CN103106459A - Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark - Google Patents

Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106459A
CN103106459A CN2013100233702A CN201310023370A CN103106459A CN 103106459 A CN103106459 A CN 103106459A CN 2013100233702 A CN2013100233702 A CN 2013100233702A CN 201310023370 A CN201310023370 A CN 201310023370A CN 103106459 A CN103106459 A CN 103106459A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100233702A
Other languages
Chinese (zh)
Inventor
曹鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100233702A priority Critical patent/CN103106459A/en
Publication of CN103106459A publication Critical patent/CN103106459A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

The invention relates to a multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark. The multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark can process binary anti-fake information to generate binary modulation signals through multielement encryption and channel coding. The anti-fake information is embedded in a whole trademark page through orderly change of amplitude-modulated dot conductivity with a circular table lookup modulation mode method. The anti-fake information can be identified from any fragment at the time of trademark identification and the multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark can be used for all kinds of anti-fake trademarks.

Description

Multiparameter transmutation multivariable circulates polynary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multiparameter transmutation multivariable circulation polynary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100233702100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100233702100002DEST_PATH_IMAGE002
Figure 2013100233702100002DEST_PATH_IMAGE003
Figure 2013100233702100002DEST_PATH_IMAGE005
Figure 2013100233702100002DEST_PATH_IMAGE006
Figure 2013100233702100002DEST_PATH_IMAGE007
Figure 2013100233702100002DEST_PATH_IMAGE008
With, encryption parameter
Figure 806500DEST_PATH_IMAGE002
Figure 785957DEST_PATH_IMAGE003
Figure 565694DEST_PATH_IMAGE004
Figure 899909DEST_PATH_IMAGE006
Figure 784689DEST_PATH_IMAGE007
Figure 114039DEST_PATH_IMAGE008
With
Figure 375256DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100233702100002DEST_PATH_IMAGE011
Figure 2013100233702100002DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE013
Figure 2013100233702100002DEST_PATH_IMAGE014
Figure 2013100233702100002DEST_PATH_IMAGE015
Figure 2013100233702100002DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 480353DEST_PATH_IMAGE010
Figure 536034DEST_PATH_IMAGE011
Figure 352680DEST_PATH_IMAGE012
Figure 152009DEST_PATH_IMAGE013
Figure 737711DEST_PATH_IMAGE014
Figure 315627DEST_PATH_IMAGE015
Figure 619569DEST_PATH_IMAGE016
Figure 957009DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 600480DEST_PATH_IMAGE010
Figure 997964DEST_PATH_IMAGE011
Figure 789202DEST_PATH_IMAGE012
Figure 930333DEST_PATH_IMAGE013
Figure 428311DEST_PATH_IMAGE014
Figure 262275DEST_PATH_IMAGE015
Figure 275230DEST_PATH_IMAGE016
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 634853DEST_PATH_IMAGE010
Figure 577401DEST_PATH_IMAGE011
Figure 77653DEST_PATH_IMAGE012
Figure 560587DEST_PATH_IMAGE013
Figure 95473DEST_PATH_IMAGE014
Figure 271240DEST_PATH_IMAGE015
Figure 258787DEST_PATH_IMAGE016
Figure 545412DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 606909DEST_PATH_IMAGE010
Figure 953577DEST_PATH_IMAGE011
Figure 428420DEST_PATH_IMAGE012
Figure 762636DEST_PATH_IMAGE014
Figure 14625DEST_PATH_IMAGE015
