CN103106445A - Single parameter multivariable binary encryption anti-counterfeiting information storage trademark - Google Patents

Single parameter multivariable binary encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106445A
CN103106445A CN201310022502XA CN201310022502A CN103106445A CN 103106445 A CN103106445 A CN 103106445A CN 201310022502X A CN201310022502X A CN 201310022502XA CN 201310022502 A CN201310022502 A CN 201310022502A CN 103106445 A CN103106445 A CN 103106445A
Authority
CN
China
Prior art keywords
binary
counterfeiting information
trade mark
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310022502XA
Other languages
Chinese (zh)
Inventor
王明飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022502XA priority Critical patent/CN103106445A/en
Publication of CN103106445A publication Critical patent/CN103106445A/en
Pending legal-status Critical Current

Links

Images

Abstract

A single parameter multivariable binary encryption anti-counterfeiting information storage trademark can enable binary anti-counterfeiting information to be generated into binary modulation signals through binary encryption and channel coding, and enable the anti-counterfeiting information to be embedded into a whole trademark page through ordered changing of conductivity of amplitude modulation dots. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the single parameter multivariable binary encryption anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

One-parameter multivariate binary encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of one-parameter multivariate binary encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as , 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, the eight-digit binary number encryption parameter is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, the eight-digit binary number encryption variables is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 373603DEST_PATH_IMAGE002
Figure 779439DEST_PATH_IMAGE003
Figure 112332DEST_PATH_IMAGE004
Figure 873800DEST_PATH_IMAGE006
Figure 829249DEST_PATH_IMAGE007
Figure 965832DEST_PATH_IMAGE008
Figure 821662DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 752709DEST_PATH_IMAGE002
Figure 195453DEST_PATH_IMAGE003
Figure 870148DEST_PATH_IMAGE004
Figure 948012DEST_PATH_IMAGE006
Figure 878053DEST_PATH_IMAGE007
Figure 921281DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 194131DEST_PATH_IMAGE002
Figure 611468DEST_PATH_IMAGE003
Figure 627965DEST_PATH_IMAGE004
Figure 22223DEST_PATH_IMAGE006
Figure 661277DEST_PATH_IMAGE007
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 901132DEST_PATH_IMAGE002
Figure 39201DEST_PATH_IMAGE003
Figure 397501DEST_PATH_IMAGE004
Figure 33384DEST_PATH_IMAGE007
Figure 946108DEST_PATH_IMAGE008
Figure 945288DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 416589DEST_PATH_IMAGE002
Figure 455215DEST_PATH_IMAGE003
Figure 420897DEST_PATH_IMAGE004
Figure 789430DEST_PATH_IMAGE005
Figure 916786DEST_PATH_IMAGE006
Figure 8818DEST_PATH_IMAGE008
Figure 497437DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 795694DEST_PATH_IMAGE002
Figure 871229DEST_PATH_IMAGE003
Figure 178714DEST_PATH_IMAGE004
Figure 256260DEST_PATH_IMAGE005
Figure 990998DEST_PATH_IMAGE006
Figure 288249DEST_PATH_IMAGE007
Figure 399425DEST_PATH_IMAGE008
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 502696DEST_PATH_IMAGE002
Figure 224926DEST_PATH_IMAGE003
Figure 123481DEST_PATH_IMAGE004
Figure 926352DEST_PATH_IMAGE005
Figure 753625DEST_PATH_IMAGE006
Figure 274736DEST_PATH_IMAGE007
Figure 711402DEST_PATH_IMAGE008
Figure 634359DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 620814DEST_PATH_IMAGE002
