CN103106447A - Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark - Google Patents

Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106447A
CN103106447A CN2013100231196A CN201310023119A CN103106447A CN 103106447 A CN103106447 A CN 103106447A CN 2013100231196 A CN2013100231196 A CN 2013100231196A CN 201310023119 A CN201310023119 A CN 201310023119A CN 103106447 A CN103106447 A CN 103106447A
Authority
CN
China
Prior art keywords
binary
binary system
counterfeiting information
group
trade mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100231196A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100231196A priority Critical patent/CN103106447A/en
Publication of CN103106447A publication Critical patent/CN103106447A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

A single parameter binary variable circulation encryption anti-counterfeiting information storage trademark can enable binary anti-counterfeiting information to be generated into binary modulation signals through binary variable circulation and channel coding, and enable the anti-counterfeiting information to be embedded into a whole trademark page through ordered changing of conductivity of amplitude modulation dots in a circulation table look-up method mode. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the single parameter binary variable circulation encryption anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

One-parameter binary-encryption variable circulation encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of One-parameter binary-encryption variable circulation encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100231196100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, binary system encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, binary system encryption variables are denoted as q, j, d, e, f, g, h, r and p, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100231196100002DEST_PATH_IMAGE002
Figure 2013100231196100002DEST_PATH_IMAGE003
Figure 2013100231196100002DEST_PATH_IMAGE005
Figure 2013100231196100002DEST_PATH_IMAGE006
Figure 2013100231196100002DEST_PATH_IMAGE007
Figure 2013100231196100002DEST_PATH_IMAGE008
Figure 2013100231196100002DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 189897DEST_PATH_IMAGE002
Figure 522789DEST_PATH_IMAGE003
Figure 274845DEST_PATH_IMAGE004
Figure 34990DEST_PATH_IMAGE005
Figure 239707DEST_PATH_IMAGE006
Figure 438607DEST_PATH_IMAGE007
Figure 45169DEST_PATH_IMAGE008
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 668228DEST_PATH_IMAGE002
Figure 608502DEST_PATH_IMAGE003
Figure 165659DEST_PATH_IMAGE005
Figure 344968DEST_PATH_IMAGE006
Figure 885671DEST_PATH_IMAGE007
Figure 201245DEST_PATH_IMAGE008
Figure 739674DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 592858DEST_PATH_IMAGE004
Figure 302188DEST_PATH_IMAGE005
Figure 190509DEST_PATH_IMAGE006
Figure 300865DEST_PATH_IMAGE008
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 556714DEST_PATH_IMAGE002
Figure 180593DEST_PATH_IMAGE003
Figure 325267DEST_PATH_IMAGE004
Figure 370540DEST_PATH_IMAGE005
Figure 233454DEST_PATH_IMAGE006
Figure 660204DEST_PATH_IMAGE008
Figure 616659DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 966869DEST_PATH_IMAGE002
Figure 51816DEST_PATH_IMAGE004
Figure 16678DEST_PATH_IMAGE006
Figure 759824DEST_PATH_IMAGE008
Figure 323660DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 382883DEST_PATH_IMAGE002
Figure 784225DEST_PATH_IMAGE004