Figure 976765DEST_PATH_IMAGE016
Figure 605193DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 969178DEST_PATH_IMAGE010
Figure 329752DEST_PATH_IMAGE011
Figure 211306DEST_PATH_IMAGE013
Figure 23590DEST_PATH_IMAGE015
Figure 694743DEST_PATH_IMAGE016
Figure 930552DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 941234DEST_PATH_IMAGE010
Figure 971507DEST_PATH_IMAGE011
Figure 903877DEST_PATH_IMAGE013
Figure 970239DEST_PATH_IMAGE015
Figure 615984DEST_PATH_IMAGE016
Figure 928016DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 975607DEST_PATH_IMAGE010
Figure 347682DEST_PATH_IMAGE011
Figure 534130DEST_PATH_IMAGE013
Figure 436227DEST_PATH_IMAGE014
Figure 979204DEST_PATH_IMAGE015
Figure 333962DEST_PATH_IMAGE016
Figure 253376DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 9979DEST_PATH_IMAGE010
Figure 723858DEST_PATH_IMAGE011
Figure 831491DEST_PATH_IMAGE012
Figure 226700DEST_PATH_IMAGE013
Figure 837810DEST_PATH_IMAGE014
Figure 988169DEST_PATH_IMAGE015
Figure 317519DEST_PATH_IMAGE016
Figure 578736DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100233702100002DEST_PATH_IMAGE018
Figure 106669DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE019
Figure 490246DEST_PATH_IMAGE011
Figure 2013100233702100002DEST_PATH_IMAGE020
Figure 306892DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE021
Figure 168538DEST_PATH_IMAGE013
Figure 2013100233702100002DEST_PATH_IMAGE022
Figure 816557DEST_PATH_IMAGE014
Figure 2013100233702100002DEST_PATH_IMAGE023
Figure 308718DEST_PATH_IMAGE015
Figure 409398DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE025
Figure 2013100233702100002DEST_PATH_IMAGE026
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 13943DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE027
Figure 867499DEST_PATH_IMAGE011
Figure 946313DEST_PATH_IMAGE022
Figure 506607DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE028
Figure 137309DEST_PATH_IMAGE013
Figure 478160DEST_PATH_IMAGE024
Figure 422983DEST_PATH_IMAGE014
Figure 900100DEST_PATH_IMAGE015
Figure 904966DEST_PATH_IMAGE026
Figure 342900DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE030
Figure 2013100233702100002DEST_PATH_IMAGE031
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 485354DEST_PATH_IMAGE022
Figure 395542DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE032
Figure 445406DEST_PATH_IMAGE011
Figure 669714DEST_PATH_IMAGE024
Figure 59107DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE033
Figure 468092DEST_PATH_IMAGE013
Figure 942935DEST_PATH_IMAGE026
Figure 705355DEST_PATH_IMAGE014
Figure 11571DEST_PATH_IMAGE015
Figure 529140DEST_PATH_IMAGE031
Figure 2013100233702100002DEST_PATH_IMAGE035
Figure 2013100233702100002DEST_PATH_IMAGE036
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 280430DEST_PATH_IMAGE024
Figure 968901DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE037
Figure 480654DEST_PATH_IMAGE011
Figure 647193DEST_PATH_IMAGE026
Figure 865684DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE038
Figure 787373DEST_PATH_IMAGE013
Figure 458526DEST_PATH_IMAGE031
Figure 694335DEST_PATH_IMAGE014
Figure 2013100233702100002DEST_PATH_IMAGE039
Figure 829650DEST_PATH_IMAGE015
Figure 797606DEST_PATH_IMAGE036
Figure 956055DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE040
Figure 526714DEST_PATH_IMAGE017
Figure 2013100233702100002DEST_PATH_IMAGE041
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 719798DEST_PATH_IMAGE026
Figure 920972DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE042
Figure 629034DEST_PATH_IMAGE011
Figure 941066DEST_PATH_IMAGE031
