CN103106453A - Multi-parameter ternary variant circulating encryption anti-fake information storage brand - Google Patents

Multi-parameter ternary variant circulating encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103106453A
CN103106453A CN2013100232292A CN201310023229A CN103106453A CN 103106453 A CN103106453 A CN 103106453A CN 2013100232292 A CN2013100232292 A CN 2013100232292A CN 201310023229 A CN201310023229 A CN 201310023229A CN 103106453 A CN103106453 A CN 103106453A
Authority
CN
China
Prior art keywords
binary system
binary
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100232292A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100232292A priority Critical patent/CN103106453A/en
Publication of CN103106453A publication Critical patent/CN103106453A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

Provided is a multi-parameter ternary variant circulating encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through ternary variant circulating encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots in a mode of circulating look-up table modulation. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multi-parameter ternary variant circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multi-parameter ternary variant circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100232292100002DEST_PATH_IMAGE002
Figure 2013100232292100002DEST_PATH_IMAGE003
Figure 2013100232292100002DEST_PATH_IMAGE004
Figure 2013100232292100002DEST_PATH_IMAGE005
Figure 2013100232292100002DEST_PATH_IMAGE006
Figure 2013100232292100002DEST_PATH_IMAGE007
Figure 2013100232292100002DEST_PATH_IMAGE008
With, encryption parameter
Figure 276272DEST_PATH_IMAGE002
Figure 570243DEST_PATH_IMAGE003
Figure 163030DEST_PATH_IMAGE004
Figure 620556DEST_PATH_IMAGE005
Figure 746513DEST_PATH_IMAGE006
Figure 568975DEST_PATH_IMAGE007
Figure 898326DEST_PATH_IMAGE008
With
Figure 910275DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100232292100002DEST_PATH_IMAGE010
Figure 2013100232292100002DEST_PATH_IMAGE011
Figure 2013100232292100002DEST_PATH_IMAGE012
Figure 2013100232292100002DEST_PATH_IMAGE013
Figure 2013100232292100002DEST_PATH_IMAGE014
Figure 2013100232292100002DEST_PATH_IMAGE016
Figure 2013100232292100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 160514DEST_PATH_IMAGE010
Figure 468392DEST_PATH_IMAGE011
Figure 285038DEST_PATH_IMAGE012
Figure 835099DEST_PATH_IMAGE013
Figure 162230DEST_PATH_IMAGE015
Figure 466172DEST_PATH_IMAGE016
Figure 554345DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 260133DEST_PATH_IMAGE010
Figure 903954DEST_PATH_IMAGE011
Figure 695193DEST_PATH_IMAGE012
Figure 147351DEST_PATH_IMAGE014
Figure 230582DEST_PATH_IMAGE015
Figure 243537DEST_PATH_IMAGE016
Figure 939092DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 353893DEST_PATH_IMAGE010
Figure 610955DEST_PATH_IMAGE011
Figure 111207DEST_PATH_IMAGE012
Figure 344873DEST_PATH_IMAGE013
Figure 879760DEST_PATH_IMAGE014
Figure 304794DEST_PATH_IMAGE015
Figure 292341DEST_PATH_IMAGE016
Figure 329699DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 453512DEST_PATH_IMAGE010
Figure 46518DEST_PATH_IMAGE011
Figure 521362DEST_PATH_IMAGE012
Figure 606309DEST_PATH_IMAGE014
Figure 107567DEST_PATH_IMAGE015
Figure 69706DEST_PATH_IMAGE016
Figure 448866DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 812852DEST_PATH_IMAGE010
Figure 487940DEST_PATH_IMAGE011