Figure 513104DEST_PATH_IMAGE005
Figure 59623DEST_PATH_IMAGE006
Figure 905219DEST_PATH_IMAGE007
Figure 759223DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 793038DEST_PATH_IMAGE002
Figure 442325DEST_PATH_IMAGE003
Figure 245196DEST_PATH_IMAGE004
Figure 842847DEST_PATH_IMAGE006
Figure 295825DEST_PATH_IMAGE007
Figure 953203DEST_PATH_IMAGE008
Figure 200645DEST_PATH_IMAGE009
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 200142DEST_PATH_IMAGE003
Figure 977605DEST_PATH_IMAGE004
Figure 226026DEST_PATH_IMAGE005
Figure 721729DEST_PATH_IMAGE006
Figure 250931DEST_PATH_IMAGE007
Figure 882900DEST_PATH_IMAGE008
Figure 737724DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100231196100002DEST_PATH_IMAGE010
Figure 392827DEST_PATH_IMAGE002
C
Figure 725720DEST_PATH_IMAGE003
C
Figure 175604DEST_PATH_IMAGE005
C
Figure 380320DEST_PATH_IMAGE006
CCC
Figure 54512DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=C
Figure 415360DEST_PATH_IMAGE011
Figure 876429DEST_PATH_IMAGE003
C
Figure 243956DEST_PATH_IMAGE004
Figure 2013100231196100002DEST_PATH_IMAGE012
Figure 360948DEST_PATH_IMAGE005
CC
Figure 154908DEST_PATH_IMAGE007
C
Figure 427758DEST_PATH_IMAGE008
C
Figure 94363DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=C
Figure 110860DEST_PATH_IMAGE002
C
Figure 546521DEST_PATH_IMAGE003
Figure 144172DEST_PATH_IMAGE004
C
Figure 964361DEST_PATH_IMAGE005
Figure 2013100231196100002DEST_PATH_IMAGE013
Figure 192211DEST_PATH_IMAGE006
C
Figure 66583DEST_PATH_IMAGE007
C
Figure 442200DEST_PATH_IMAGE008
CC, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=C
Figure 210753DEST_PATH_IMAGE002
C
Figure 261886DEST_PATH_IMAGE003
C
Figure 187117DEST_PATH_IMAGE004
Figure 349108DEST_PATH_IMAGE013
Figure 348288DEST_PATH_IMAGE005
C
Figure 570322DEST_PATH_IMAGE006
Figure 2013100231196100002DEST_PATH_IMAGE014
Figure 858215DEST_PATH_IMAGE007
C
Figure 823897DEST_PATH_IMAGE008
C
Figure 943162DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=CCC
Figure 474135DEST_PATH_IMAGE004
C
Figure 713486DEST_PATH_IMAGE005
C
Figure 638171DEST_PATH_IMAGE007
Figure 2013100231196100002DEST_PATH_IMAGE015
Figure 466450DEST_PATH_IMAGE008
C
Figure 201187DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=C
Figure 747706DEST_PATH_IMAGE002
C
Figure 858882DEST_PATH_IMAGE003
C
Figure 807246DEST_PATH_IMAGE004
C
Figure 712885DEST_PATH_IMAGE005
C
Figure 746701DEST_PATH_IMAGE006
Figure 458305DEST_PATH_IMAGE015
Figure 261176DEST_PATH_IMAGE007
C
Figure 858827DEST_PATH_IMAGE016
Figure 46226DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=C
Figure 969183DEST_PATH_IMAGE002
C
Figure 216624DEST_PATH_IMAGE003
C
Figure 225032DEST_PATH_IMAGE004
C
Figure 278438DEST_PATH_IMAGE005
C
Figure 73480DEST_PATH_IMAGE006
C
Figure 491823DEST_PATH_IMAGE007
Figure 721947DEST_PATH_IMAGE016
Figure 516727DEST_PATH_IMAGE008
C
Figure 148697DEST_PATH_IMAGE009
Figure 2013100231196100002DEST_PATH_IMAGE017
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 2013100231196100002DEST_PATH_IMAGE019
Figure 613308DEST_PATH_IMAGE002
C
Figure 658624DEST_PATH_IMAGE003
C
Figure 991516DEST_PATH_IMAGE004
C
Figure 477992DEST_PATH_IMAGE005
C
Figure 503717DEST_PATH_IMAGE006
CC
Figure 845017DEST_PATH_IMAGE008
Figure 382626DEST_PATH_IMAGE009
C, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 743474DEST_PATH_IMAGE020
Carry out H1=
Figure 2013100231196100002DEST_PATH_IMAGE021
C
Figure 572070DEST_PATH_IMAGE003
Figure 2013100231196100002DEST_PATH_IMAGE023
Figure 423482DEST_PATH_IMAGE004