Figure 2013100233702100002DEST_PATH_IMAGE043
Figure 360732DEST_PATH_IMAGE013
Figure 493773DEST_PATH_IMAGE036
Figure 609497DEST_PATH_IMAGE014
Figure 2013100233702100002DEST_PATH_IMAGE044
Figure 511594DEST_PATH_IMAGE015
Figure 54571DEST_PATH_IMAGE041
Figure 409329DEST_PATH_IMAGE016
Figure 391060DEST_PATH_IMAGE017
Figure 2013100233702100002DEST_PATH_IMAGE046
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 209980DEST_PATH_IMAGE031
Figure 923858DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE047
Figure 637089DEST_PATH_IMAGE036
Figure 248199DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE048
Figure 398558DEST_PATH_IMAGE013
Figure 727908DEST_PATH_IMAGE041
Figure 2013100233702100002DEST_PATH_IMAGE049
Figure 454741DEST_PATH_IMAGE015
Figure 835388DEST_PATH_IMAGE046
Figure 386455DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE050
Figure 513680DEST_PATH_IMAGE017
Figure 99382DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 263647DEST_PATH_IMAGE036
Figure 567590DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE051
Figure 673135DEST_PATH_IMAGE041
Figure 273881DEST_PATH_IMAGE012
Figure 2013100233702100002DEST_PATH_IMAGE052
Figure 861857DEST_PATH_IMAGE013
Figure 268567DEST_PATH_IMAGE046
Figure 2013100233702100002DEST_PATH_IMAGE053
Figure 397246DEST_PATH_IMAGE015
Figure 675781DEST_PATH_IMAGE018
Figure 620603DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE054
Figure 35404DEST_PATH_IMAGE017
Figure 774690DEST_PATH_IMAGE020
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 274941DEST_PATH_IMAGE041
Figure 23454DEST_PATH_IMAGE010
Figure 2013100233702100002DEST_PATH_IMAGE055
Figure 355079DEST_PATH_IMAGE011
Figure 530845DEST_PATH_IMAGE046
Figure 456076DEST_PATH_IMAGE012
Figure 805017DEST_PATH_IMAGE013
Figure 194411DEST_PATH_IMAGE018
Figure 541078DEST_PATH_IMAGE014
Figure 812660DEST_PATH_IMAGE015
Figure 902975DEST_PATH_IMAGE020
Figure 146875DEST_PATH_IMAGE016
Figure 2013100233702100002DEST_PATH_IMAGE058
Figure 726761DEST_PATH_IMAGE017
Figure 688901DEST_PATH_IMAGE022
, set encryption parameter
Figure 415734DEST_PATH_IMAGE003
Figure 41887DEST_PATH_IMAGE004
Figure 225744DEST_PATH_IMAGE005
Figure 657862DEST_PATH_IMAGE006
Figure 86742DEST_PATH_IMAGE007
Figure 946114DEST_PATH_IMAGE008
With
Figure 617267DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100233702100002DEST_PATH_IMAGE059
Carry out H1=
Figure 2013100233702100002DEST_PATH_IMAGE060
Figure 470615DEST_PATH_IMAGE010
Figure 438571DEST_PATH_IMAGE019
Figure 659336DEST_PATH_IMAGE011
Figure 2013100233702100002DEST_PATH_IMAGE061
Figure 433257DEST_PATH_IMAGE012
Figure 626341DEST_PATH_IMAGE021
Figure 889832DEST_PATH_IMAGE013
Figure 2013100233702100002DEST_PATH_IMAGE062
Figure 269998DEST_PATH_IMAGE014
Figure 847610DEST_PATH_IMAGE023
Figure 19834DEST_PATH_IMAGE015
Figure 2013100233702100002DEST_PATH_IMAGE063
Figure 391910DEST_PATH_IMAGE016
Figure 259372DEST_PATH_IMAGE025
Figure 2013100233702100002DEST_PATH_IMAGE064
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 339509DEST_PATH_IMAGE059
Carry out H1=
Figure 882486DEST_PATH_IMAGE060
Figure 502823DEST_PATH_IMAGE010
Figure 156658DEST_PATH_IMAGE019
Figure 116524DEST_PATH_IMAGE011
Figure 830402DEST_PATH_IMAGE061
Figure 734773DEST_PATH_IMAGE012
Figure 192299DEST_PATH_IMAGE021
Figure 68988DEST_PATH_IMAGE013
Figure 953768DEST_PATH_IMAGE062
Figure 220801DEST_PATH_IMAGE014
Figure 482018DEST_PATH_IMAGE023
Figure 213214DEST_PATH_IMAGE015
Figure 268894DEST_PATH_IMAGE063
Figure 85541DEST_PATH_IMAGE016
Figure 88132DEST_PATH_IMAGE025
Figure 673834DEST_PATH_IMAGE017
