEST_PATH_IMAGE004
, ,
Figure 149260DEST_PATH_IMAGE006
,
Figure 453202DEST_PATH_IMAGE007
,
Figure 544305DEST_PATH_IMAGE008
With It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 398308DEST_PATH_IMAGE010
Figure 189547DEST_PATH_IMAGE011
Figure 81411DEST_PATH_IMAGE012
Figure 641705DEST_PATH_IMAGE013
Figure 226401DEST_PATH_IMAGE014
Figure 931982DEST_PATH_IMAGE016
Figure 346782DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 602631DEST_PATH_IMAGE011
Figure 836298DEST_PATH_IMAGE012
Figure 371184DEST_PATH_IMAGE013
Figure 222914DEST_PATH_IMAGE015
Figure 509539DEST_PATH_IMAGE016
Figure 398733DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 745401DEST_PATH_IMAGE010
Figure 970977DEST_PATH_IMAGE011
Figure 61293DEST_PATH_IMAGE012
Figure 245598DEST_PATH_IMAGE014
Figure 950883DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 872309DEST_PATH_IMAGE010
Figure 321745DEST_PATH_IMAGE011
Figure 504596DEST_PATH_IMAGE012
Figure 148853DEST_PATH_IMAGE013
Figure 8225DEST_PATH_IMAGE014
Figure 617061DEST_PATH_IMAGE015
Figure 665919DEST_PATH_IMAGE016
Figure 551967DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 330042DEST_PATH_IMAGE010
Figure 75462DEST_PATH_IMAGE012
Figure 753699DEST_PATH_IMAGE013
Figure 954873DEST_PATH_IMAGE014
Figure 351350DEST_PATH_IMAGE015
Figure 663383DEST_PATH_IMAGE016
Figure 452917DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 762675DEST_PATH_IMAGE010
Figure 664269DEST_PATH_IMAGE013
Figure 957979DEST_PATH_IMAGE014
Figure 312737DEST_PATH_IMAGE015
Figure 169834DEST_PATH_IMAGE016
Figure 677170DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 391048DEST_PATH_IMAGE010
Figure 308801DEST_PATH_IMAGE011
Figure 704010DEST_PATH_IMAGE012
Figure 65853DEST_PATH_IMAGE013
Figure 216211DEST_PATH_IMAGE014
Figure 296294DEST_PATH_IMAGE015
Figure 557511DEST_PATH_IMAGE016
Figure 773860DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 95120DEST_PATH_IMAGE010
Figure 464757DEST_PATH_IMAGE012
Figure 801191DEST_PATH_IMAGE013
Figure 293352DEST_PATH_IMAGE014
Figure 685468DEST_PATH_IMAGE016
Figure 328939DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 477154DEST_PATH_IMAGE010
Figure 268393DEST_PATH_IMAGE011
Figure 157327DEST_PATH_IMAGE012
Figure 717621DEST_PATH_IMAGE013
Figure 36738DEST_PATH_IMAGE014
Figure 315273DEST_PATH_IMAGE015
Figure 197778DEST_PATH_IMAGE016
Figure 363311DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, three metavariable circulation cryptographic calculations are defined as H i=
Figure 619160DEST_PATH_IMAGE010
Figure 102094DEST_PATH_IMAGE019
Figure 402362DEST_PATH_IMAGE011
Figure 50829DEST_PATH_IMAGE012
Figure 337454DEST_PATH_IMAGE021
Figure 824247DEST_PATH_IMAGE022
Figure 812243DEST_PATH_IMAGE023
Figure 56142DEST_PATH_IMAGE015
Figure 321514DEST_PATH_IMAGE024
Figure 283654DEST_PATH_IMAGE016
Figure 662814DEST_PATH_IMAGE025
Figure 761220DEST_PATH_IMAGE017
, during binary operator control variables k=1, three metavariable circulation cryptographic calculations are defined as H i=
Figure 649858DEST_PATH_IMAGE027
Figure 567130DEST_PATH_IMAGE010
Figure 723305DEST_PATH_IMAGE020
Figure 582676DEST_PATH_IMAGE011
Figure 7491DEST_PATH_IMAGE028
Figure 243300DEST_PATH_IMAGE012
Figure 67031DEST_PATH_IMAGE022
Figure 645594DEST_PATH_IMAGE030
Figure 597501DEST_PATH_IMAGE015
Figure 243246DEST_PATH_IMAGE024
Figure 303081DEST_PATH_IMAGE016
Figure 350671DEST_PATH_IMAGE025
Figure 473479DEST_PATH_IMAGE017
Figure 606520DEST_PATH_IMAGE026
, during binary operator control variables k=2, three metavariable circulation cryptographic calculations are defined as H i=
Figure 659927DEST_PATH_IMAGE027
Figure 312756DEST_PATH_IMAGE010
Figure 961224DEST_PATH_IMAGE011
Figure 880638DEST_PATH_IMAGE022
Figure 379185DEST_PATH_IMAGE012