C
Figure 901868DEST_PATH_IMAGE005
C
Figure 483022DEST_PATH_IMAGE006
CCC
Figure 501291DEST_PATH_IMAGE009
C binary variable circulation cryptographic calculations(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 936951DEST_PATH_IMAGE020
Carry out H1=
Figure 380702DEST_PATH_IMAGE021
Figure 534603DEST_PATH_IMAGE002
C
Figure 354791DEST_PATH_IMAGE003
Figure 644958DEST_PATH_IMAGE023
Figure 525190DEST_PATH_IMAGE004
C
Figure 900807DEST_PATH_IMAGE005
C
Figure 253248DEST_PATH_IMAGE006
CC
Figure 511371DEST_PATH_IMAGE008
C
Figure 374285DEST_PATH_IMAGE009
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while C binary variable circulation cryptographic calculations, next binary variable circulation cryptographic calculation is pointed to H2=C
Figure 536276DEST_PATH_IMAGE002
Figure 801035DEST_PATH_IMAGE024
Figure 23069DEST_PATH_IMAGE003
C
Figure 73382DEST_PATH_IMAGE026
Figure 254964DEST_PATH_IMAGE005
CC
Figure 485406DEST_PATH_IMAGE007
C
Figure 989199DEST_PATH_IMAGE008
C
Figure 962971DEST_PATH_IMAGE009
C(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100231196100002DEST_PATH_IMAGE027
Carry out H2=C
Figure 464491DEST_PATH_IMAGE002
Figure 789293DEST_PATH_IMAGE024
Figure 831198DEST_PATH_IMAGE003
C
Figure 919197DEST_PATH_IMAGE004
Figure 653935DEST_PATH_IMAGE026
Figure 200454DEST_PATH_IMAGE005
C
Figure 373946DEST_PATH_IMAGE006
C
Figure 322311DEST_PATH_IMAGE007
C
Figure 227950DEST_PATH_IMAGE008
C
Figure 261765DEST_PATH_IMAGE009
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while C binary variable circulation cryptographic calculations, next binary variable circulation cryptographic calculation is pointed to H3= CC
Figure 790463DEST_PATH_IMAGE028
Figure 373891DEST_PATH_IMAGE004
C
Figure 561290DEST_PATH_IMAGE005
Figure 2013100231196100002DEST_PATH_IMAGE030
C
Figure 669372DEST_PATH_IMAGE007
CC
Figure 668869DEST_PATH_IMAGE009
C(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 508649DEST_PATH_IMAGE001
Carry out binary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, binary variable circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting encryption parameter C initial value as encryption, initial value when setting encryption variables q, j, d, e, f, g, h, r and p initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by binary variable circulation ciphering process, it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 926992DEST_PATH_IMAGE010
Figure 174694DEST_PATH_IMAGE002
C
Figure 190689DEST_PATH_IMAGE004
C
Figure 173688DEST_PATH_IMAGE005
C
Figure 506581DEST_PATH_IMAGE006
C
Figure 55374DEST_PATH_IMAGE007
C
Figure 81098DEST_PATH_IMAGE008
C
Figure 285815DEST_PATH_IMAGE009
C, it is M that binary operator, which controls decryption computing during variable k=1,i= C
Figure 156819DEST_PATH_IMAGE002
Figure 960007DEST_PATH_IMAGE003
C
Figure 386440DEST_PATH_IMAGE004
Figure 389031DEST_PATH_IMAGE012
Figure 850100DEST_PATH_IMAGE005
C
Figure 952048DEST_PATH_IMAGE006
C
Figure 131356DEST_PATH_IMAGE007
C
Figure 609742DEST_PATH_IMAGE008
C
Figure 919458DEST_PATH_IMAGE009
C, it is M that binary operator, which controls decryption computing during variable k=2,i= C
Figure 457886DEST_PATH_IMAGE002
C
Figure 203305DEST_PATH_IMAGE012
Figure 638966DEST_PATH_IMAGE004
C
Figure 82717DEST_PATH_IMAGE005
Figure 236618DEST_PATH_IMAGE013
Figure 56806DEST_PATH_IMAGE006
CC
Figure 23942DEST_PATH_IMAGE008
C
Figure 399560DEST_PATH_IMAGE009
C, it is M that binary operator, which controls decryption computing during variable k=3,i= C