Figure 900416DEST_PATH_IMAGE064
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 266675DEST_PATH_IMAGE010
Figure 869695DEST_PATH_IMAGE027
Figure 2013100233702100002DEST_PATH_IMAGE066
Figure 972966DEST_PATH_IMAGE012
Figure 498625DEST_PATH_IMAGE028
Figure 905336DEST_PATH_IMAGE013
Figure 2013100233702100002DEST_PATH_IMAGE067
Figure 262368DEST_PATH_IMAGE014
Figure 96331DEST_PATH_IMAGE029
Figure 46970DEST_PATH_IMAGE015
Figure 2013100233702100002DEST_PATH_IMAGE068
Figure 54109DEST_PATH_IMAGE016
Figure 468910DEST_PATH_IMAGE030
Figure 182698DEST_PATH_IMAGE017
Figure 2013100233702100002DEST_PATH_IMAGE069
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100233702100002DEST_PATH_IMAGE070
Carry out H2=
Figure 869901DEST_PATH_IMAGE065
Figure 618414DEST_PATH_IMAGE010
Figure 573207DEST_PATH_IMAGE027
Figure 748973DEST_PATH_IMAGE011
Figure 736521DEST_PATH_IMAGE066
Figure 23146DEST_PATH_IMAGE012
Figure 474856DEST_PATH_IMAGE028
Figure 555944DEST_PATH_IMAGE013
Figure 30788DEST_PATH_IMAGE067
Figure 121104DEST_PATH_IMAGE014
Figure 882572DEST_PATH_IMAGE015
Figure 633862DEST_PATH_IMAGE030
Figure 322333DEST_PATH_IMAGE017
Figure 506189DEST_PATH_IMAGE069
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 2013100233702100002DEST_PATH_IMAGE071
Figure 624DEST_PATH_IMAGE010
Figure 219116DEST_PATH_IMAGE032
Figure 78488DEST_PATH_IMAGE011
Figure 2013100233702100002DEST_PATH_IMAGE072
Figure 811957DEST_PATH_IMAGE012
Figure 782187DEST_PATH_IMAGE033
Figure 855186DEST_PATH_IMAGE013
Figure 2013100233702100002DEST_PATH_IMAGE073
Figure 10092DEST_PATH_IMAGE014
Figure 168541DEST_PATH_IMAGE034
Figure 2013100233702100002DEST_PATH_IMAGE074
Figure 932284DEST_PATH_IMAGE016
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 138826DEST_PATH_IMAGE002
Figure 605063DEST_PATH_IMAGE004
Figure 720787DEST_PATH_IMAGE005
Figure 622884DEST_PATH_IMAGE006
Figure 165861DEST_PATH_IMAGE007
Figure 723881DEST_PATH_IMAGE008
WithInitial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by polynary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 134319DEST_PATH_IMAGE018
Figure 113777DEST_PATH_IMAGE010
Figure 955831DEST_PATH_IMAGE019
Figure 227729DEST_PATH_IMAGE020
Figure 112509DEST_PATH_IMAGE012
Figure 441859DEST_PATH_IMAGE021
Figure 434272DEST_PATH_IMAGE022
Figure 489952DEST_PATH_IMAGE014
Figure 306598DEST_PATH_IMAGE023
Figure 691629DEST_PATH_IMAGE024
Figure 121474DEST_PATH_IMAGE016
Figure 762856DEST_PATH_IMAGE017
Figure 468644DEST_PATH_IMAGE026
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 866128DEST_PATH_IMAGE020
Figure 657366DEST_PATH_IMAGE010
Figure 798497DEST_PATH_IMAGE027
Figure 358792DEST_PATH_IMAGE011
Figure 130439DEST_PATH_IMAGE022
Figure 143394DEST_PATH_IMAGE012
Figure 88216DEST_PATH_IMAGE028
Figure 503017DEST_PATH_IMAGE013
Figure 507882DEST_PATH_IMAGE024
Figure 963637DEST_PATH_IMAGE015
Figure 139404DEST_PATH_IMAGE026
Figure 126951DEST_PATH_IMAGE016
Figure 821741DEST_PATH_IMAGE031
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 386900DEST_PATH_IMAGE010
Figure 630800DEST_PATH_IMAGE032
Figure 882789DEST_PATH_IMAGE011
Figure 782612DEST_PATH_IMAGE024
Figure 411040DEST_PATH_IMAGE012
Figure 775025DEST_PATH_IMAGE033
Figure 197916DEST_PATH_IMAGE013
Figure 647352DEST_PATH_IMAGE026
Figure 79470DEST_PATH_IMAGE014
Figure 970066DEST_PATH_IMAGE034
Figure 829438DEST_PATH_IMAGE015
Figure 861033DEST_PATH_IMAGE016
Figure 934032DEST_PATH_IMAGE035
Figure 964305DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 83625DEST_PATH_IMAGE024
Figure 149987DEST_PATH_IMAGE037
Figure 155355DEST_PATH_IMAGE012
Figure 527431DEST_PATH_IMAGE038