Figure 93063DEST_PATH_IMAGE031
Figure 951429DEST_PATH_IMAGE013
Figure 408955DEST_PATH_IMAGE030
Figure 770797DEST_PATH_IMAGE014
Figure 921156DEST_PATH_IMAGE023
Figure 1238DEST_PATH_IMAGE015
Figure 934559DEST_PATH_IMAGE032
Figure 665755DEST_PATH_IMAGE016
Figure 734818DEST_PATH_IMAGE025
Figure 101525DEST_PATH_IMAGE026
, during binary operator control variables k=3, three metavariable circulation cryptographic calculations are defined as H i=
Figure 687227DEST_PATH_IMAGE027
Figure 851492DEST_PATH_IMAGE010
Figure 509187DEST_PATH_IMAGE011
Figure 700128DEST_PATH_IMAGE031
Figure 363190DEST_PATH_IMAGE012
Figure 642512DEST_PATH_IMAGE030
Figure 360249DEST_PATH_IMAGE029
Figure 928634DEST_PATH_IMAGE014
Figure 957901DEST_PATH_IMAGE032
Figure 840406DEST_PATH_IMAGE015
Figure 255207DEST_PATH_IMAGE024
Figure 745225DEST_PATH_IMAGE016
Figure 245477DEST_PATH_IMAGE033
Figure 741792DEST_PATH_IMAGE017
Figure 11100DEST_PATH_IMAGE026
, during binary operator control variables k=4, three metavariable circulation cryptographic calculations are defined as H i=
Figure 937599DEST_PATH_IMAGE027
Figure 925146DEST_PATH_IMAGE010
Figure 351896DEST_PATH_IMAGE011
Figure 658561DEST_PATH_IMAGE012
Figure 514258DEST_PATH_IMAGE029
Figure 695840DEST_PATH_IMAGE013
Figure 213409DEST_PATH_IMAGE032
Figure 403847DEST_PATH_IMAGE015
Figure 92318DEST_PATH_IMAGE033
Figure 213857DEST_PATH_IMAGE016
Figure 396708DEST_PATH_IMAGE025
Figure 615200DEST_PATH_IMAGE017
Figure 222374DEST_PATH_IMAGE034
, during binary operator control variables k=5, three metavariable circulation cryptographic calculations are defined as H i=
Figure 201310022372X100002DEST_PATH_IMAGE035
Figure 706576DEST_PATH_IMAGE010
Figure 676806DEST_PATH_IMAGE028
Figure 500537DEST_PATH_IMAGE011
Figure 468493DEST_PATH_IMAGE031
Figure 626942DEST_PATH_IMAGE012
Figure 154525DEST_PATH_IMAGE029
Figure 347609DEST_PATH_IMAGE013
Figure 608575DEST_PATH_IMAGE014
Figure 46827DEST_PATH_IMAGE015
Figure 169635DEST_PATH_IMAGE024
Figure 974780DEST_PATH_IMAGE016
Figure 90503DEST_PATH_IMAGE034
Figure 286310DEST_PATH_IMAGE026
, during binary operator control variables k=6, three metavariable circulation cryptographic calculations are defined as H i=
Figure 654450DEST_PATH_IMAGE027
Figure 308285DEST_PATH_IMAGE010
Figure 795078DEST_PATH_IMAGE011
Figure 783074DEST_PATH_IMAGE012
Figure 659763DEST_PATH_IMAGE029
Figure 295275DEST_PATH_IMAGE013
Figure 624625DEST_PATH_IMAGE023
Figure 639504DEST_PATH_IMAGE014
Figure 370700DEST_PATH_IMAGE024
Figure 177113DEST_PATH_IMAGE015
Figure 993759DEST_PATH_IMAGE034
Figure 395101DEST_PATH_IMAGE025
Figure 559367DEST_PATH_IMAGE017
Figure 614041DEST_PATH_IMAGE035
, during binary operator control variables k=7, three metavariable circulation cryptographic calculations are defined as H i=
Figure 217061DEST_PATH_IMAGE018
Figure 405072DEST_PATH_IMAGE010
Figure 68135DEST_PATH_IMAGE028
Figure 531477DEST_PATH_IMAGE011
Figure 688920DEST_PATH_IMAGE020
Figure 983635DEST_PATH_IMAGE012
Figure 581287DEST_PATH_IMAGE013
Figure 276842DEST_PATH_IMAGE023
Figure 629326DEST_PATH_IMAGE014
Figure 634191DEST_PATH_IMAGE024
Figure 899823DEST_PATH_IMAGE015
Figure 648336DEST_PATH_IMAGE025
Figure 668376DEST_PATH_IMAGE016
Figure 844142DEST_PATH_IMAGE035
Figure 869047DEST_PATH_IMAGE026
, set encryption parameter
Figure 9173DEST_PATH_IMAGE002
,
Figure 90261DEST_PATH_IMAGE003
,
Figure 312908DEST_PATH_IMAGE004
,
Figure 403223DEST_PATH_IMAGE005
,
Figure 335538DEST_PATH_IMAGE006
,
Figure 544453DEST_PATH_IMAGE007
,
Figure 991746DEST_PATH_IMAGE008
With
Figure 620173DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 921841DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 201310022372X100002DEST_PATH_IMAGE036
Carry out H 1=
Figure 201310022372X100002DEST_PATH_IMAGE037