Figure 629222DEST_PATH_IMAGE003
Figure 869579DEST_PATH_IMAGE004
Figure 816118DEST_PATH_IMAGE006
Figure 46242DEST_PATH_IMAGE007
Figure 90290DEST_PATH_IMAGE008
Figure 722260DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 62236DEST_PATH_IMAGE002
Figure 627396DEST_PATH_IMAGE004
Figure 113872DEST_PATH_IMAGE005
Figure 890329DEST_PATH_IMAGE006
Figure 95046DEST_PATH_IMAGE007
Figure 480896DEST_PATH_IMAGE008
Figure 821879DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the binary cryptographic calculation is defined as H i=
Figure 769238DEST_PATH_IMAGE010
Figure 461250DEST_PATH_IMAGE002
Figure 385213DEST_PATH_IMAGE010
Figure 846281DEST_PATH_IMAGE003
Figure 276125DEST_PATH_IMAGE011
Figure 940587DEST_PATH_IMAGE004
Figure 418973DEST_PATH_IMAGE012
Figure 249395DEST_PATH_IMAGE005
Figure 522244DEST_PATH_IMAGE013
Figure 64215DEST_PATH_IMAGE006
Figure 267106DEST_PATH_IMAGE007
Figure 710856DEST_PATH_IMAGE015
Figure 114025DEST_PATH_IMAGE008
Figure 867063DEST_PATH_IMAGE017
, during binary operator control variables k=1, the binary cryptographic calculation is defined as H i=
Figure 429631DEST_PATH_IMAGE018
Figure 538664DEST_PATH_IMAGE002
Figure 948916DEST_PATH_IMAGE010
Figure 983737DEST_PATH_IMAGE003
Figure 846651DEST_PATH_IMAGE010
Figure 70959DEST_PATH_IMAGE004
Figure 86451DEST_PATH_IMAGE012
Figure 308485DEST_PATH_IMAGE005
Figure 234164DEST_PATH_IMAGE006
Figure 57949DEST_PATH_IMAGE007
Figure 895455DEST_PATH_IMAGE015
Figure 149981DEST_PATH_IMAGE008
Figure 123753DEST_PATH_IMAGE016
Figure 936857DEST_PATH_IMAGE009
Figure 261659DEST_PATH_IMAGE017
, during binary operator control variables k=2, the binary cryptographic calculation is defined as H i=
Figure 54297DEST_PATH_IMAGE018
Figure 132161DEST_PATH_IMAGE011
Figure 678680DEST_PATH_IMAGE003
Figure 540587DEST_PATH_IMAGE010
Figure 488952DEST_PATH_IMAGE004
Figure 643859DEST_PATH_IMAGE010
Figure 366089DEST_PATH_IMAGE005
Figure 749797DEST_PATH_IMAGE013
Figure 67515DEST_PATH_IMAGE006
Figure 144055DEST_PATH_IMAGE014
Figure 591579DEST_PATH_IMAGE015
Figure 763803DEST_PATH_IMAGE008
Figure 11245DEST_PATH_IMAGE016
Figure 770385DEST_PATH_IMAGE009
Figure 823791DEST_PATH_IMAGE017
, during binary operator control variables k=3, the binary cryptographic calculation is defined as H i=
Figure 601254DEST_PATH_IMAGE018
Figure 498989DEST_PATH_IMAGE011
Figure 44502DEST_PATH_IMAGE003
Figure 676472DEST_PATH_IMAGE012
Figure 514984DEST_PATH_IMAGE004
Figure 497983DEST_PATH_IMAGE010
Figure 68084DEST_PATH_IMAGE010
Figure 343077DEST_PATH_IMAGE006
Figure 236208DEST_PATH_IMAGE014
Figure 107213DEST_PATH_IMAGE007
Figure 963042DEST_PATH_IMAGE015
Figure 159668DEST_PATH_IMAGE008
Figure 838299DEST_PATH_IMAGE016
Figure 840890DEST_PATH_IMAGE009
Figure 301958DEST_PATH_IMAGE017
, during binary operator control variables k=4, the binary cryptographic calculation is defined as H i=
Figure 653174DEST_PATH_IMAGE018
Figure 11003DEST_PATH_IMAGE011
Figure 575845DEST_PATH_IMAGE003
Figure 176591DEST_PATH_IMAGE012
Figure 610425DEST_PATH_IMAGE013
Figure 46086DEST_PATH_IMAGE005
Figure 739104DEST_PATH_IMAGE010
Figure 893005DEST_PATH_IMAGE006
Figure 463926DEST_PATH_IMAGE010
Figure 754093DEST_PATH_IMAGE007
Figure 618013DEST_PATH_IMAGE015
Figure 993630DEST_PATH_IMAGE008
Figure 368242DEST_PATH_IMAGE016
Figure 813316DEST_PATH_IMAGE017
, during binary operator control variables k=5, the binary cryptographic calculation is defined as H i=
Figure 676230DEST_PATH_IMAGE018
Figure 588953DEST_PATH_IMAGE002
Figure 853712DEST_PATH_IMAGE011
Figure 98060DEST_PATH_IMAGE012
Figure 63742DEST_PATH_IMAGE004
Figure 432275DEST_PATH_IMAGE013