Figure 23439DEST_PATH_IMAGE002
C
Figure 168113DEST_PATH_IMAGE003
C
Figure 219245DEST_PATH_IMAGE004
Figure 82159DEST_PATH_IMAGE013
Figure 241220DEST_PATH_IMAGE005
C
Figure 505980DEST_PATH_IMAGE006
Figure 728014DEST_PATH_IMAGE014
Figure 806785DEST_PATH_IMAGE007
C
Figure 772467DEST_PATH_IMAGE008
C
Figure 891733DEST_PATH_IMAGE009
C, it is M that binary operator, which controls decryption computing during variable k=4,i= C
Figure 284668DEST_PATH_IMAGE002
C
Figure 122174DEST_PATH_IMAGE003
C
Figure 625968DEST_PATH_IMAGE004
C
Figure 662057DEST_PATH_IMAGE005
Figure 225893DEST_PATH_IMAGE014
Figure 285116DEST_PATH_IMAGE006
C
Figure 592601DEST_PATH_IMAGE007
Figure 686459DEST_PATH_IMAGE015
CC, it is M that binary operator, which controls decryption computing during variable k=5,i= C
Figure 875628DEST_PATH_IMAGE002
C
Figure 823993DEST_PATH_IMAGE003
C
Figure 729632DEST_PATH_IMAGE004
C
Figure 763447DEST_PATH_IMAGE005
C
Figure 412734DEST_PATH_IMAGE006
Figure 575303DEST_PATH_IMAGE007
C C, it is M that binary operator, which controls decryption computing during variable k=6,i= C
Figure 516528DEST_PATH_IMAGE002
C
Figure 259356DEST_PATH_IMAGE003
CCC
Figure 446252DEST_PATH_IMAGE006
C
Figure 4273DEST_PATH_IMAGE007
Figure 533474DEST_PATH_IMAGE016
C
Figure 737687DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 822635DEST_PATH_IMAGE002
C
Figure 582781DEST_PATH_IMAGE003
CC
Figure 980538DEST_PATH_IMAGE005
C
Figure 587100DEST_PATH_IMAGE006
C
Figure 518147DEST_PATH_IMAGE007
C
Figure 210159DEST_PATH_IMAGE008
Figure 611502DEST_PATH_IMAGE009
C, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 775767DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 955075DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 433461DEST_PATH_IMAGE020
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out binary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting encryption parameter C initial value as encryption, initial value when setting encryption variables q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 287465DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the One-parameter binary-encryption variable circulation encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100231196100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, binary system encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, binary system encryption variables are denoted as q, j, d, e, f, g, h, r and p, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100231196100001DEST_PATH_IMAGE002
Figure 2013100231196100001DEST_PATH_IMAGE003
Figure 2013100231196100001DEST_PATH_IMAGE005
Figure 2013100231196100001DEST_PATH_IMAGE006
Figure 2013100231196100001DEST_PATH_IMAGE008
Figure 2013100231196100001DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 380934DEST_PATH_IMAGE002
Figure 663011DEST_PATH_IMAGE003
Figure 833092DEST_PATH_IMAGE004
Figure 604739DEST_PATH_IMAGE005
Figure 493061DEST_PATH_IMAGE006
Figure 313249DEST_PATH_IMAGE007
Figure 603416DEST_PATH_IMAGE008
Figure 483647DEST_PATH_IMAGE009
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 859265DEST_PATH_IMAGE002
Figure 483145DEST_PATH_IMAGE003
Figure 627818DEST_PATH_IMAGE004
Figure 559443DEST_PATH_IMAGE006
Figure 721434DEST_PATH_IMAGE007
Figure 942648DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 292857DEST_PATH_IMAGE002
Figure 258539DEST_PATH_IMAGE003
Figure 377805DEST_PATH_IMAGE004
Figure 770740DEST_PATH_IMAGE005
Figure 342667DEST_PATH_IMAGE006