Figure 236410DEST_PATH_IMAGE010
Figure 420267DEST_PATH_IMAGE019
Figure 600188DEST_PATH_IMAGE011
Figure 756363DEST_PATH_IMAGE039
Figure 615734DEST_PATH_IMAGE012
Figure 37620DEST_PATH_IMAGE021
Figure 7850DEST_PATH_IMAGE013
Figure 201310022372X100002DEST_PATH_IMAGE041
Figure 674903DEST_PATH_IMAGE023
Figure 276720DEST_PATH_IMAGE016
Figure 228627DEST_PATH_IMAGE025
Figure 265033DEST_PATH_IMAGE026
Three metavariable circulation cryptographic calculations (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 797777DEST_PATH_IMAGE036
Carry out H 1=
Figure 240577DEST_PATH_IMAGE010
Figure 6200DEST_PATH_IMAGE011
Figure 299909DEST_PATH_IMAGE039
Figure 920246DEST_PATH_IMAGE012
Figure 511765DEST_PATH_IMAGE021
Figure 19100DEST_PATH_IMAGE013
Figure 998558DEST_PATH_IMAGE041
Figure 591344DEST_PATH_IMAGE014
Figure 863243DEST_PATH_IMAGE015
Figure 842984DEST_PATH_IMAGE025
Figure 380592DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of three metavariable circulation cryptographic calculations, next three metavariable circulation cryptographic calculations are pointed to H 2=
Figure 197239DEST_PATH_IMAGE027
Figure 747300DEST_PATH_IMAGE010
Figure 201310022372X100002DEST_PATH_IMAGE042
Figure 333002DEST_PATH_IMAGE011
Figure 201310022372X100002DEST_PATH_IMAGE044
Figure 27398DEST_PATH_IMAGE013
Figure 881402DEST_PATH_IMAGE014
Figure 201310022372X100002DEST_PATH_IMAGE046
Figure 485689DEST_PATH_IMAGE015
Figure 204702DEST_PATH_IMAGE024
Figure 764996DEST_PATH_IMAGE016
Figure 225058DEST_PATH_IMAGE025
Figure 175697DEST_PATH_IMAGE017
Figure 120519DEST_PATH_IMAGE026
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure DEST_PATH_IMAGE047
Carry out H 2=
Figure 163354DEST_PATH_IMAGE010
Figure 289704DEST_PATH_IMAGE042
Figure 772638DEST_PATH_IMAGE011
Figure 497405DEST_PATH_IMAGE028
Figure 423904DEST_PATH_IMAGE012
Figure 411451DEST_PATH_IMAGE044
Figure 448809DEST_PATH_IMAGE013
Figure 385672DEST_PATH_IMAGE029
Figure 732340DEST_PATH_IMAGE014
Figure 852492DEST_PATH_IMAGE015
Figure 99113DEST_PATH_IMAGE016
Figure 61253DEST_PATH_IMAGE025
Figure 440413DEST_PATH_IMAGE017
Figure 489884DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of three metavariable circulation cryptographic calculations, make next three metavariable circulation cryptographic calculations point to H 3=
Figure 912775DEST_PATH_IMAGE027
Figure 299894DEST_PATH_IMAGE010
Figure 482745DEST_PATH_IMAGE028
Figure 201310022372X100002DEST_PATH_IMAGE048
Figure 986374DEST_PATH_IMAGE012
Figure 595210DEST_PATH_IMAGE031
Figure 581752DEST_PATH_IMAGE013
Figure 201310022372X100002DEST_PATH_IMAGE050
Figure 467799DEST_PATH_IMAGE014
Figure 498072DEST_PATH_IMAGE023
Figure 469570DEST_PATH_IMAGE015
Figure 201310022372X100002DEST_PATH_IMAGE052
Figure 991294DEST_PATH_IMAGE016
Figure 918799DEST_PATH_IMAGE025
Figure 267183DEST_PATH_IMAGE026
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this three metavariables circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 344596DEST_PATH_IMAGE001
carry out three metavariable circulation cryptographic calculations, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to three metavariable circulation cryptographic calculations, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 392187DEST_PATH_IMAGE002
, ,
Figure 585719DEST_PATH_IMAGE004
,
Figure 701442DEST_PATH_IMAGE005
,
Figure 354272DEST_PATH_IMAGE006
, ,
Figure 2739DEST_PATH_IMAGE008
With The initial value of initial value when encrypting, the initial value when initial value of setting encryption variables j, d, e, f, g, h, r, p and q is encryption, the initial value design of binary operator control variables k is k=0, and known by three metavariable circulation ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 616440DEST_PATH_IMAGE018