Figure 598155DEST_PATH_IMAGE013
Figure 713878DEST_PATH_IMAGE031
Figure 615975DEST_PATH_IMAGE014
Figure 158952DEST_PATH_IMAGE039
Figure 513710DEST_PATH_IMAGE015
Figure 581196DEST_PATH_IMAGE036
Figure 275482DEST_PATH_IMAGE016
Figure 989360DEST_PATH_IMAGE040
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 103313DEST_PATH_IMAGE026
Figure 253672DEST_PATH_IMAGE010
Figure 583022DEST_PATH_IMAGE042
Figure 844239DEST_PATH_IMAGE011
Figure 309855DEST_PATH_IMAGE031
Figure 568798DEST_PATH_IMAGE012
Figure 385444DEST_PATH_IMAGE043
Figure 770475DEST_PATH_IMAGE036
Figure 238683DEST_PATH_IMAGE044
Figure 904019DEST_PATH_IMAGE015
Figure 609807DEST_PATH_IMAGE041
Figure 944974DEST_PATH_IMAGE016
Figure 877343DEST_PATH_IMAGE017
Figure 437638DEST_PATH_IMAGE046
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 6022DEST_PATH_IMAGE031
Figure 222240DEST_PATH_IMAGE010
Figure 167062DEST_PATH_IMAGE047
Figure 581863DEST_PATH_IMAGE011
Figure 586728DEST_PATH_IMAGE036
Figure 569914DEST_PATH_IMAGE048
Figure 952670DEST_PATH_IMAGE041
Figure 226843DEST_PATH_IMAGE049
Figure 616236DEST_PATH_IMAGE015
Figure 375430DEST_PATH_IMAGE016
Figure 200167DEST_PATH_IMAGE050
Figure 444066DEST_PATH_IMAGE017
Figure 961635DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 923775DEST_PATH_IMAGE036
Figure 552203DEST_PATH_IMAGE010
Figure 588292DEST_PATH_IMAGE051
Figure 726198DEST_PATH_IMAGE041
Figure 892737DEST_PATH_IMAGE012
Figure 111229DEST_PATH_IMAGE052
Figure 908284DEST_PATH_IMAGE013
Figure 579436DEST_PATH_IMAGE046
Figure 815246DEST_PATH_IMAGE014
Figure 888244DEST_PATH_IMAGE053
Figure 918517DEST_PATH_IMAGE015
Figure 14649DEST_PATH_IMAGE018
Figure 585307DEST_PATH_IMAGE016
Figure 716074DEST_PATH_IMAGE054
Figure 917249DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 875026DEST_PATH_IMAGE041
Figure 294692DEST_PATH_IMAGE055
Figure 383237DEST_PATH_IMAGE012
Figure 280972DEST_PATH_IMAGE013
Figure 784676DEST_PATH_IMAGE018
Figure 541279DEST_PATH_IMAGE014
Figure 255157DEST_PATH_IMAGE057
Figure 362790DEST_PATH_IMAGE015
Figure 318852DEST_PATH_IMAGE020
Figure 929962DEST_PATH_IMAGE016
Figure 18003DEST_PATH_IMAGE058
Figure 347354DEST_PATH_IMAGE017
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 74187DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 395447DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 884197DEST_PATH_IMAGE059
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 949105DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 534807DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the Multiparameter transmutation multivariable being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates polynary encryption anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100233702100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100233702100001DEST_PATH_IMAGE002
Figure 2013100233702100001DEST_PATH_IMAGE003
Figure 2013100233702100001DEST_PATH_IMAGE004
Figure 2013100233702100001DEST_PATH_IMAGE005
Figure 2013100233702100001DEST_PATH_IMAGE006
Figure 2013100233702100001DEST_PATH_IMAGE007
Figure 2013100233702100001DEST_PATH_IMAGE008
With
Figure 2013100233702100001DEST_PATH_IMAGE009
, encryption parameter
Figure 473568DEST_PATH_IMAGE002
Figure 390709DEST_PATH_IMAGE003
Figure 295080DEST_PATH_IMAGE004
Figure 752606DEST_PATH_IMAGE005
Figure 629295DEST_PATH_IMAGE006
Figure 451757DEST_PATH_IMAGE007
With
Figure 42325DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100233702100001DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE011
Figure 2013100233702100001DEST_PATH_IMAGE012
Figure 2013100233702100001DEST_PATH_IMAGE013