Figure 104193DEST_PATH_IMAGE006
Figure 77965DEST_PATH_IMAGE010
Figure 451757DEST_PATH_IMAGE010
Figure 102367DEST_PATH_IMAGE016
Figure 576119DEST_PATH_IMAGE009
Figure 122638DEST_PATH_IMAGE017
, during binary operator control variables k=6, the binary cryptographic calculation is defined as H i=
Figure 217502DEST_PATH_IMAGE018
Figure 165866DEST_PATH_IMAGE002
Figure 822238DEST_PATH_IMAGE011
Figure 856053DEST_PATH_IMAGE003
Figure 754607DEST_PATH_IMAGE012
Figure 823058DEST_PATH_IMAGE004
Figure 650330DEST_PATH_IMAGE013
Figure 545791DEST_PATH_IMAGE014
Figure 219480DEST_PATH_IMAGE006
Figure 466922DEST_PATH_IMAGE015
Figure 99765DEST_PATH_IMAGE007
Figure 277805DEST_PATH_IMAGE010
Figure 55268DEST_PATH_IMAGE008
Figure 224344DEST_PATH_IMAGE010
Figure 720047DEST_PATH_IMAGE009
Figure 498516DEST_PATH_IMAGE017
, during binary operator control variables k=7, the binary cryptographic calculation is defined as H i=
Figure 396065DEST_PATH_IMAGE018
Figure 787677DEST_PATH_IMAGE012
Figure 298555DEST_PATH_IMAGE004
Figure 503272DEST_PATH_IMAGE013
Figure 558001DEST_PATH_IMAGE014
Figure 489048DEST_PATH_IMAGE006
Figure 931793DEST_PATH_IMAGE015
Figure 872067DEST_PATH_IMAGE007
Figure 582403DEST_PATH_IMAGE016
Figure 684351DEST_PATH_IMAGE008
Figure 614392DEST_PATH_IMAGE010
Figure 92778DEST_PATH_IMAGE009
Figure 657621DEST_PATH_IMAGE010
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 196049DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 285490DEST_PATH_IMAGE019
Carry out H 1=
Figure 816835DEST_PATH_IMAGE020
Figure 986916DEST_PATH_IMAGE002
Figure 446978DEST_PATH_IMAGE020
Figure 335300DEST_PATH_IMAGE003
Figure 404756DEST_PATH_IMAGE011
Figure 314168DEST_PATH_IMAGE012
Figure 689786DEST_PATH_IMAGE005
Figure 562933DEST_PATH_IMAGE013
Figure 509471DEST_PATH_IMAGE014
Figure 372385DEST_PATH_IMAGE007
Figure 783644DEST_PATH_IMAGE015
Figure 48403DEST_PATH_IMAGE008
Figure 67175DEST_PATH_IMAGE016
Figure 168117DEST_PATH_IMAGE009
Figure 133799DEST_PATH_IMAGE017
Binary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 502332DEST_PATH_IMAGE019
Carry out H 1=
Figure 895267DEST_PATH_IMAGE020
Figure 721720DEST_PATH_IMAGE020
Figure 210339DEST_PATH_IMAGE003
Figure 774176DEST_PATH_IMAGE011
Figure 521814DEST_PATH_IMAGE004
Figure 78566DEST_PATH_IMAGE012
Figure 172424DEST_PATH_IMAGE005
Figure 299277DEST_PATH_IMAGE014
Figure 247642DEST_PATH_IMAGE007
Figure 904013DEST_PATH_IMAGE015
Figure 124779DEST_PATH_IMAGE008
Figure 774066DEST_PATH_IMAGE016
Figure 327670DEST_PATH_IMAGE009
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cryptographic calculation, make next binary cryptographic calculation point to H 2=
Figure 174589DEST_PATH_IMAGE018
Figure 627567DEST_PATH_IMAGE002
Figure 347261DEST_PATH_IMAGE021
Figure 178061DEST_PATH_IMAGE021
Figure 418419DEST_PATH_IMAGE004
Figure 195882DEST_PATH_IMAGE012
Figure 364957DEST_PATH_IMAGE005
Figure 639130DEST_PATH_IMAGE006
Figure 271099DEST_PATH_IMAGE014
Figure 876655DEST_PATH_IMAGE007
Figure 344808DEST_PATH_IMAGE015
Figure 926968DEST_PATH_IMAGE008
Figure 679023DEST_PATH_IMAGE016
Figure 127584DEST_PATH_IMAGE009
Figure 269984DEST_PATH_IMAGE017
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 157300DEST_PATH_IMAGE022
Carry out H 2=
Figure 763861DEST_PATH_IMAGE018
Figure 944176DEST_PATH_IMAGE002
Figure 324604DEST_PATH_IMAGE021
Figure 999299DEST_PATH_IMAGE003
Figure 709635DEST_PATH_IMAGE021
Figure 77162DEST_PATH_IMAGE004
Figure 120118DEST_PATH_IMAGE012
Figure 332925DEST_PATH_IMAGE005
Figure 664811DEST_PATH_IMAGE013
Figure 937661DEST_PATH_IMAGE006
Figure 479632DEST_PATH_IMAGE014
Figure 496129DEST_PATH_IMAGE007
Figure 280174DEST_PATH_IMAGE016
Figure 100362DEST_PATH_IMAGE009