Figure 78121DEST_PATH_IMAGE010
Figure 185754DEST_PATH_IMAGE019
Figure 394013DEST_PATH_IMAGE011
Figure 5123DEST_PATH_IMAGE020
Figure 535242DEST_PATH_IMAGE012
Figure 864592DEST_PATH_IMAGE021
Figure 279841DEST_PATH_IMAGE022
Figure 601101DEST_PATH_IMAGE014
Figure 967808DEST_PATH_IMAGE015
Figure 301313DEST_PATH_IMAGE024
Figure 731158DEST_PATH_IMAGE016
Figure 769521DEST_PATH_IMAGE025
Figure 123273DEST_PATH_IMAGE017
, during binary operator control variables k=1, decrypt operation is M i=
Figure 977276DEST_PATH_IMAGE027
Figure 847329DEST_PATH_IMAGE020
Figure 158356DEST_PATH_IMAGE011
Figure 726741DEST_PATH_IMAGE028
Figure 692041DEST_PATH_IMAGE022
Figure 857574DEST_PATH_IMAGE013
Figure 300374DEST_PATH_IMAGE014
Figure 534040DEST_PATH_IMAGE030
Figure 68927DEST_PATH_IMAGE015
Figure 729846DEST_PATH_IMAGE024
Figure 717394DEST_PATH_IMAGE016
Figure 751822DEST_PATH_IMAGE025
Figure 141215DEST_PATH_IMAGE017
Figure 425565DEST_PATH_IMAGE026
, during binary operator control variables k=2, decrypt operation is M i=
Figure 651141DEST_PATH_IMAGE027
Figure 470510DEST_PATH_IMAGE028
Figure 988079DEST_PATH_IMAGE011
Figure 700951DEST_PATH_IMAGE022
Figure 329379DEST_PATH_IMAGE012
Figure 365468DEST_PATH_IMAGE031
Figure 807600DEST_PATH_IMAGE013
Figure 257036DEST_PATH_IMAGE030
Figure 174308DEST_PATH_IMAGE014
Figure 392799DEST_PATH_IMAGE023
Figure 2903DEST_PATH_IMAGE015
Figure 674056DEST_PATH_IMAGE032
Figure 847548DEST_PATH_IMAGE016
Figure 671279DEST_PATH_IMAGE025
Figure 701552DEST_PATH_IMAGE017
Figure 607804DEST_PATH_IMAGE026
, during binary operator control variables k=3, decrypt operation is M i=
Figure 59962DEST_PATH_IMAGE010
Figure 261136DEST_PATH_IMAGE028
Figure 844564DEST_PATH_IMAGE011
Figure 907329DEST_PATH_IMAGE031
Figure 954920DEST_PATH_IMAGE012
Figure 210769DEST_PATH_IMAGE013
Figure 91873DEST_PATH_IMAGE029
Figure 993970DEST_PATH_IMAGE014
Figure 474630DEST_PATH_IMAGE032
Figure 580120DEST_PATH_IMAGE015
Figure 499535DEST_PATH_IMAGE024
Figure 6870DEST_PATH_IMAGE016
Figure 720749DEST_PATH_IMAGE033
Figure 579114DEST_PATH_IMAGE017
Figure 36640DEST_PATH_IMAGE026
, during binary operator control variables k=4, decrypt operation is M i=
Figure 585433DEST_PATH_IMAGE027
Figure 483595DEST_PATH_IMAGE010
Figure 812945DEST_PATH_IMAGE028
Figure 290511DEST_PATH_IMAGE031
Figure 791866DEST_PATH_IMAGE029
Figure 794457DEST_PATH_IMAGE013
Figure 122103DEST_PATH_IMAGE032
Figure 348685DEST_PATH_IMAGE014
Figure 403359DEST_PATH_IMAGE023
Figure 6379DEST_PATH_IMAGE015
Figure 197320DEST_PATH_IMAGE033
Figure 481168DEST_PATH_IMAGE017
Figure 41462DEST_PATH_IMAGE034
, during binary operator control variables k=5, decrypt operation is M i=
Figure 357650DEST_PATH_IMAGE035
Figure 636184DEST_PATH_IMAGE010
Figure 746540DEST_PATH_IMAGE011
Figure 423509DEST_PATH_IMAGE031
Figure 674493DEST_PATH_IMAGE012
Figure 423006DEST_PATH_IMAGE029
Figure 443046DEST_PATH_IMAGE013
Figure 618812DEST_PATH_IMAGE023
Figure 360022DEST_PATH_IMAGE014
Figure 973723DEST_PATH_IMAGE015
Figure 280387DEST_PATH_IMAGE016
Figure 121435DEST_PATH_IMAGE034
Figure 365335DEST_PATH_IMAGE017
, during binary operator control variables k=6, decrypt operation is M i=
Figure 533459DEST_PATH_IMAGE027
Figure 161887DEST_PATH_IMAGE010
Figure 8095DEST_PATH_IMAGE018
Figure 696566DEST_PATH_IMAGE011
Figure 631155DEST_PATH_IMAGE031
Figure 63273DEST_PATH_IMAGE012
Figure 32497DEST_PATH_IMAGE029
Figure 891869DEST_PATH_IMAGE013
Figure 500705DEST_PATH_IMAGE023
Figure 294666DEST_PATH_IMAGE024
Figure 90319DEST_PATH_IMAGE015
Figure 248768DEST_PATH_IMAGE034
Figure 773422DEST_PATH_IMAGE016
Figure 966505DEST_PATH_IMAGE025
Figure 105363DEST_PATH_IMAGE017
Figure 236261DEST_PATH_IMAGE035
, during binary operator control variables k=7, decrypt operation is M i=