Figure 846461DEST_PATH_IMAGE007
Figure 85812DEST_PATH_IMAGE008
Figure 649649DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 708872DEST_PATH_IMAGE002
Figure 16356DEST_PATH_IMAGE003
Figure 110214DEST_PATH_IMAGE004
Figure 844952DEST_PATH_IMAGE005
Figure 385612DEST_PATH_IMAGE006
Figure 231208DEST_PATH_IMAGE007
Figure 179572DEST_PATH_IMAGE008
Figure 85211DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 119026DEST_PATH_IMAGE002
Figure 768314DEST_PATH_IMAGE003
Figure 571185DEST_PATH_IMAGE004
Figure 710042DEST_PATH_IMAGE005
Figure 231153DEST_PATH_IMAGE006
Figure 684131DEST_PATH_IMAGE007
Figure 341509DEST_PATH_IMAGE008
Figure 588950DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 597358DEST_PATH_IMAGE002
Figure 588447DEST_PATH_IMAGE003
Figure 365910DEST_PATH_IMAGE004
Figure 871475DEST_PATH_IMAGE007
Figure 497585DEST_PATH_IMAGE008
Figure 352409DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 402722DEST_PATH_IMAGE003
Figure 217094DEST_PATH_IMAGE004
Figure 977239DEST_PATH_IMAGE005
Figure 181956DEST_PATH_IMAGE006
Figure 925101DEST_PATH_IMAGE008
Figure 856148DEST_PATH_IMAGE009
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 222855DEST_PATH_IMAGE003
Figure 683924DEST_PATH_IMAGE004
Figure 113768DEST_PATH_IMAGE005
Figure 293077DEST_PATH_IMAGE006
Figure 505883DEST_PATH_IMAGE007
Figure 87037DEST_PATH_IMAGE008
Figure 359887DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100231196100001DEST_PATH_IMAGE010
Figure 958315DEST_PATH_IMAGE002
C
Figure 974813DEST_PATH_IMAGE003
Figure 2013100231196100001DEST_PATH_IMAGE011
Figure 410473DEST_PATH_IMAGE004
C
Figure 119803DEST_PATH_IMAGE005
C
Figure 8125DEST_PATH_IMAGE006
C
Figure 828313DEST_PATH_IMAGE007
CC
Figure 998712DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=C
Figure 436646DEST_PATH_IMAGE002
Figure 794946DEST_PATH_IMAGE011
Figure 205199DEST_PATH_IMAGE003
C
Figure 256332DEST_PATH_IMAGE004
Figure 2013100231196100001DEST_PATH_IMAGE012
Figure 56929DEST_PATH_IMAGE005
C
Figure 218920DEST_PATH_IMAGE006
C
Figure 218100DEST_PATH_IMAGE007
C
Figure 502451DEST_PATH_IMAGE008
CC, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=CC
Figure 955186DEST_PATH_IMAGE003
Figure 82542DEST_PATH_IMAGE012
Figure 920048DEST_PATH_IMAGE004
C
Figure 2013100231196100001DEST_PATH_IMAGE013
Figure 663193DEST_PATH_IMAGE006
C
Figure 961451DEST_PATH_IMAGE007
C
Figure 286253DEST_PATH_IMAGE008
C
Figure 593737DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=C
Figure 422016DEST_PATH_IMAGE002
C
Figure 156754DEST_PATH_IMAGE003
C
Figure 703273DEST_PATH_IMAGE004
Figure 814448DEST_PATH_IMAGE013
Figure 825130DEST_PATH_IMAGE005
C
Figure 730769DEST_PATH_IMAGE006
Figure 2013100231196100001DEST_PATH_IMAGE014
Figure 696408DEST_PATH_IMAGE007
CC
Figure 148566DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=C
Figure 225106DEST_PATH_IMAGE002
C
Figure 808534DEST_PATH_IMAGE003
CC
Figure 918890DEST_PATH_IMAGE005
Figure 166331DEST_PATH_IMAGE014
Figure 174739DEST_PATH_IMAGE006
C
Figure 880975DEST_PATH_IMAGE008
C
Figure 361635DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=C
Figure 591759DEST_PATH_IMAGE002
C
Figure 386539DEST_PATH_IMAGE003
C
Figure 18509DEST_PATH_IMAGE004
C
Figure 607753DEST_PATH_IMAGE005
C
Figure 590753DEST_PATH_IMAGE006
Figure 217311DEST_PATH_IMAGE007
C
Figure 305353DEST_PATH_IMAGE008
Figure 510069DEST_PATH_IMAGE016
Figure 646653DEST_PATH_IMAGE009
C, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=C
Figure 987635DEST_PATH_IMAGE002
CC