Figure 937376DEST_PATH_IMAGE012
Figure 120227DEST_PATH_IMAGE013
Figure 73139DEST_PATH_IMAGE014
Figure 181778DEST_PATH_IMAGE015
Figure 852931DEST_PATH_IMAGE016
Figure 839473DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 189082DEST_PATH_IMAGE011
Figure 872184DEST_PATH_IMAGE013
Figure 799689DEST_PATH_IMAGE014
Figure 895876DEST_PATH_IMAGE016
Figure 958641DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 6231DEST_PATH_IMAGE010
Figure 763545DEST_PATH_IMAGE012
Figure 532098DEST_PATH_IMAGE014
Figure 324342DEST_PATH_IMAGE015
Figure 679100DEST_PATH_IMAGE016
Figure 349247DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 105850DEST_PATH_IMAGE010
Figure 89504DEST_PATH_IMAGE011
Figure 197137DEST_PATH_IMAGE012
Figure 405396DEST_PATH_IMAGE013
Figure 16506DEST_PATH_IMAGE014
Figure 416132DEST_PATH_IMAGE015
Figure 745482DEST_PATH_IMAGE016
Figure 757432DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100232292100002DEST_PATH_IMAGE018
Figure 537562DEST_PATH_IMAGE010
Figure 426201DEST_PATH_IMAGE011
Figure 537114DEST_PATH_IMAGE012
Figure 122816DEST_PATH_IMAGE004
Figure 365710DEST_PATH_IMAGE013
Figure 2013100232292100002DEST_PATH_IMAGE020
Figure 712728DEST_PATH_IMAGE014
Figure 315747DEST_PATH_IMAGE006
Figure 772268DEST_PATH_IMAGE015
Figure 169751DEST_PATH_IMAGE007
Figure 210257DEST_PATH_IMAGE016
Figure 351388DEST_PATH_IMAGE008
Figure 662415DEST_PATH_IMAGE017
Figure 230800DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 761531DEST_PATH_IMAGE002
Figure 706354DEST_PATH_IMAGE010
Figure 871887DEST_PATH_IMAGE019
Figure 876752DEST_PATH_IMAGE011
Figure 626271DEST_PATH_IMAGE003
Figure 109205DEST_PATH_IMAGE012
Figure 394824DEST_PATH_IMAGE020
Figure 305011DEST_PATH_IMAGE013
Figure 538897DEST_PATH_IMAGE005
Figure 825521DEST_PATH_IMAGE014
Figure 27964DEST_PATH_IMAGE015
Figure 98743DEST_PATH_IMAGE016
Figure 674212DEST_PATH_IMAGE008
Figure 918111DEST_PATH_IMAGE017
Figure 687878DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 650017DEST_PATH_IMAGE002
Figure 29177DEST_PATH_IMAGE010
Figure 65321DEST_PATH_IMAGE011
Figure 514757DEST_PATH_IMAGE020
Figure 494345DEST_PATH_IMAGE012
Figure 650520DEST_PATH_IMAGE004
Figure 756230DEST_PATH_IMAGE013
Figure 427383DEST_PATH_IMAGE021
Figure 413924DEST_PATH_IMAGE014
Figure 486922DEST_PATH_IMAGE006
Figure 766463DEST_PATH_IMAGE015
Figure 2013100232292100002DEST_PATH_IMAGE022
Figure 246303DEST_PATH_IMAGE008
Figure 691584DEST_PATH_IMAGE017
Figure 892758DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 289236DEST_PATH_IMAGE002
Figure 270202DEST_PATH_IMAGE011
Figure 153975DEST_PATH_IMAGE004
Figure 269699DEST_PATH_IMAGE012
Figure 254071DEST_PATH_IMAGE021
Figure 610097DEST_PATH_IMAGE013
Figure 964855DEST_PATH_IMAGE005
Figure 133537DEST_PATH_IMAGE014
Figure 890141DEST_PATH_IMAGE022
Figure 417068DEST_PATH_IMAGE015
Figure 776899DEST_PATH_IMAGE007
Figure 234425DEST_PATH_IMAGE016
Figure 2013100232292100002DEST_PATH_IMAGE023
Figure 658584DEST_PATH_IMAGE017
Figure 58210DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 387560DEST_PATH_IMAGE002
Figure 133931DEST_PATH_IMAGE010
Figure 865126DEST_PATH_IMAGE003
Figure 432724DEST_PATH_IMAGE011
Figure 983791DEST_PATH_IMAGE004
Figure 799432DEST_PATH_IMAGE012
Figure 385134DEST_PATH_IMAGE005
Figure 860983DEST_PATH_IMAGE013
Figure 164926DEST_PATH_IMAGE022
Figure 518678DEST_PATH_IMAGE014
Figure 958886DEST_PATH_IMAGE006
Figure 874146DEST_PATH_IMAGE015
Figure 399805DEST_PATH_IMAGE023
