CN103106460A - Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark - Google Patents

Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark Download PDF

Info

Publication number
CN103106460A
CN103106460A CN2013100233897A CN201310023389A CN103106460A CN 103106460 A CN103106460 A CN 103106460A CN 2013100233897 A CN2013100233897 A CN 2013100233897A CN 201310023389 A CN201310023389 A CN 201310023389A CN 103106460 A CN103106460 A CN 103106460A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100233897A
Other languages
Chinese (zh)
Inventor
曹鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100233897A priority Critical patent/CN103106460A/en
Publication of CN103106460A publication Critical patent/CN103106460A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

Discloses is a multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark. The multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark can enable binary system anti-fake information to be generated into a binary system anti-fake signal through polynary encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multi-parametric-vargradient gradient hierarchical gradient polynary encryption anti-fake storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multi-parametric-vargradient gradient hierarchical gradient polynary encryption anti-fake storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100233897100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100233897100002DEST_PATH_IMAGE002
Figure 2013100233897100002DEST_PATH_IMAGE003
Figure 2013100233897100002DEST_PATH_IMAGE004
Figure 2013100233897100002DEST_PATH_IMAGE005
Figure 2013100233897100002DEST_PATH_IMAGE006
Figure 2013100233897100002DEST_PATH_IMAGE007
Figure 2013100233897100002DEST_PATH_IMAGE008
With
Figure 2013100233897100002DEST_PATH_IMAGE009
, encryption parameter
Figure 71983DEST_PATH_IMAGE003
Figure 100988DEST_PATH_IMAGE004
Figure 623760DEST_PATH_IMAGE005
Figure 562766DEST_PATH_IMAGE006
Figure 634497DEST_PATH_IMAGE007
Figure 29093DEST_PATH_IMAGE008
With
Figure 352627DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100233897100002DEST_PATH_IMAGE010
Figure 2013100233897100002DEST_PATH_IMAGE011
Figure 2013100233897100002DEST_PATH_IMAGE012
Figure 2013100233897100002DEST_PATH_IMAGE013
Figure 2013100233897100002DEST_PATH_IMAGE014
Figure 2013100233897100002DEST_PATH_IMAGE015
Figure 2013100233897100002DEST_PATH_IMAGE016
Figure 2013100233897100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 24436DEST_PATH_IMAGE010
Figure 17799DEST_PATH_IMAGE011
Figure 896763DEST_PATH_IMAGE012
Figure 758408DEST_PATH_IMAGE013
Figure 409357DEST_PATH_IMAGE014
Figure 963835DEST_PATH_IMAGE015
Figure 330094DEST_PATH_IMAGE016
Figure 729852DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 812615DEST_PATH_IMAGE011
Figure 994252DEST_PATH_IMAGE013
Figure 466713DEST_PATH_IMAGE016
Figure 473852DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 950969DEST_PATH_IMAGE010
Figure 583649DEST_PATH_IMAGE012
Figure 128900DEST_PATH_IMAGE013
Figure 726104DEST_PATH_IMAGE014
Figure 967117DEST_PATH_IMAGE015
Figure 16981DEST_PATH_IMAGE016
Figure 365923DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 552054DEST_PATH_IMAGE010
Figure 963968DEST_PATH_IMAGE011
Figure 376495DEST_PATH_IMAGE012
Figure 529127DEST_PATH_IMAGE013
Figure 835344DEST_PATH_IMAGE014
Figure 149650DEST_PATH_IMAGE015
Figure 177037DEST_PATH_IMAGE016