Figure 639797DEST_PATH_IMAGE017
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cryptographic calculation, make next binary cryptographic calculation point to H 3=
Figure 520028DEST_PATH_IMAGE018
Figure 646378DEST_PATH_IMAGE002
Figure 477248DEST_PATH_IMAGE003
Figure 777648DEST_PATH_IMAGE023
Figure 640562DEST_PATH_IMAGE004
Figure 553286DEST_PATH_IMAGE023
Figure 739416DEST_PATH_IMAGE005
Figure 961450DEST_PATH_IMAGE013
Figure 62393DEST_PATH_IMAGE006
Figure 28075DEST_PATH_IMAGE014
Figure 396608DEST_PATH_IMAGE007
Figure 523964DEST_PATH_IMAGE015
Figure 61604DEST_PATH_IMAGE008
Figure 814665DEST_PATH_IMAGE016
Figure 54017DEST_PATH_IMAGE009
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this binary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 427809DEST_PATH_IMAGE001
carry out the binary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the binary cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h, r and p is encryption, the initial value design of binary operator control variables k is k=0, known by the binary ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 984561DEST_PATH_IMAGE010
Figure 298310DEST_PATH_IMAGE010
Figure 720195DEST_PATH_IMAGE003
Figure 582103DEST_PATH_IMAGE011
Figure 530467DEST_PATH_IMAGE004
Figure 685374DEST_PATH_IMAGE012
Figure 719189DEST_PATH_IMAGE005
Figure 119209DEST_PATH_IMAGE013
Figure 922080DEST_PATH_IMAGE006
Figure 768999DEST_PATH_IMAGE007
Figure 707130DEST_PATH_IMAGE015
Figure 630087DEST_PATH_IMAGE008
Figure 126796DEST_PATH_IMAGE016
Figure 135203DEST_PATH_IMAGE009
Figure 877025DEST_PATH_IMAGE017
, during binary operator control variables k=1, decrypt operation is M i=
Figure 322099DEST_PATH_IMAGE002
Figure 148335DEST_PATH_IMAGE003
Figure 531037DEST_PATH_IMAGE010
Figure 120281DEST_PATH_IMAGE004
Figure 352548DEST_PATH_IMAGE012
Figure 685440DEST_PATH_IMAGE005
Figure 922649DEST_PATH_IMAGE013
Figure 948374DEST_PATH_IMAGE006
Figure 402358DEST_PATH_IMAGE014
Figure 630656DEST_PATH_IMAGE015
Figure 764965DEST_PATH_IMAGE008
Figure 456978DEST_PATH_IMAGE016
Figure 882405DEST_PATH_IMAGE009
Figure 343473DEST_PATH_IMAGE017
, during binary operator control variables k=2, decrypt operation is M i=
Figure 960268DEST_PATH_IMAGE018
Figure 873998DEST_PATH_IMAGE002
Figure 206387DEST_PATH_IMAGE010
Figure 872992DEST_PATH_IMAGE004
Figure 951806DEST_PATH_IMAGE010
Figure 138199DEST_PATH_IMAGE005
Figure 581950DEST_PATH_IMAGE013
Figure 922802DEST_PATH_IMAGE006
Figure 505441DEST_PATH_IMAGE014
Figure 795608DEST_PATH_IMAGE007
Figure 925107DEST_PATH_IMAGE015
Figure 300725DEST_PATH_IMAGE008
Figure 721342DEST_PATH_IMAGE016
Figure 882327DEST_PATH_IMAGE009
Figure 667880DEST_PATH_IMAGE017
, during binary operator control variables k=3, decrypt operation is M i=
Figure 780062DEST_PATH_IMAGE018
Figure 942053DEST_PATH_IMAGE002
Figure 957545DEST_PATH_IMAGE011
Figure 179578DEST_PATH_IMAGE003
Figure 716739DEST_PATH_IMAGE012
Figure 167574DEST_PATH_IMAGE004
Figure 286840DEST_PATH_IMAGE010
Figure 929043DEST_PATH_IMAGE005
Figure 807951DEST_PATH_IMAGE007
Figure 132753DEST_PATH_IMAGE015
Figure 19249DEST_PATH_IMAGE016
Figure 3254DEST_PATH_IMAGE009
Figure 549773DEST_PATH_IMAGE017
, during binary operator control variables k=4, decrypt operation is M i=
Figure 411681DEST_PATH_IMAGE018
Figure 360046DEST_PATH_IMAGE002
Figure 514952DEST_PATH_IMAGE011
Figure 237183DEST_PATH_IMAGE003
Figure 620891DEST_PATH_IMAGE012
Figure 751658DEST_PATH_IMAGE004
Figure 77466DEST_PATH_IMAGE013
Figure 598577DEST_PATH_IMAGE005
Figure 524990DEST_PATH_IMAGE010
Figure 447946DEST_PATH_IMAGE006
Figure 944656DEST_PATH_IMAGE010
Figure 953063DEST_PATH_IMAGE007
Figure 694885DEST_PATH_IMAGE015