Figure 557248DEST_PATH_IMAGE016
Figure 117543DEST_PATH_IMAGE008
Figure 935195DEST_PATH_IMAGE017
Figure 2013100232292100002DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 26779DEST_PATH_IMAGE025
Figure 971601DEST_PATH_IMAGE010
Figure 632740DEST_PATH_IMAGE003
Figure 372026DEST_PATH_IMAGE011
Figure 623010DEST_PATH_IMAGE004
Figure 371523DEST_PATH_IMAGE012
Figure 890098DEST_PATH_IMAGE005
Figure 65864DEST_PATH_IMAGE013
Figure 804144DEST_PATH_IMAGE006
Figure 90769DEST_PATH_IMAGE014
Figure 732359DEST_PATH_IMAGE023
Figure 39024DEST_PATH_IMAGE007
Figure 129339DEST_PATH_IMAGE016
Figure 140076DEST_PATH_IMAGE017
Figure 852948DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 481375DEST_PATH_IMAGE002
Figure 826119DEST_PATH_IMAGE010
Figure 514589DEST_PATH_IMAGE026
Figure 881297DEST_PATH_IMAGE004
Figure 349056DEST_PATH_IMAGE012
Figure 630313DEST_PATH_IMAGE013
Figure 600543DEST_PATH_IMAGE006
Figure 925739DEST_PATH_IMAGE014
Figure 114460DEST_PATH_IMAGE015
Figure 888381DEST_PATH_IMAGE024
Figure 351241DEST_PATH_IMAGE016
Figure 683313DEST_PATH_IMAGE017
Figure 260925DEST_PATH_IMAGE025
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 557783DEST_PATH_IMAGE026
Figure 929858DEST_PATH_IMAGE010
Figure 548053DEST_PATH_IMAGE003
Figure 663776DEST_PATH_IMAGE011
Figure 732117DEST_PATH_IMAGE005
Figure 385952DEST_PATH_IMAGE013
Figure 657402DEST_PATH_IMAGE006
Figure 371280DEST_PATH_IMAGE014
Figure 964067DEST_PATH_IMAGE007
Figure 421593DEST_PATH_IMAGE015
Figure 544620DEST_PATH_IMAGE008
Figure 429399DEST_PATH_IMAGE016
Figure 770699DEST_PATH_IMAGE017
Figure 751162DEST_PATH_IMAGE009
, set encryption parameter
Figure 806843DEST_PATH_IMAGE002
Figure 439130DEST_PATH_IMAGE004
Figure 277029DEST_PATH_IMAGE005
Figure 503611DEST_PATH_IMAGE006
Figure 558286DEST_PATH_IMAGE007
Figure 161305DEST_PATH_IMAGE008
With
Figure 850782DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 513844DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 790236DEST_PATH_IMAGE027
Carry out H1=
Figure 2013100232292100002DEST_PATH_IMAGE028
Figure 505601DEST_PATH_IMAGE010
Figure 800316DEST_PATH_IMAGE002
Figure 385013DEST_PATH_IMAGE011
Figure 397968DEST_PATH_IMAGE029
Figure 592058DEST_PATH_IMAGE012
Figure 6859DEST_PATH_IMAGE004
Figure 762456DEST_PATH_IMAGE013
Figure 2013100232292100002DEST_PATH_IMAGE030
Figure 325735DEST_PATH_IMAGE006
Figure 521541DEST_PATH_IMAGE007
Figure 758356DEST_PATH_IMAGE016
Figure 44981DEST_PATH_IMAGE008
Figure 185106DEST_PATH_IMAGE017
Figure 266195DEST_PATH_IMAGE009
Ternary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 987377DEST_PATH_IMAGE027
Carry out H1=
Figure 72324DEST_PATH_IMAGE010
Figure 589893DEST_PATH_IMAGE002
Figure 535721DEST_PATH_IMAGE011
Figure 164149DEST_PATH_IMAGE029
Figure 967337DEST_PATH_IMAGE004
Figure 403391DEST_PATH_IMAGE013
Figure 835509DEST_PATH_IMAGE030
Figure 554755DEST_PATH_IMAGE007
Figure 378486DEST_PATH_IMAGE016
Figure 740851DEST_PATH_IMAGE008
Figure 423953DEST_PATH_IMAGE009
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H2=
Figure 289141DEST_PATH_IMAGE002
Figure 490315DEST_PATH_IMAGE010
Figure 447645DEST_PATH_IMAGE011
Figure 2013100232292100002DEST_PATH_IMAGE032
Figure 244590DEST_PATH_IMAGE013
Figure 315314DEST_PATH_IMAGE005
Figure 181770DEST_PATH_IMAGE014
Figure 83867DEST_PATH_IMAGE033
Figure 876111DEST_PATH_IMAGE015
Figure 496449DEST_PATH_IMAGE007
Figure 901016DEST_PATH_IMAGE016
Figure 657620DEST_PATH_IMAGE008
Figure 883415DEST_PATH_IMAGE017