Figure 2013100233702100001DEST_PATH_IMAGE015
Figure 2013100233702100001DEST_PATH_IMAGE016
Figure 2013100233702100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 265419DEST_PATH_IMAGE011
Figure 82065DEST_PATH_IMAGE012
Figure 881394DEST_PATH_IMAGE013
Figure 467096DEST_PATH_IMAGE014
Figure 200883DEST_PATH_IMAGE016
Figure 538323DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 306428DEST_PATH_IMAGE010
Figure 703911DEST_PATH_IMAGE011
Figure 495150DEST_PATH_IMAGE012
Figure 636281DEST_PATH_IMAGE013
Figure 196576DEST_PATH_IMAGE014
Figure 30539DEST_PATH_IMAGE015
Figure 981178DEST_PATH_IMAGE016
Figure 926000DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 340801DEST_PATH_IMAGE010
Figure 345666DEST_PATH_IMAGE011
Figure 328851DEST_PATH_IMAGE013
Figure 801421DEST_PATH_IMAGE014
Figure 964735DEST_PATH_IMAGE016
Figure 251360DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 375174DEST_PATH_IMAGE010
Figure 659525DEST_PATH_IMAGE011
Figure 134368DEST_PATH_IMAGE012
Figure 224684DEST_PATH_IMAGE013
Figure 720573DEST_PATH_IMAGE015
Figure 682713DEST_PATH_IMAGE016
Figure 311141DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 98017DEST_PATH_IMAGE011
Figure 547453DEST_PATH_IMAGE012
Figure 979571DEST_PATH_IMAGE013
Figure 791855DEST_PATH_IMAGE015
Figure 463008DEST_PATH_IMAGE016
Figure 698817DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 672141DEST_PATH_IMAGE013
Figure 599646DEST_PATH_IMAGE014
Figure 800820DEST_PATH_IMAGE015
Figure 470003DEST_PATH_IMAGE016
Figure 719718DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 767309DEST_PATH_IMAGE010
Figure 272425DEST_PATH_IMAGE012
Figure 388149DEST_PATH_IMAGE013
Figure 290246DEST_PATH_IMAGE014
Figure 125664DEST_PATH_IMAGE016
Figure 45078DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 515560DEST_PATH_IMAGE011
Figure 560876DEST_PATH_IMAGE012
Figure 18402DEST_PATH_IMAGE013
Figure 629512DEST_PATH_IMAGE014
Figure 779871DEST_PATH_IMAGE015
Figure 109221DEST_PATH_IMAGE016
Figure 370438DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100233702100001DEST_PATH_IMAGE018
Figure 2013100233702100001DEST_PATH_IMAGE019
Figure 281948DEST_PATH_IMAGE011
Figure 2013100233702100001DEST_PATH_IMAGE020
Figure 2013100233702100001DEST_PATH_IMAGE021
Figure 960240DEST_PATH_IMAGE013
Figure 2013100233702100001DEST_PATH_IMAGE022
Figure 608259DEST_PATH_IMAGE014
Figure 162737DEST_PATH_IMAGE015
Figure 201100DEST_PATH_IMAGE024
Figure 741803DEST_PATH_IMAGE016
Figure 447591DEST_PATH_IMAGE025
Figure 845074DEST_PATH_IMAGE017
Figure 636313DEST_PATH_IMAGE026
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 777444DEST_PATH_IMAGE020
Figure 337738DEST_PATH_IMAGE010
Figure 184658DEST_PATH_IMAGE011
Figure 481964DEST_PATH_IMAGE012
Figure 486829DEST_PATH_IMAGE028
Figure 987080DEST_PATH_IMAGE013
Figure 470014DEST_PATH_IMAGE024
Figure 840319DEST_PATH_IMAGE015
Figure 126944DEST_PATH_IMAGE026
Figure 516337DEST_PATH_IMAGE016
Figure 863004DEST_PATH_IMAGE030
Figure 162585DEST_PATH_IMAGE031
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 406484DEST_PATH_IMAGE022
Figure 924053DEST_PATH_IMAGE010
Figure 886193DEST_PATH_IMAGE032
Figure 514620DEST_PATH_IMAGE011
Figure 613026DEST_PATH_IMAGE024
Figure 239180DEST_PATH_IMAGE012
Figure 688616DEST_PATH_IMAGE033
Figure 855155DEST_PATH_IMAGE013
Figure 73646DEST_PATH_IMAGE026
Figure 933018DEST_PATH_IMAGE014
Figure 541854DEST_PATH_IMAGE034
Figure 777663DEST_PATH_IMAGE015
Figure 850661DEST_PATH_IMAGE031
Figure 2013100233702100001DEST_PATH_IMAGE035
Figure 39383DEST_PATH_IMAGE017
Figure 2013100233702100001DEST_PATH_IMAGE036