Figure 813873DEST_PATH_IMAGE018
Figure 612196DEST_PATH_IMAGE010
Figure 984271DEST_PATH_IMAGE028
Figure 599536DEST_PATH_IMAGE011
Figure 715259DEST_PATH_IMAGE020
Figure 555039DEST_PATH_IMAGE012
Figure 913995DEST_PATH_IMAGE029
Figure 285065DEST_PATH_IMAGE013
Figure 938900DEST_PATH_IMAGE023
Figure 711815DEST_PATH_IMAGE014
Figure 425693DEST_PATH_IMAGE024
Figure 9691DEST_PATH_IMAGE015
Figure 467217DEST_PATH_IMAGE025
Figure 917101DEST_PATH_IMAGE035
Figure 246451DEST_PATH_IMAGE017
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 989596DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 796009DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 612655DEST_PATH_IMAGE036
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table carry out three metavariable circulation cryptographic calculations, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information , generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multiparameter single argument three metavariable circulation encryption anti-counterfeiting information storage trade marks in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 201310022372X100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 201310022372X100001DEST_PATH_IMAGE002
,
Figure DEST_PATH_IMAGE003
,
Figure 201310022372X100001DEST_PATH_IMAGE004
,
Figure DEST_PATH_IMAGE005
,
Figure 201310022372X100001DEST_PATH_IMAGE006
,
Figure DEST_PATH_IMAGE007
,
Figure 201310022372X100001DEST_PATH_IMAGE008
With
Figure DEST_PATH_IMAGE009
, encryption parameter
Figure 383540DEST_PATH_IMAGE002
,
Figure 438214DEST_PATH_IMAGE003
,
Figure 41234DEST_PATH_IMAGE004
,
Figure 229245DEST_PATH_IMAGE005
,
Figure 892308DEST_PATH_IMAGE006
,
Figure 168700DEST_PATH_IMAGE007
,
Figure 575410DEST_PATH_IMAGE008
With
Figure 807808DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure DEST_PATH_IMAGE011
Figure 201310022372X100001DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE015
Figure 201310022372X100001DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 908618DEST_PATH_IMAGE010
Figure 921573DEST_PATH_IMAGE011
Figure 617128DEST_PATH_IMAGE012
Figure 31929DEST_PATH_IMAGE013
Figure 784597DEST_PATH_IMAGE014
Figure 284848DEST_PATH_IMAGE015
Figure 784094DEST_PATH_IMAGE016
Figure 53401DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 979900DEST_PATH_IMAGE010
Figure 967447DEST_PATH_IMAGE011
Figure 4805DEST_PATH_IMAGE012
Figure 394198DEST_PATH_IMAGE013
Figure 228948DEST_PATH_IMAGE014
Figure 703792DEST_PATH_IMAGE015
Figure 544840DEST_PATH_IMAGE016
Figure 788740DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 57041DEST_PATH_IMAGE010
Figure 132761DEST_PATH_IMAGE012
Figure 496747DEST_PATH_IMAGE013
Figure 929926DEST_PATH_IMAGE015
Figure 362044DEST_PATH_IMAGE016
Figure 518219DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 128323DEST_PATH_IMAGE010
Figure 612525DEST_PATH_IMAGE011
Figure 582755DEST_PATH_IMAGE012
Figure 397697DEST_PATH_IMAGE013
Figure 427970DEST_PATH_IMAGE014
Figure 524102DEST_PATH_IMAGE015
Figure 48755DEST_PATH_IMAGE016
Figure 976260DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 928166DEST_PATH_IMAGE010
Figure 573911DEST_PATH_IMAGE011
Figure 902256DEST_PATH_IMAGE012
Figure 804145DEST_PATH_IMAGE014
Figure 937186DEST_PATH_IMAGE015
Figure 803642DEST_PATH_IMAGE016
Figure 705739DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 999448DEST_PATH_IMAGE010
Figure 24353DEST_PATH_IMAGE012
Figure 780956DEST_PATH_IMAGE013
Figure 514076DEST_PATH_IMAGE014
Figure 356130DEST_PATH_IMAGE015
Figure 441078DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 405940DEST_PATH_IMAGE011
Figure 417889DEST_PATH_IMAGE012
Figure 86768DEST_PATH_IMAGE013
Figure 952568DEST_PATH_IMAGE014
Figure 769214DEST_PATH_IMAGE015
Figure 319276DEST_PATH_IMAGE016