Figure 472348DEST_PATH_IMAGE008
Figure 139959DEST_PATH_IMAGE016
Figure 370083DEST_PATH_IMAGE009
, during binary operator control variables k=5, decrypt operation is M i=
Figure 609883DEST_PATH_IMAGE018
Figure 199127DEST_PATH_IMAGE002
Figure 390385DEST_PATH_IMAGE003
Figure 126129DEST_PATH_IMAGE012
Figure 647185DEST_PATH_IMAGE014
Figure 93079DEST_PATH_IMAGE006
Figure 647075DEST_PATH_IMAGE010
Figure 360002DEST_PATH_IMAGE010
Figure 461951DEST_PATH_IMAGE008
Figure 882096DEST_PATH_IMAGE009
Figure 446939DEST_PATH_IMAGE017
, during binary operator control variables k=6, decrypt operation is M i=
Figure 985367DEST_PATH_IMAGE018
Figure 389323DEST_PATH_IMAGE002
Figure 671399DEST_PATH_IMAGE011
Figure 356327DEST_PATH_IMAGE003
Figure 488494DEST_PATH_IMAGE012
Figure 642395DEST_PATH_IMAGE004
Figure 524900DEST_PATH_IMAGE013
Figure 64335DEST_PATH_IMAGE005
Figure 805337DEST_PATH_IMAGE006
Figure 616167DEST_PATH_IMAGE015
Figure 760840DEST_PATH_IMAGE007
Figure 425619DEST_PATH_IMAGE008
Figure 836878DEST_PATH_IMAGE010
Figure 101637DEST_PATH_IMAGE009
Figure 62685DEST_PATH_IMAGE017
, during binary operator control variables k=7, decrypt operation is M i=
Figure 147315DEST_PATH_IMAGE018
Figure 362265DEST_PATH_IMAGE002
Figure 481531DEST_PATH_IMAGE011
Figure 625198DEST_PATH_IMAGE003
Figure 462704DEST_PATH_IMAGE012
Figure 215765DEST_PATH_IMAGE004
Figure 251855DEST_PATH_IMAGE013
Figure 625646DEST_PATH_IMAGE014
Figure 933131DEST_PATH_IMAGE006
Figure 10994DEST_PATH_IMAGE007
Figure 153842DEST_PATH_IMAGE008
Figure 351474DEST_PATH_IMAGE010
Figure 257113DEST_PATH_IMAGE009
Figure 41661DEST_PATH_IMAGE010
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 690948DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 8666DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 85206DEST_PATH_IMAGE019
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 91470DEST_PATH_IMAGE001
carry out the binary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 544448DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the one-parameter multivariate binary encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 96966DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, the eight-digit binary number encryption parameter is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, the eight-digit binary number encryption variables is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 951789DEST_PATH_IMAGE002
Figure 918477DEST_PATH_IMAGE003
Figure 251370DEST_PATH_IMAGE004
Figure 754157DEST_PATH_IMAGE005
Figure 399848DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 272175DEST_PATH_IMAGE003
Figure 17091DEST_PATH_IMAGE007
Figure 918313DEST_PATH_IMAGE008
Figure 561784DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 834633DEST_PATH_IMAGE002
Figure 750506DEST_PATH_IMAGE003
Figure 837958DEST_PATH_IMAGE006
Figure 726280DEST_PATH_IMAGE007
Figure 297201DEST_PATH_IMAGE008
Figure 587368DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 716867DEST_PATH_IMAGE002
Figure 92484DEST_PATH_IMAGE003
Figure 611770DEST_PATH_IMAGE005
Figure 775084DEST_PATH_IMAGE007
Figure 687807DEST_PATH_IMAGE008
Figure 686987DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 158289DEST_PATH_IMAGE002
Figure 196914DEST_PATH_IMAGE003
Figure 287230DEST_PATH_IMAGE004
Figure 468812DEST_PATH_IMAGE005
Figure 346901DEST_PATH_IMAGE006
Figure 184407DEST_PATH_IMAGE007
Figure 937468DEST_PATH_IMAGE008
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 225809DEST_PATH_IMAGE002
Figure 737562DEST_PATH_IMAGE003
Figure 624058DEST_PATH_IMAGE005
Figure 358796DEST_PATH_IMAGE006
Figure 154582DEST_PATH_IMAGE007
Figure 965892DEST_PATH_IMAGE008