Figure 876274DEST_PATH_IMAGE004
CC
Figure 12037DEST_PATH_IMAGE006
C
Figure 441882DEST_PATH_IMAGE007
Figure 833997DEST_PATH_IMAGE008
C
Figure 415151DEST_PATH_IMAGE009
Figure 688000DEST_PATH_IMAGE017
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 348746DEST_PATH_IMAGE018
Figure 365243DEST_PATH_IMAGE002
C
Figure 800904DEST_PATH_IMAGE003
C
Figure 306971DEST_PATH_IMAGE004
C
Figure 460872DEST_PATH_IMAGE005
C
Figure 281061DEST_PATH_IMAGE006
C
Figure 571228DEST_PATH_IMAGE007
C
Figure 827077DEST_PATH_IMAGE017
Figure 185377DEST_PATH_IMAGE009
C, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 443500DEST_PATH_IMAGE019
Carry out H1=
Figure 306414DEST_PATH_IMAGE020
Figure 468405DEST_PATH_IMAGE002
C
Figure 733164DEST_PATH_IMAGE003
C
Figure 5511DEST_PATH_IMAGE005
C
Figure 187093DEST_PATH_IMAGE006
C
Figure 597607DEST_PATH_IMAGE007
C
Figure 435113DEST_PATH_IMAGE008
C
Figure 938906DEST_PATH_IMAGE009
C binary variable circulation cryptographic calculations(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 912678DEST_PATH_IMAGE019
Carry out H1=
Figure 476515DEST_PATH_IMAGE020
Figure 801317DEST_PATH_IMAGE002
C
Figure 843222DEST_PATH_IMAGE003
Figure 999397DEST_PATH_IMAGE021
Figure 734135DEST_PATH_IMAGE004
CC
Figure 391829DEST_PATH_IMAGE006
CC
Figure 245833DEST_PATH_IMAGE008
C
Figure 279648DEST_PATH_IMAGE009
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while C binary variable circulation cryptographic calculations, next binary variable circulation cryptographic calculation is pointed to H2=C
Figure 731806DEST_PATH_IMAGE022
Figure 870664DEST_PATH_IMAGE003
C
Figure 391775DEST_PATH_IMAGE004
Figure 2013100231196100001DEST_PATH_IMAGE023
Figure 510997DEST_PATH_IMAGE005
C
Figure 433954DEST_PATH_IMAGE006
C
Figure 681396DEST_PATH_IMAGE007
CCC(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100231196100001DEST_PATH_IMAGE024
Carry out H2=C
Figure 458356DEST_PATH_IMAGE002
Figure 106823DEST_PATH_IMAGE003
C
Figure 901604DEST_PATH_IMAGE004
Figure 533573DEST_PATH_IMAGE023
Figure 122818DEST_PATH_IMAGE005
C
Figure 105817DEST_PATH_IMAGE006
C
Figure 438709DEST_PATH_IMAGE007
CC
Figure 13227DEST_PATH_IMAGE009
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while C binary variable circulation cryptographic calculations, next binary variable circulation cryptographic calculation is pointed to H3= C
Figure 217944DEST_PATH_IMAGE002
C
Figure 83088DEST_PATH_IMAGE003
Figure 2013100231196100001DEST_PATH_IMAGE025
Figure 128798DEST_PATH_IMAGE004
C
Figure 263107DEST_PATH_IMAGE005
Figure 2013100231196100001DEST_PATH_IMAGE026
C
Figure 567498DEST_PATH_IMAGE007
CC
Figure 186972DEST_PATH_IMAGE009
C(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out binary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100231196A 2013-01-22 2013-01-22 Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark Pending CN103106447A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100231196A CN103106447A (en) 2013-01-22 2013-01-22 Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100231196A CN103106447A (en) 2013-01-22 2013-01-22 Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark

Publications (1)

Publication Number Publication Date
CN103106447A true CN103106447A (en) 2013-05-15

Family

ID=48314293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100231196A Pending CN103106447A (en) 2013-01-22 2013-01-22 Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103106447A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515