Figure 904978DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 147871DEST_PATH_IMAGE010
Figure 451814DEST_PATH_IMAGE011
Figure 602304DEST_PATH_IMAGE012
Figure 73472DEST_PATH_IMAGE013
Figure 470955DEST_PATH_IMAGE014
Figure 12926DEST_PATH_IMAGE015
Figure 154058DEST_PATH_IMAGE016
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, three metavariable circulation cryptographic calculations are defined as H i=
Figure 299048DEST_PATH_IMAGE010
Figure 201310022372X100001DEST_PATH_IMAGE019
Figure 125053DEST_PATH_IMAGE011
Figure 201310022372X100001DEST_PATH_IMAGE020
Figure 879995DEST_PATH_IMAGE012
Figure 201310022372X100001DEST_PATH_IMAGE021
Figure 920894DEST_PATH_IMAGE013
Figure 201310022372X100001DEST_PATH_IMAGE022
Figure 305520DEST_PATH_IMAGE014
Figure 911875DEST_PATH_IMAGE024
Figure 197493DEST_PATH_IMAGE016
Figure 373260DEST_PATH_IMAGE025
Figure 335848DEST_PATH_IMAGE026
, during binary operator control variables k=1, three metavariable circulation cryptographic calculations are defined as H i=
Figure 459662DEST_PATH_IMAGE027
Figure 548273DEST_PATH_IMAGE010
Figure 864165DEST_PATH_IMAGE011
Figure 108064DEST_PATH_IMAGE028
Figure 72926DEST_PATH_IMAGE022
Figure 452086DEST_PATH_IMAGE013
Figure 816071DEST_PATH_IMAGE029
Figure 436201DEST_PATH_IMAGE030
Figure 571964DEST_PATH_IMAGE024
Figure 182068DEST_PATH_IMAGE016
Figure 853221DEST_PATH_IMAGE025
Figure 839763DEST_PATH_IMAGE017
Figure 912761DEST_PATH_IMAGE026
, during binary operator control variables k=2, three metavariable circulation cryptographic calculations are defined as H i=
Figure 696696DEST_PATH_IMAGE027
Figure 855145DEST_PATH_IMAGE010
Figure 566749DEST_PATH_IMAGE028
Figure 244986DEST_PATH_IMAGE011
Figure 446160DEST_PATH_IMAGE022
Figure 154670DEST_PATH_IMAGE031
Figure 952993DEST_PATH_IMAGE013
Figure 205912DEST_PATH_IMAGE014
Figure 974465DEST_PATH_IMAGE015
Figure 517442DEST_PATH_IMAGE032
Figure 622932DEST_PATH_IMAGE016
Figure 542347DEST_PATH_IMAGE025
Figure 49683DEST_PATH_IMAGE017
Figure 763561DEST_PATH_IMAGE026
, during binary operator control variables k=3, three metavariable circulation cryptographic calculations are defined as H i=
Figure 636575DEST_PATH_IMAGE027
Figure 94101DEST_PATH_IMAGE010
Figure 455944DEST_PATH_IMAGE028
Figure 606302DEST_PATH_IMAGE011
Figure 422894DEST_PATH_IMAGE013
Figure 239540DEST_PATH_IMAGE029
Figure 786671DEST_PATH_IMAGE014
Figure 372374DEST_PATH_IMAGE032
Figure 552950DEST_PATH_IMAGE015
Figure 342046DEST_PATH_IMAGE024
Figure 945065DEST_PATH_IMAGE016
Figure 404515DEST_PATH_IMAGE033
Figure 801999DEST_PATH_IMAGE017
Figure 343970DEST_PATH_IMAGE026
, during binary operator control variables k=4, three metavariable circulation cryptographic calculations are defined as H i=
Figure 485101DEST_PATH_IMAGE027
Figure 796128DEST_PATH_IMAGE010
Figure 364512DEST_PATH_IMAGE028
Figure 393779DEST_PATH_IMAGE011
Figure 338602DEST_PATH_IMAGE031
Figure 501205DEST_PATH_IMAGE012
Figure 506070DEST_PATH_IMAGE029
Figure 757054DEST_PATH_IMAGE013
Figure 239988DEST_PATH_IMAGE032
Figure 525607DEST_PATH_IMAGE014
Figure 435794DEST_PATH_IMAGE023
Figure 174074DEST_PATH_IMAGE015
Figure 460699DEST_PATH_IMAGE033
Figure 592035DEST_PATH_IMAGE016
Figure 164279DEST_PATH_IMAGE017
Figure 989016DEST_PATH_IMAGE034
, during binary operator control variables k=5, three metavariable circulation cryptographic calculations are defined as H i=
Figure 501217DEST_PATH_IMAGE028
Figure 688725DEST_PATH_IMAGE012
Figure 377195DEST_PATH_IMAGE029
Figure 743903DEST_PATH_IMAGE023
Figure 713127DEST_PATH_IMAGE014
Figure 572499DEST_PATH_IMAGE033
Figure 56853DEST_PATH_IMAGE016
Figure 87126DEST_PATH_IMAGE034
Figure 996308DEST_PATH_IMAGE017
Figure 504649DEST_PATH_IMAGE026