Figure 725469DEST_PATH_IMAGE009
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100232292100002DEST_PATH_IMAGE034
Carry out H2=
Figure 933728DEST_PATH_IMAGE002
Figure 810417DEST_PATH_IMAGE010
Figure 944464DEST_PATH_IMAGE031
Figure 285763DEST_PATH_IMAGE003
Figure 16959DEST_PATH_IMAGE012
Figure 324837DEST_PATH_IMAGE032
Figure 878495DEST_PATH_IMAGE005
Figure 214930DEST_PATH_IMAGE014
Figure 707091DEST_PATH_IMAGE033
Figure 260301DEST_PATH_IMAGE015
Figure 597741DEST_PATH_IMAGE007
Figure 54261DEST_PATH_IMAGE016
Figure 389428DEST_PATH_IMAGE008
Figure 180666DEST_PATH_IMAGE017
Figure 568135DEST_PATH_IMAGE009
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H3=
Figure 920171DEST_PATH_IMAGE011
Figure 2013100232292100002DEST_PATH_IMAGE035
Figure 148021DEST_PATH_IMAGE012
Figure 90570DEST_PATH_IMAGE004
Figure 590821DEST_PATH_IMAGE013
Figure 2013100232292100002DEST_PATH_IMAGE036
Figure 388269DEST_PATH_IMAGE014
Figure 673888DEST_PATH_IMAGE006
Figure 806383DEST_PATH_IMAGE016
Figure 930197DEST_PATH_IMAGE008
Figure 502441DEST_PATH_IMAGE009
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 844954DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, ternary variable circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 901903DEST_PATH_IMAGE002
Figure 153892DEST_PATH_IMAGE003
Figure 365300DEST_PATH_IMAGE004
Figure 108445DEST_PATH_IMAGE006
Figure 469019DEST_PATH_IMAGE007
WithInitial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by ternary variable circulation ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 573261DEST_PATH_IMAGE018
Figure 183365DEST_PATH_IMAGE010
Figure 854518DEST_PATH_IMAGE002
Figure 412593DEST_PATH_IMAGE019
Figure 289730DEST_PATH_IMAGE004
Figure 63651DEST_PATH_IMAGE013
Figure 444528DEST_PATH_IMAGE014
Figure 841005DEST_PATH_IMAGE006
Figure 153038DEST_PATH_IMAGE015
Figure 449896DEST_PATH_IMAGE007
Figure 821971DEST_PATH_IMAGE016
Figure 892695DEST_PATH_IMAGE008
Figure 759151DEST_PATH_IMAGE017
Figure 661248DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 805321DEST_PATH_IMAGE010
Figure 475468DEST_PATH_IMAGE019
Figure 240533DEST_PATH_IMAGE012
Figure 698059DEST_PATH_IMAGE020
Figure 59902DEST_PATH_IMAGE013
Figure 210260DEST_PATH_IMAGE005
Figure 791808DEST_PATH_IMAGE014
Figure 53025DEST_PATH_IMAGE021
Figure 590634DEST_PATH_IMAGE007
Figure 344963DEST_PATH_IMAGE016
Figure 393559DEST_PATH_IMAGE008
Figure 979261DEST_PATH_IMAGE017
Figure 284472DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 569173DEST_PATH_IMAGE002
Figure 172193DEST_PATH_IMAGE010
Figure 628713DEST_PATH_IMAGE003
Figure 963879DEST_PATH_IMAGE011
Figure 755118DEST_PATH_IMAGE020
Figure 145517DEST_PATH_IMAGE012
Figure 705811DEST_PATH_IMAGE004
Figure 303463DEST_PATH_IMAGE021
Figure 891962DEST_PATH_IMAGE014
Figure 306762DEST_PATH_IMAGE006
Figure 249311DEST_PATH_IMAGE015
Figure 998830DEST_PATH_IMAGE022
Figure 481764DEST_PATH_IMAGE016
Figure 767383DEST_PATH_IMAGE008
Figure 677570DEST_PATH_IMAGE017
Figure 917315DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 203939DEST_PATH_IMAGE002
Figure 344065DEST_PATH_IMAGE010
Figure 628416DEST_PATH_IMAGE003
Figure 177263DEST_PATH_IMAGE004
Figure 421163DEST_PATH_IMAGE012
Figure 689464DEST_PATH_IMAGE021
Figure 526370DEST_PATH_IMAGE005
Figure 624776DEST_PATH_IMAGE014
Figure 451097DEST_PATH_IMAGE015
Figure 617636DEST_PATH_IMAGE007
Figure 944767DEST_PATH_IMAGE023
Figure 602462DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 613143DEST_PATH_IMAGE002