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 803126DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE037
Figure 66617DEST_PATH_IMAGE011
Figure 650045DEST_PATH_IMAGE026
Figure 962078DEST_PATH_IMAGE012
Figure 95422DEST_PATH_IMAGE013
Figure 467498DEST_PATH_IMAGE031
Figure 600539DEST_PATH_IMAGE014
Figure 2013100233702100001DEST_PATH_IMAGE039
Figure 716263DEST_PATH_IMAGE015
Figure 618360DEST_PATH_IMAGE036
Figure 161336DEST_PATH_IMAGE016
Figure 2013100233702100001DEST_PATH_IMAGE040
Figure 2013100233702100001DEST_PATH_IMAGE041
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 497826DEST_PATH_IMAGE026
Figure 254429DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE042
Figure 30624DEST_PATH_IMAGE011
Figure 138257DEST_PATH_IMAGE031
Figure 533467DEST_PATH_IMAGE012
Figure 2013100233702100001DEST_PATH_IMAGE043
Figure 357252DEST_PATH_IMAGE036
Figure 686602DEST_PATH_IMAGE014
Figure 2013100233702100001DEST_PATH_IMAGE044
Figure 413436DEST_PATH_IMAGE041
Figure 734696DEST_PATH_IMAGE016
Figure 285763DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 412987DEST_PATH_IMAGE031
Figure 998690DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE047
Figure 225272DEST_PATH_IMAGE011
Figure 529214DEST_PATH_IMAGE036
Figure 132234DEST_PATH_IMAGE012
Figure 2013100233702100001DEST_PATH_IMAGE048
Figure 634759DEST_PATH_IMAGE013
Figure 235505DEST_PATH_IMAGE041
Figure 72748DEST_PATH_IMAGE014
Figure 2013100233702100001DEST_PATH_IMAGE049
Figure 479459DEST_PATH_IMAGE015
Figure 39753DEST_PATH_IMAGE046
Figure 857406DEST_PATH_IMAGE016
Figure 2013100233702100001DEST_PATH_IMAGE050
Figure 454664DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 869465DEST_PATH_IMAGE036
Figure 608750DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE051
Figure 171319DEST_PATH_IMAGE011
Figure 126822DEST_PATH_IMAGE012
Figure 2013100233702100001DEST_PATH_IMAGE052
Figure 364906DEST_PATH_IMAGE013
Figure 352453DEST_PATH_IMAGE046
Figure 2013100233702100001DEST_PATH_IMAGE053
Figure 28471DEST_PATH_IMAGE015
Figure 437456DEST_PATH_IMAGE018
Figure 584403DEST_PATH_IMAGE016
Figure 2013100233702100001DEST_PATH_IMAGE054
Figure 572973DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 334442DEST_PATH_IMAGE041
Figure 234265DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE055
Figure 925009DEST_PATH_IMAGE011
Figure 23415DEST_PATH_IMAGE046
Figure 711886DEST_PATH_IMAGE012
Figure 2013100233702100001DEST_PATH_IMAGE056
Figure 895742DEST_PATH_IMAGE013
Figure 327861DEST_PATH_IMAGE018
Figure 546352DEST_PATH_IMAGE014
Figure 468041DEST_PATH_IMAGE015
Figure 76877DEST_PATH_IMAGE020
Figure 47107DEST_PATH_IMAGE016
Figure 182422DEST_PATH_IMAGE017
Figure 150378DEST_PATH_IMAGE022
, set encryption parameter
Figure 308827DEST_PATH_IMAGE002
Figure 82748DEST_PATH_IMAGE003
Figure 275832DEST_PATH_IMAGE004
Figure 477006DEST_PATH_IMAGE005
Figure 857172DEST_PATH_IMAGE006
Figure 420057DEST_PATH_IMAGE008
With
Figure 792132DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is rightCarry out H1=
Figure 2013100233702100001DEST_PATH_IMAGE060
Figure 899952DEST_PATH_IMAGE010
Figure 2013100233702100001DEST_PATH_IMAGE061
Figure 965363DEST_PATH_IMAGE012
Figure 619198DEST_PATH_IMAGE021
Figure 77599DEST_PATH_IMAGE013
Figure 2013100233702100001DEST_PATH_IMAGE062
Figure 695848DEST_PATH_IMAGE023
Figure 153374DEST_PATH_IMAGE015
Figure 852526DEST_PATH_IMAGE016
Figure 181876DEST_PATH_IMAGE025
Figure 443093DEST_PATH_IMAGE017
Figure 174288DEST_PATH_IMAGE064
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 167652DEST_PATH_IMAGE059
Carry out H1=
Figure 984299DEST_PATH_IMAGE060