, during binary operator control variables k=6, three metavariable circulation cryptographic calculations are defined as H i=
Figure 448466DEST_PATH_IMAGE027
Figure 587323DEST_PATH_IMAGE010
Figure 233068DEST_PATH_IMAGE018
Figure 343424DEST_PATH_IMAGE031
Figure 463302DEST_PATH_IMAGE012
Figure 596343DEST_PATH_IMAGE029
Figure 462799DEST_PATH_IMAGE013
Figure 302579DEST_PATH_IMAGE023
Figure 845556DEST_PATH_IMAGE014
Figure 870461DEST_PATH_IMAGE015
Figure 377796DEST_PATH_IMAGE034
Figure 91674DEST_PATH_IMAGE016
Figure 136991DEST_PATH_IMAGE025
Figure 359898DEST_PATH_IMAGE017
Figure 971008DEST_PATH_IMAGE035
, during binary operator control variables k=7, three metavariable circulation cryptographic calculations are defined as H i=
Figure 201449DEST_PATH_IMAGE010
Figure 947819DEST_PATH_IMAGE028
Figure 616698DEST_PATH_IMAGE011
Figure 239757DEST_PATH_IMAGE012
Figure 304665DEST_PATH_IMAGE029
Figure 638170DEST_PATH_IMAGE013
Figure 864752DEST_PATH_IMAGE023
Figure 335496DEST_PATH_IMAGE024
Figure 775705DEST_PATH_IMAGE015
Figure 189499DEST_PATH_IMAGE025
Figure 715159DEST_PATH_IMAGE016
Figure 875531DEST_PATH_IMAGE035
Figure 435826DEST_PATH_IMAGE017
, set encryption parameter
Figure 971160DEST_PATH_IMAGE002
, , ,
Figure 820802DEST_PATH_IMAGE005
,
Figure 71786DEST_PATH_IMAGE006
,
Figure 820299DEST_PATH_IMAGE007
,
Figure 837409DEST_PATH_IMAGE008
With
Figure 950858DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 938406DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure DEST_PATH_IMAGE037
Figure 851130DEST_PATH_IMAGE010
Figure 240523DEST_PATH_IMAGE019
Figure 524873DEST_PATH_IMAGE011
Figure 201310022372X100001DEST_PATH_IMAGE038
Figure 547187DEST_PATH_IMAGE012
Figure 379446DEST_PATH_IMAGE021
Figure 623346DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE039
Figure 953964DEST_PATH_IMAGE014
Figure 853787DEST_PATH_IMAGE023
Figure 232947DEST_PATH_IMAGE015
Figure 331353DEST_PATH_IMAGE024
Figure 954412DEST_PATH_IMAGE025
Figure 134333DEST_PATH_IMAGE017
Three metavariable circulation cryptographic calculations (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 149880DEST_PATH_IMAGE036
Carry out H 1=
Figure 571765DEST_PATH_IMAGE037
Figure 541995DEST_PATH_IMAGE010
Figure 395999DEST_PATH_IMAGE011
Figure 492131DEST_PATH_IMAGE038
Figure 16784DEST_PATH_IMAGE012
Figure 209868DEST_PATH_IMAGE021
Figure 227021DEST_PATH_IMAGE013
Figure 357919DEST_PATH_IMAGE039
Figure 935531DEST_PATH_IMAGE014
Figure 920805DEST_PATH_IMAGE023
Figure 981296DEST_PATH_IMAGE015
Figure 596560DEST_PATH_IMAGE024
Figure 712284DEST_PATH_IMAGE016
Figure 365113DEST_PATH_IMAGE025
Figure 732407DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of three metavariable circulation cryptographic calculations, next three metavariable circulation cryptographic calculations are pointed to H 2=
Figure 386242DEST_PATH_IMAGE027
Figure 346108DEST_PATH_IMAGE010
Figure 201310022372X100001DEST_PATH_IMAGE040
Figure 686084DEST_PATH_IMAGE011
Figure 528138DEST_PATH_IMAGE028
Figure 485523DEST_PATH_IMAGE013
Figure 121035DEST_PATH_IMAGE029
Figure 450385DEST_PATH_IMAGE014
Figure 201310022372X100001DEST_PATH_IMAGE042
Figure 153679DEST_PATH_IMAGE015
Figure 508044DEST_PATH_IMAGE024
Figure 6470DEST_PATH_IMAGE025
Figure 71378DEST_PATH_IMAGE017
Figure 407812DEST_PATH_IMAGE026
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure DEST_PATH_IMAGE043
Carry out H 2=
Figure 438654DEST_PATH_IMAGE027
Figure 742597DEST_PATH_IMAGE010
Figure 96349DEST_PATH_IMAGE040
Figure 536557DEST_PATH_IMAGE011
Figure 698155DEST_PATH_IMAGE028
Figure 223814DEST_PATH_IMAGE012
Figure 381257DEST_PATH_IMAGE041
Figure 260669DEST_PATH_IMAGE029
Figure 273624DEST_PATH_IMAGE014
Figure 156129DEST_PATH_IMAGE042
Figure 326528DEST_PATH_IMAGE024
Figure 580441DEST_PATH_IMAGE016
Figure 328954DEST_PATH_IMAGE025