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 69163DEST_PATH_IMAGE002
Figure 102978DEST_PATH_IMAGE003
Figure 440681DEST_PATH_IMAGE004
Figure 631677DEST_PATH_IMAGE006
Figure 13876DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 510585DEST_PATH_IMAGE002
Figure 518992DEST_PATH_IMAGE003
Figure 38278DEST_PATH_IMAGE005
Figure 936012DEST_PATH_IMAGE007
Figure 481525DEST_PATH_IMAGE008
Figure 113495DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 952007DEST_PATH_IMAGE002
Figure 18631DEST_PATH_IMAGE004
Figure 505107DEST_PATH_IMAGE005
Figure 780100DEST_PATH_IMAGE006
Figure 872132DEST_PATH_IMAGE008
Figure 213114DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the binary cryptographic calculation is defined as H i=
Figure 659008DEST_PATH_IMAGE010
Figure 351021DEST_PATH_IMAGE002
Figure 714131DEST_PATH_IMAGE010
Figure 854311DEST_PATH_IMAGE011
Figure 923123DEST_PATH_IMAGE012
Figure 753545DEST_PATH_IMAGE005
Figure 460229DEST_PATH_IMAGE014
Figure 521988DEST_PATH_IMAGE007
Figure 965739DEST_PATH_IMAGE015
Figure 368908DEST_PATH_IMAGE008
Figure 229995DEST_PATH_IMAGE009
Figure 201310022502X100001DEST_PATH_IMAGE017
, during binary operator control variables k=1, the binary cryptographic calculation is defined as H i=
Figure 201310022502X100001DEST_PATH_IMAGE018
Figure 923276DEST_PATH_IMAGE002
Figure 298894DEST_PATH_IMAGE010
Figure 906461DEST_PATH_IMAGE003
Figure 316714DEST_PATH_IMAGE010
Figure 853000DEST_PATH_IMAGE004
Figure 715914DEST_PATH_IMAGE012
Figure 454249DEST_PATH_IMAGE013
Figure 676283DEST_PATH_IMAGE006
Figure 777225DEST_PATH_IMAGE014
Figure 477328DEST_PATH_IMAGE007
Figure 845861DEST_PATH_IMAGE015
Figure 938930DEST_PATH_IMAGE008
Figure 776436DEST_PATH_IMAGE016
Figure 529498DEST_PATH_IMAGE009
Figure 503270DEST_PATH_IMAGE017
, during binary operator control variables k=2, the binary cryptographic calculation is defined as H i=
Figure 817839DEST_PATH_IMAGE018
Figure 204958DEST_PATH_IMAGE002
Figure 527672DEST_PATH_IMAGE003
Figure 13142DEST_PATH_IMAGE010
Figure 559661DEST_PATH_IMAGE004
Figure 920104DEST_PATH_IMAGE010
Figure 868468DEST_PATH_IMAGE005
Figure 524840DEST_PATH_IMAGE013
Figure 558655DEST_PATH_IMAGE006
Figure 191631DEST_PATH_IMAGE014
Figure 260081DEST_PATH_IMAGE007
Figure 87354DEST_PATH_IMAGE015
Figure 608465DEST_PATH_IMAGE008
Figure 45131DEST_PATH_IMAGE016
Figure 968088DEST_PATH_IMAGE009
Figure 966262DEST_PATH_IMAGE017
, during binary operator control variables k=3, the binary cryptographic calculation is defined as H i=
Figure 974669DEST_PATH_IMAGE018
Figure 215027DEST_PATH_IMAGE002
Figure 992490DEST_PATH_IMAGE011
Figure 161565DEST_PATH_IMAGE003
Figure 391689DEST_PATH_IMAGE012
Figure 435738DEST_PATH_IMAGE004
Figure 67707DEST_PATH_IMAGE010
Figure 390683DEST_PATH_IMAGE010
Figure 972843DEST_PATH_IMAGE006
Figure 459320DEST_PATH_IMAGE014
Figure 224058DEST_PATH_IMAGE007
Figure 428774DEST_PATH_IMAGE015
Figure 549046DEST_PATH_IMAGE008
Figure 155608DEST_PATH_IMAGE016
Figure 217815DEST_PATH_IMAGE017
, during binary operator control variables k=4, the binary cryptographic calculation is defined as H i=
Figure 158089DEST_PATH_IMAGE018
Figure 369890DEST_PATH_IMAGE002
Figure 900415DEST_PATH_IMAGE003
Figure 378800DEST_PATH_IMAGE012
Figure 983536DEST_PATH_IMAGE013
Figure 546050DEST_PATH_IMAGE010
Figure 949218DEST_PATH_IMAGE007
Figure 831724DEST_PATH_IMAGE015
Figure 121891DEST_PATH_IMAGE008
Figure 487275DEST_PATH_IMAGE016
Figure 736040DEST_PATH_IMAGE017
, during binary operator control variables k=5, the binary cryptographic calculation is defined as H i=
Figure 880713DEST_PATH_IMAGE018
Figure 694297DEST_PATH_IMAGE002
Figure 557211DEST_PATH_IMAGE011
Figure 968470DEST_PATH_IMAGE003