Figure 895613DEST_PATH_IMAGE010
Figure 313136DEST_PATH_IMAGE011
Figure 506220DEST_PATH_IMAGE004
Figure 956662DEST_PATH_IMAGE012
Figure 602407DEST_PATH_IMAGE005
Figure 665172DEST_PATH_IMAGE013
Figure 712763DEST_PATH_IMAGE022
Figure 22521DEST_PATH_IMAGE014
Figure 401900DEST_PATH_IMAGE006
Figure 517624DEST_PATH_IMAGE015
Figure 170453DEST_PATH_IMAGE023
Figure 713430DEST_PATH_IMAGE016
Figure 317455DEST_PATH_IMAGE008
Figure 551384DEST_PATH_IMAGE017
Figure 307987DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 268203DEST_PATH_IMAGE025
Figure 375837DEST_PATH_IMAGE010
Figure 584095DEST_PATH_IMAGE003
Figure 195205DEST_PATH_IMAGE011
Figure 594831DEST_PATH_IMAGE004
Figure 861865DEST_PATH_IMAGE012
Figure 857502DEST_PATH_IMAGE005
Figure 339431DEST_PATH_IMAGE013
Figure 463955DEST_PATH_IMAGE014
Figure 528863DEST_PATH_IMAGE023
Figure 865297DEST_PATH_IMAGE015
Figure 91879DEST_PATH_IMAGE007
Figure 333505DEST_PATH_IMAGE016
Figure 185792DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 565455DEST_PATH_IMAGE002
Figure 241941DEST_PATH_IMAGE010
Figure 802235DEST_PATH_IMAGE026
Figure 121352DEST_PATH_IMAGE011
Figure 282392DEST_PATH_IMAGE012
Figure 685746DEST_PATH_IMAGE013
Figure 936730DEST_PATH_IMAGE006
Figure 685243DEST_PATH_IMAGE014
Figure 206748DEST_PATH_IMAGE007
Figure 382514DEST_PATH_IMAGE015
Figure 307745DEST_PATH_IMAGE024
Figure 345102DEST_PATH_IMAGE016
Figure 734495DEST_PATH_IMAGE008
Figure 330431DEST_PATH_IMAGE017
Figure 539695DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 388550DEST_PATH_IMAGE003
Figure 288373DEST_PATH_IMAGE011
Figure 916800DEST_PATH_IMAGE018
Figure 765938DEST_PATH_IMAGE012
Figure 454409DEST_PATH_IMAGE005
Figure 887533DEST_PATH_IMAGE013
Figure 319651DEST_PATH_IMAGE006
Figure 288876DEST_PATH_IMAGE014
Figure 71597DEST_PATH_IMAGE015
Figure 979510DEST_PATH_IMAGE008
Figure 52509DEST_PATH_IMAGE016
Figure 833514DEST_PATH_IMAGE025
Figure 15151DEST_PATH_IMAGE009
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 208235DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 160142DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 540308DEST_PATH_IMAGE027
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 55603DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 349531DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the Multi-parameter ternary variant being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100232292100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100232292100001DEST_PATH_IMAGE003
Figure 2013100232292100001DEST_PATH_IMAGE004
Figure 2013100232292100001DEST_PATH_IMAGE005
Figure 2013100232292100001DEST_PATH_IMAGE006
Figure 2013100232292100001DEST_PATH_IMAGE007
With
Figure 2013100232292100001DEST_PATH_IMAGE009
, encryption parameter
Figure 449557DEST_PATH_IMAGE003
Figure 942112DEST_PATH_IMAGE004
Figure 719575DEST_PATH_IMAGE005
Figure 137918DEST_PATH_IMAGE006
Figure 661358DEST_PATH_IMAGE008
With
Figure 558907DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100232292100001DEST_PATH_IMAGE010
Figure 2013100232292100001DEST_PATH_IMAGE011
Figure 2013100232292100001DEST_PATH_IMAGE012
Figure 2013100232292100001DEST_PATH_IMAGE013
Figure 2013100232292100001DEST_PATH_IMAGE016
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 667194DEST_PATH_IMAGE010
Figure 384614DEST_PATH_IMAGE011
Figure 218971DEST_PATH_IMAGE012
Figure 971027DEST_PATH_IMAGE013
Figure 731172DEST_PATH_IMAGE014