Figure 348994DEST_PATH_IMAGE017
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of three metavariable circulation cryptographic calculations, make next three metavariable circulation cryptographic calculations point to H 3=
Figure 449991DEST_PATH_IMAGE027
Figure 876742DEST_PATH_IMAGE028
Figure 708562DEST_PATH_IMAGE011
Figure 201310022372X100001DEST_PATH_IMAGE044
Figure 55843DEST_PATH_IMAGE012
Figure 83842DEST_PATH_IMAGE031
Figure DEST_PATH_IMAGE045
Figure 105652DEST_PATH_IMAGE023
Figure 484812DEST_PATH_IMAGE015
Figure 201310022372X100001DEST_PATH_IMAGE046
Figure 848798DEST_PATH_IMAGE016
Figure 302649DEST_PATH_IMAGE025
Figure 486505DEST_PATH_IMAGE017
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this three metavariables circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 887848DEST_PATH_IMAGE001
Carry out three metavariable circulation cryptographic calculations, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022372XA 2013-01-22 2013-01-22 Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark Pending CN103106435A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022372XA CN103106435A (en) 2013-01-22 2013-01-22 Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022372XA CN103106435A (en) 2013-01-22 2013-01-22 Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106435A true CN103106435A (en) 2013-05-15

Family

ID=48314281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022372XA Pending CN103106435A (en) 2013-01-22 2013-01-22 Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106435A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper

Similar Documents

Publication Publication Date Title
CN103106435A (en) Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark
CN103106455A (en) Multiparameter univariate binary cycle encryption anti-fake information storage trademark
CN103106497A (en) Multiparameter univariate binary variable cycle encryption anti-fake information storage trademark
CN103106523A (en) Multiparameter univariate multielement cycle encryption anti-fake information storage trademark
CN103106490A (en) Multiparameter polytomy variable cycle encryption anti-fake information storage trademark
CN103106482A (en) Multiparameter univariate binary encryption anti-fake information storage trademark
CN103106436A (en) Multiparameter univariate unitary cycle encryption anti-fake information storage trademark
CN103106521A (en) Multiparameter univariate ternary encryption anti-fake information storage trademark
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark
CN103106507A (en) Multiparameter univariate unitary encryption anti-fake information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103106525A (en) Multiparameter multielement encryption anti-fake information storage trademark
CN103116782A (en) Univariate parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103116792A (en) One-parameter double variant ternary variable circulation encryption anti-fake information storage trademark
CN103116773A (en) Parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106508A (en) Single parameter ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116784A (en) Multi-parameter univariable ternary circulation encryption anti-fake information storage trademark
CN103106501A (en) Multiparameter transmutation multivariable multielement encryption anti-fake information storage trademark
CN103106492A (en) Parameter-gradient multivariable circulating-encryption anti-fake information storage trademark
CN103106510A (en) Multi-parameter multivariant circulating encryption anti-fake information storage brand
CN103116789A (en) One-parameter double variant ternary circulation encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515