Figure 233229DEST_PATH_IMAGE012
Figure 205995DEST_PATH_IMAGE004
Figure 290626DEST_PATH_IMAGE013
Figure 505575DEST_PATH_IMAGE005
Figure 624841DEST_PATH_IMAGE014
Figure 768509DEST_PATH_IMAGE006
Figure 606015DEST_PATH_IMAGE010
Figure 332848DEST_PATH_IMAGE010
Figure 647417DEST_PATH_IMAGE008
Figure 263392DEST_PATH_IMAGE009
Figure 357250DEST_PATH_IMAGE017
, during binary operator control variables k=6, the binary cryptographic calculation is defined as H i=
Figure 593453DEST_PATH_IMAGE018
Figure 139972DEST_PATH_IMAGE002
Figure 234836DEST_PATH_IMAGE011
Figure 245517DEST_PATH_IMAGE003
Figure 935704DEST_PATH_IMAGE004
Figure 902708DEST_PATH_IMAGE005
Figure 531312DEST_PATH_IMAGE014
Figure 786844DEST_PATH_IMAGE006
Figure 678970DEST_PATH_IMAGE015
Figure 664243DEST_PATH_IMAGE007
Figure 160953DEST_PATH_IMAGE010
Figure 645603DEST_PATH_IMAGE010
Figure 423066DEST_PATH_IMAGE009
Figure 90677DEST_PATH_IMAGE017
, during binary operator control variables k=7, the binary cryptographic calculation is defined as H i=
Figure 586380DEST_PATH_IMAGE018
Figure 866314DEST_PATH_IMAGE002
Figure 763863DEST_PATH_IMAGE011
Figure 602375DEST_PATH_IMAGE003
Figure 319795DEST_PATH_IMAGE012
Figure 977938DEST_PATH_IMAGE005
Figure 568505DEST_PATH_IMAGE006
Figure 925799DEST_PATH_IMAGE015
Figure 856846DEST_PATH_IMAGE007
Figure 798126DEST_PATH_IMAGE016
Figure 738400DEST_PATH_IMAGE008
Figure 950201DEST_PATH_IMAGE010
Figure 239100DEST_PATH_IMAGE009
Figure 418408DEST_PATH_IMAGE010
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 659245DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 201310022502X100001DEST_PATH_IMAGE019
Carry out H 1=
Figure 201310022502X100001DEST_PATH_IMAGE020
Figure 161771DEST_PATH_IMAGE002
Figure 851958DEST_PATH_IMAGE003
Figure 134034DEST_PATH_IMAGE011
Figure 553383DEST_PATH_IMAGE004
Figure 262713DEST_PATH_IMAGE012
Figure 901767DEST_PATH_IMAGE005
Figure 721956DEST_PATH_IMAGE013
Figure 261390DEST_PATH_IMAGE006
Figure 141622DEST_PATH_IMAGE014
Figure 267972DEST_PATH_IMAGE007
Figure 285792DEST_PATH_IMAGE008
Figure 336925DEST_PATH_IMAGE016
Figure 262156DEST_PATH_IMAGE009
Figure 174879DEST_PATH_IMAGE017
Binary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 439638DEST_PATH_IMAGE019
Carry out H 1=
Figure 645361DEST_PATH_IMAGE020
Figure 995570DEST_PATH_IMAGE002
Figure 711985DEST_PATH_IMAGE020
Figure 473453DEST_PATH_IMAGE011
Figure 45380DEST_PATH_IMAGE004
Figure 289990DEST_PATH_IMAGE005
Figure 224634DEST_PATH_IMAGE006
Figure 146498DEST_PATH_IMAGE014
Figure 489624DEST_PATH_IMAGE007
Figure 224362DEST_PATH_IMAGE015
Figure 521613DEST_PATH_IMAGE008
Figure 554160DEST_PATH_IMAGE016
Figure 502525DEST_PATH_IMAGE009
Figure 158896DEST_PATH_IMAGE017
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cryptographic calculation, make next binary cryptographic calculation point to H 2=
Figure 192711DEST_PATH_IMAGE018
Figure 468097DEST_PATH_IMAGE002
Figure 201310022502X100001DEST_PATH_IMAGE021
Figure 457919DEST_PATH_IMAGE003
Figure 534459DEST_PATH_IMAGE021
Figure 743986DEST_PATH_IMAGE004
Figure 729707DEST_PATH_IMAGE005
Figure 226417DEST_PATH_IMAGE013
Figure 923240DEST_PATH_IMAGE006
Figure 914329DEST_PATH_IMAGE014
Figure 754109DEST_PATH_IMAGE007
Figure 997220DEST_PATH_IMAGE015
Figure 368290DEST_PATH_IMAGE008
Figure 897491DEST_PATH_IMAGE016
Figure 778729DEST_PATH_IMAGE009
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 201310022502X100001DEST_PATH_IMAGE022
Carry out H 2=
Figure 559231DEST_PATH_IMAGE002
Figure 62019DEST_PATH_IMAGE021
Figure 822164DEST_PATH_IMAGE003
Figure 213831DEST_PATH_IMAGE021
Figure 101147DEST_PATH_IMAGE004
Figure 707709DEST_PATH_IMAGE012
Figure 514122DEST_PATH_IMAGE005