Figure 935889DEST_PATH_IMAGE015
Figure 508690DEST_PATH_IMAGE016
Figure 115252DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 46299DEST_PATH_IMAGE010
Figure 635260DEST_PATH_IMAGE013
Figure 415052DEST_PATH_IMAGE015
Figure 893437DEST_PATH_IMAGE016
Figure 209012DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 747441DEST_PATH_IMAGE010
Figure 649931DEST_PATH_IMAGE011
Figure 932008DEST_PATH_IMAGE012
Figure 811419DEST_PATH_IMAGE014
Figure 198276DEST_PATH_IMAGE015
Figure 18465DEST_PATH_IMAGE016
Figure 308632DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 188863DEST_PATH_IMAGE010
Figure 60086DEST_PATH_IMAGE011
Figure 683965DEST_PATH_IMAGE012
Figure 828639DEST_PATH_IMAGE013
Figure 879772DEST_PATH_IMAGE014
Figure 241221DEST_PATH_IMAGE015
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 624426DEST_PATH_IMAGE010
Figure 561048DEST_PATH_IMAGE013
Figure 953983DEST_PATH_IMAGE014
Figure 24445DEST_PATH_IMAGE015
Figure 528239DEST_PATH_IMAGE016
Figure 767590DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 331427DEST_PATH_IMAGE010
Figure 886255DEST_PATH_IMAGE011
Figure 193740DEST_PATH_IMAGE012
Figure 287598DEST_PATH_IMAGE013
Figure 923667DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 829306DEST_PATH_IMAGE010
Figure 863121DEST_PATH_IMAGE011
Figure 816744DEST_PATH_IMAGE013
Figure 893285DEST_PATH_IMAGE014
Figure 414396DEST_PATH_IMAGE015
Figure 365909DEST_PATH_IMAGE016
Figure 85603DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 332542DEST_PATH_IMAGE012
Figure 629048DEST_PATH_IMAGE013
Figure 47391DEST_PATH_IMAGE014
Figure 543095DEST_PATH_IMAGE015
Figure 134613DEST_PATH_IMAGE016
Figure 766583DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100232292100001DEST_PATH_IMAGE018
Figure 57624DEST_PATH_IMAGE010
Figure 775045DEST_PATH_IMAGE002
Figure 107937DEST_PATH_IMAGE011
Figure 2013100232292100001DEST_PATH_IMAGE019
Figure 299140DEST_PATH_IMAGE012
Figure 121603DEST_PATH_IMAGE004
Figure 326319DEST_PATH_IMAGE013
Figure 2013100232292100001DEST_PATH_IMAGE020
Figure 899121DEST_PATH_IMAGE014
Figure 505683DEST_PATH_IMAGE006
Figure 436730DEST_PATH_IMAGE015
Figure 128742DEST_PATH_IMAGE007
Figure 299042DEST_PATH_IMAGE016
Figure 822428DEST_PATH_IMAGE008
Figure 189955DEST_PATH_IMAGE017
Figure 369264DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 582070DEST_PATH_IMAGE002
Figure 661760DEST_PATH_IMAGE010
Figure 934609DEST_PATH_IMAGE019
Figure 601214DEST_PATH_IMAGE011
Figure 617711DEST_PATH_IMAGE003
Figure 115689DEST_PATH_IMAGE012
Figure 326484DEST_PATH_IMAGE020
Figure 214805DEST_PATH_IMAGE013
Figure 34994DEST_PATH_IMAGE005
Figure 325161DEST_PATH_IMAGE014
Figure 641610DEST_PATH_IMAGE015
Figure 375528DEST_PATH_IMAGE016
Figure 195433DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 419741DEST_PATH_IMAGE002
Figure 418921DEST_PATH_IMAGE010
Figure 139490DEST_PATH_IMAGE003
Figure 489700DEST_PATH_IMAGE011
Figure 455382DEST_PATH_IMAGE020
Figure 574647DEST_PATH_IMAGE012
Figure 203468DEST_PATH_IMAGE004
Figure 40974DEST_PATH_IMAGE013
Figure 544768DEST_PATH_IMAGE021
Figure 591309DEST_PATH_IMAGE014
Figure 715833DEST_PATH_IMAGE015
Figure 961001DEST_PATH_IMAGE016
Figure 851597DEST_PATH_IMAGE008
Figure 586335DEST_PATH_IMAGE017
Figure 631389DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 742564DEST_PATH_IMAGE002
Figure 690929DEST_PATH_IMAGE010
Figure 596568DEST_PATH_IMAGE003
Figure 149426DEST_PATH_IMAGE011
Figure 663901DEST_PATH_IMAGE012