Figure 49206DEST_PATH_IMAGE010
Figure 103116DEST_PATH_IMAGE061
Figure 706136DEST_PATH_IMAGE012
Figure 146344DEST_PATH_IMAGE021
Figure 809407DEST_PATH_IMAGE013
Figure 272749DEST_PATH_IMAGE062
Figure 974175DEST_PATH_IMAGE023
Figure 808139DEST_PATH_IMAGE015
Figure 821094DEST_PATH_IMAGE063
Figure 765916DEST_PATH_IMAGE016
Figure 180717DEST_PATH_IMAGE025
Figure 185582DEST_PATH_IMAGE017
Figure 685834DEST_PATH_IMAGE064
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 372030DEST_PATH_IMAGE065
Figure 641337DEST_PATH_IMAGE010
Figure 804651DEST_PATH_IMAGE011
Figure 114714DEST_PATH_IMAGE066
Figure 522878DEST_PATH_IMAGE028
Figure 997722DEST_PATH_IMAGE013
Figure 88038DEST_PATH_IMAGE067
Figure 269620DEST_PATH_IMAGE014
Figure 787189DEST_PATH_IMAGE029
Figure 112177DEST_PATH_IMAGE068
Figure 476163DEST_PATH_IMAGE016
Figure 164633DEST_PATH_IMAGE030
Figure 286173DEST_PATH_IMAGE017
Figure 718291DEST_PATH_IMAGE069
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 936783DEST_PATH_IMAGE070
Carry out H2=
Figure 796154DEST_PATH_IMAGE065
Figure 467307DEST_PATH_IMAGE010
Figure 375220DEST_PATH_IMAGE027
Figure 448219DEST_PATH_IMAGE011
Figure 636940DEST_PATH_IMAGE012
Figure 410861DEST_PATH_IMAGE028
Figure 276049DEST_PATH_IMAGE013
Figure 477223DEST_PATH_IMAGE067
Figure 122968DEST_PATH_IMAGE014
Figure 700580DEST_PATH_IMAGE029
Figure 854667DEST_PATH_IMAGE068
Figure 987708DEST_PATH_IMAGE016
Figure 103431DEST_PATH_IMAGE030
Figure 943211DEST_PATH_IMAGE017
Figure 486188DEST_PATH_IMAGE069
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 106525DEST_PATH_IMAGE071
Figure 760361DEST_PATH_IMAGE010
Figure 516964DEST_PATH_IMAGE032
Figure 434105DEST_PATH_IMAGE011
Figure 276159DEST_PATH_IMAGE072
Figure 733685DEST_PATH_IMAGE012
Figure 669761DEST_PATH_IMAGE033
Figure 554541DEST_PATH_IMAGE013
Figure 883891DEST_PATH_IMAGE073
Figure 82791DEST_PATH_IMAGE014
Figure 813986DEST_PATH_IMAGE034
Figure 869667DEST_PATH_IMAGE015
Figure 686313DEST_PATH_IMAGE074
Figure 485642DEST_PATH_IMAGE016
Figure 9027DEST_PATH_IMAGE035
Figure 501189DEST_PATH_IMAGE017
Figure 805131DEST_PATH_IMAGE075
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 142571DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100233702A 2013-01-22 2013-01-22 Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark Pending CN103106459A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100233702A CN103106459A (en) 2013-01-22 2013-01-22 Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100233702A CN103106459A (en) 2013-01-22 2013-01-22 Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106459A true CN103106459A (en) 2013-05-15

Family

ID=48314305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100233702A Pending CN103106459A (en) 2013-01-22 2013-01-22 Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106459A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106498B (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106464B (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106476B (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106467B (en) Single parameter variable transmutation binary circulation anti-fake information storage trademark
CN103106466B (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106450B (en) Single parameter multivariable unitary circulation anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103106523B (en) Multiparameter univariate multielement cycle encryption anti-fake information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106463B (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515