Figure 206135DEST_PATH_IMAGE013
Figure 653482DEST_PATH_IMAGE014
Figure 21010DEST_PATH_IMAGE007
Figure 951051DEST_PATH_IMAGE015
Figure 163857DEST_PATH_IMAGE008
Figure 994279DEST_PATH_IMAGE016
Figure 267129DEST_PATH_IMAGE009
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cryptographic calculation, make next binary cryptographic calculation point to H 3=
Figure 700963DEST_PATH_IMAGE018
Figure 385891DEST_PATH_IMAGE002
Figure 157538DEST_PATH_IMAGE011
Figure 45860DEST_PATH_IMAGE003
Figure 201310022502X100001DEST_PATH_IMAGE023
Figure 542745DEST_PATH_IMAGE004
Figure 19863DEST_PATH_IMAGE023
Figure 26444DEST_PATH_IMAGE013
Figure 732680DEST_PATH_IMAGE014
Figure 783813DEST_PATH_IMAGE007
Figure 57985DEST_PATH_IMAGE008
Figure 119482DEST_PATH_IMAGE016
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this binary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 657408DEST_PATH_IMAGE001
Carry out the binary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022502XA 2013-01-22 2013-01-22 Single parameter multivariable binary encryption anti-counterfeiting information storage trademark Pending CN103106445A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022502XA CN103106445A (en) 2013-01-22 2013-01-22 Single parameter multivariable binary encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022502XA CN103106445A (en) 2013-01-22 2013-01-22 Single parameter multivariable binary encryption anti-counterfeiting information storage trademark

Publications (1)

Publication Number Publication Date
CN103106445A true CN103106445A (en) 2013-05-15

Family

ID=48314291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022502XA Pending CN103106445A (en) 2013-01-22 2013-01-22 Single parameter multivariable binary encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103106445A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国,裴定一: "《密码学导引》", 30 April 1999, article "AES候选算法简介", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106430A (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103106445A (en) Single parameter multivariable binary encryption anti-counterfeiting information storage trademark
CN103106433A (en) Single parameter multivariable multiple-encryption anti-counterfeiting information storage trademark
CN103106469A (en) Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark
CN103106486A (en) Single parameter multivariable ternary circulation encryption anti-counterfeiting information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103106489A (en) Single parameter ternary encryption anti-counterfeiting information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106471A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103116795A (en) One-parameter multivariate ternary encryption anti-fake information storage trademark
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103116785A (en) Multi-parameter multivariable unitary circulation encryption anti-fake information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106487A (en) Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106491A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103116778A (en) One-parameter multivariate binary variable circulation encryption anti-fake information storage trademark
CN103116777A (en) One-parameter multivariate multivariable circulation encryption anti-fake information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103106508A (en) Single parameter ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark
CN103116799A (en) Multi-parameter multivariable multivariate circulation encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515