Figure 740441DEST_PATH_IMAGE021
Figure 261552DEST_PATH_IMAGE013
Figure 947486DEST_PATH_IMAGE005
Figure 870443DEST_PATH_IMAGE014
Figure 117885DEST_PATH_IMAGE022
Figure 126292DEST_PATH_IMAGE015
Figure 618847DEST_PATH_IMAGE007
Figure 458627DEST_PATH_IMAGE016
Figure 2013100232292100001DEST_PATH_IMAGE023
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 338093DEST_PATH_IMAGE002
Figure 970062DEST_PATH_IMAGE010
Figure 559307DEST_PATH_IMAGE003
Figure 542306DEST_PATH_IMAGE011
Figure 937515DEST_PATH_IMAGE004
Figure 919597DEST_PATH_IMAGE012
Figure 945322DEST_PATH_IMAGE005
Figure 150038DEST_PATH_IMAGE013
Figure 126139DEST_PATH_IMAGE014
Figure 322765DEST_PATH_IMAGE006
Figure 14778DEST_PATH_IMAGE015
Figure 689473DEST_PATH_IMAGE023
Figure 212858DEST_PATH_IMAGE016
Figure 81850DEST_PATH_IMAGE008
Figure 995580DEST_PATH_IMAGE017
Figure 473966DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 55120DEST_PATH_IMAGE025
Figure 493109DEST_PATH_IMAGE003
Figure 509607DEST_PATH_IMAGE011
Figure 945267DEST_PATH_IMAGE004
Figure 884623DEST_PATH_IMAGE012
Figure 100841DEST_PATH_IMAGE005
Figure 921030DEST_PATH_IMAGE013
Figure 211197DEST_PATH_IMAGE006
Figure 965581DEST_PATH_IMAGE023
Figure 323881DEST_PATH_IMAGE015
Figure 734134DEST_PATH_IMAGE007
Figure 519687DEST_PATH_IMAGE016
Figure 8699DEST_PATH_IMAGE024
Figure 170691DEST_PATH_IMAGE017
Figure 931055DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 153089DEST_PATH_IMAGE002
Figure 503299DEST_PATH_IMAGE010
Figure 203402DEST_PATH_IMAGE026
Figure 384984DEST_PATH_IMAGE011
Figure 276455DEST_PATH_IMAGE004
Figure 113961DEST_PATH_IMAGE012
Figure 617754DEST_PATH_IMAGE005
Figure 591527DEST_PATH_IMAGE013
Figure 656828DEST_PATH_IMAGE006
Figure 981630DEST_PATH_IMAGE014
Figure 23535DEST_PATH_IMAGE007
Figure 179710DEST_PATH_IMAGE015
Figure 914448DEST_PATH_IMAGE024
Figure 70678DEST_PATH_IMAGE008
Figure 19042DEST_PATH_IMAGE017
Figure 924681DEST_PATH_IMAGE025
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 477539DEST_PATH_IMAGE026
Figure 861247DEST_PATH_IMAGE010
Figure 992014DEST_PATH_IMAGE003
Figure 68555DEST_PATH_IMAGE011
Figure 589666DEST_PATH_IMAGE018
Figure 275600DEST_PATH_IMAGE012
Figure 198557DEST_PATH_IMAGE005
Figure 445998DEST_PATH_IMAGE013
Figure 454406DEST_PATH_IMAGE006
Figure 946960DEST_PATH_IMAGE014
Figure 786740DEST_PATH_IMAGE007
Figure 205083DEST_PATH_IMAGE015
Figure 435207DEST_PATH_IMAGE008
Figure 229988DEST_PATH_IMAGE016
Figure 360493DEST_PATH_IMAGE025
Figure 949737DEST_PATH_IMAGE017
Figure 932737DEST_PATH_IMAGE009
, set encryption parameter
Figure 265629DEST_PATH_IMAGE002
Figure 247711DEST_PATH_IMAGE003
Figure 335752DEST_PATH_IMAGE004
Figure 540469DEST_PATH_IMAGE005
Figure 411473DEST_PATH_IMAGE006
Figure 18035DEST_PATH_IMAGE007
Figure 713196DEST_PATH_IMAGE008
WithInitial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 79903DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 540972DEST_PATH_IMAGE027
Carry out H1=
Figure 705237DEST_PATH_IMAGE028
Figure 864396DEST_PATH_IMAGE002
Figure 179971DEST_PATH_IMAGE011
Figure 718400DEST_PATH_IMAGE029
Figure 900037DEST_PATH_IMAGE004
Figure 335698DEST_PATH_IMAGE013
Figure 779448DEST_PATH_IMAGE030
Figure 995666DEST_PATH_IMAGE014
Figure 311460DEST_PATH_IMAGE006
Figure 601627DEST_PATH_IMAGE015
Figure 216279DEST_PATH_IMAGE007
Figure 591897DEST_PATH_IMAGE016
Figure 714311DEST_PATH_IMAGE008
Figure 858985DEST_PATH_IMAGE017
Figure 910118DEST_PATH_IMAGE009
Ternary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 773031DEST_PATH_IMAGE027
Carry out H1=
Figure 997339DEST_PATH_IMAGE028
Figure 763563DEST_PATH_IMAGE010
Figure 543520DEST_PATH_IMAGE002
Figure 628150DEST_PATH_IMAGE011
Figure 593832DEST_PATH_IMAGE029
Figure 713098DEST_PATH_IMAGE012
Figure 604568DEST_PATH_IMAGE004
Figure 442074DEST_PATH_IMAGE013
Figure 945868DEST_PATH_IMAGE030
Figure 545794DEST_PATH_IMAGE006
Figure 106481DEST_PATH_IMAGE015
Figure 351649DEST_PATH_IMAGE007
Figure 445507DEST_PATH_IMAGE016
Figure 678780DEST_PATH_IMAGE008
Figure 225299DEST_PATH_IMAGE017
Figure 70895DEST_PATH_IMAGE009
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H2=
Figure 19260DEST_PATH_IMAGE002
Figure 443942DEST_PATH_IMAGE010
Figure 2013100232292100001DEST_PATH_IMAGE031
Figure 415440DEST_PATH_IMAGE011
Figure 64727DEST_PATH_IMAGE003
Figure 631712DEST_PATH_IMAGE012
Figure 2013100232292100001DEST_PATH_IMAGE032
Figure 708253DEST_PATH_IMAGE013
Figure 963785DEST_PATH_IMAGE005
Figure 416763DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE033
Figure 778867DEST_PATH_IMAGE015
Figure 26309DEST_PATH_IMAGE007
Figure 769137DEST_PATH_IMAGE016
Figure 822544DEST_PATH_IMAGE008
Figure 98542DEST_PATH_IMAGE017
Figure 516885DEST_PATH_IMAGE009
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100232292100001DEST_PATH_IMAGE034
Carry out H2=
Figure 950272DEST_PATH_IMAGE002
Figure 788128DEST_PATH_IMAGE010
Figure 184212DEST_PATH_IMAGE031
Figure 773456DEST_PATH_IMAGE011
Figure 553193DEST_PATH_IMAGE003
Figure 638141DEST_PATH_IMAGE032
Figure 104468DEST_PATH_IMAGE005
Figure 241051DEST_PATH_IMAGE014
Figure 847613DEST_PATH_IMAGE033
Figure 277195DEST_PATH_IMAGE015
Figure 31524DEST_PATH_IMAGE007
Figure 971799DEST_PATH_IMAGE016
Figure 534815DEST_PATH_IMAGE017
Figure 209729DEST_PATH_IMAGE009
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H3=
Figure 688115DEST_PATH_IMAGE002
Figure 3690DEST_PATH_IMAGE010
Figure 542119DEST_PATH_IMAGE003
Figure 441679DEST_PATH_IMAGE011
Figure 723756DEST_PATH_IMAGE035
Figure 893837DEST_PATH_IMAGE012
Figure 665484DEST_PATH_IMAGE004
Figure 553806DEST_PATH_IMAGE013
Figure 875459DEST_PATH_IMAGE036
Figure 165626DEST_PATH_IMAGE014
Figure 421475DEST_PATH_IMAGE015
Figure 543890DEST_PATH_IMAGE037
Figure 688563DEST_PATH_IMAGE016
Figure 739696DEST_PATH_IMAGE008
Figure 664927DEST_PATH_IMAGE017
Figure 384840DEST_PATH_IMAGE009
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 88747DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100232292A 2013-01-22 2013-01-22 Multi-parameter ternary variant circulating encryption anti-fake information storage brand Pending CN103106453A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100232292A CN103106453A (en) 2013-01-22 2013-01-22 Multi-parameter ternary variant circulating encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100232292A CN103106453A (en) 2013-01-22 2013-01-22 Multi-parameter ternary variant circulating encryption anti-fake information storage brand

Publications (1)

Publication Number Publication Date
CN103106453A true CN103106453A (en) 2013-05-15

Family

ID=48314299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100232292A Pending CN103106453A (en) 2013-01-22 2013-01-22 Multi-parameter ternary variant circulating encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103106453A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106464B (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515