Figure 867781DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 294083DEST_PATH_IMAGE010
Figure 166410DEST_PATH_IMAGE012
Figure 788409DEST_PATH_IMAGE013
Figure 600693DEST_PATH_IMAGE015
Figure 334163DEST_PATH_IMAGE016
Figure 635219DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 863124DEST_PATH_IMAGE011
Figure 83889DEST_PATH_IMAGE012
Figure 946494DEST_PATH_IMAGE013
Figure 811682DEST_PATH_IMAGE014
Figure 75173DEST_PATH_IMAGE015
Figure 783235DEST_PATH_IMAGE016
Figure 157585DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 270422DEST_PATH_IMAGE010
Figure 704814DEST_PATH_IMAGE011
Figure 78212DEST_PATH_IMAGE013
Figure 45556DEST_PATH_IMAGE014
Figure 650850DEST_PATH_IMAGE015
Figure 67925DEST_PATH_IMAGE016
Figure 49656DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 743942DEST_PATH_IMAGE010
Figure 523067DEST_PATH_IMAGE011
Figure 693017DEST_PATH_IMAGE012
Figure 212860DEST_PATH_IMAGE013
Figure 886287DEST_PATH_IMAGE014
Figure 101892DEST_PATH_IMAGE015
Figure 493559DEST_PATH_IMAGE016
Figure 817093DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100233897100002DEST_PATH_IMAGE018
Figure 345027DEST_PATH_IMAGE010
Figure 731533DEST_PATH_IMAGE002
Figure 610496DEST_PATH_IMAGE011
Figure 472142DEST_PATH_IMAGE018
Figure 120161DEST_PATH_IMAGE012
Figure 677569DEST_PATH_IMAGE004
Figure 778249DEST_PATH_IMAGE013
Figure 443585DEST_PATH_IMAGE018
Figure 211690DEST_PATH_IMAGE014
Figure 546857DEST_PATH_IMAGE006
Figure 606790DEST_PATH_IMAGE018
Figure 229401DEST_PATH_IMAGE016
Figure 860103DEST_PATH_IMAGE008
Figure 180446DEST_PATH_IMAGE017
Figure 187585DEST_PATH_IMAGE018
, unitary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 2013100233897100002DEST_PATH_IMAGE019
Figure 859449DEST_PATH_IMAGE003
Figure 422017DEST_PATH_IMAGE011
Figure 967268DEST_PATH_IMAGE019
Figure 439837DEST_PATH_IMAGE012
Figure 412341DEST_PATH_IMAGE004
Figure 465136DEST_PATH_IMAGE013
Figure 814077DEST_PATH_IMAGE019
Figure 265787DEST_PATH_IMAGE014
Figure 674772DEST_PATH_IMAGE006
Figure 214862DEST_PATH_IMAGE015
Figure 101916DEST_PATH_IMAGE019
Figure 283498DEST_PATH_IMAGE016
Figure 708111DEST_PATH_IMAGE008
Figure 426241DEST_PATH_IMAGE019
, unitary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100233897100002DEST_PATH_IMAGE020
Figure 337752DEST_PATH_IMAGE003
Figure 849504DEST_PATH_IMAGE011
Figure 362099DEST_PATH_IMAGE012
Figure 283787DEST_PATH_IMAGE004
Figure 17257DEST_PATH_IMAGE013
Figure 190749DEST_PATH_IMAGE020
Figure 213008DEST_PATH_IMAGE020
Figure 471339DEST_PATH_IMAGE016
Figure 442892DEST_PATH_IMAGE017
, unitary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 364471DEST_PATH_IMAGE003
Figure 559829DEST_PATH_IMAGE011
Figure 865433DEST_PATH_IMAGE021
Figure 829846DEST_PATH_IMAGE012
Figure 435140DEST_PATH_IMAGE005
Figure 852215DEST_PATH_IMAGE013
Figure 632359DEST_PATH_IMAGE014
Figure 408554DEST_PATH_IMAGE006
Figure 973713DEST_PATH_IMAGE021
Figure 650070DEST_PATH_IMAGE016
Figure 862745DEST_PATH_IMAGE008
Figure 254412DEST_PATH_IMAGE017
Figure 312367DEST_PATH_IMAGE021
, unitary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 2013100233897100002DEST_PATH_IMAGE022
Figure 233443DEST_PATH_IMAGE010
Figure 230404DEST_PATH_IMAGE011
Figure 360558DEST_PATH_IMAGE022
Figure 883943DEST_PATH_IMAGE012
Figure 695962DEST_PATH_IMAGE013
Figure 866754DEST_PATH_IMAGE014
Figure 592133DEST_PATH_IMAGE006
Figure 180109DEST_PATH_IMAGE015
Figure 780745DEST_PATH_IMAGE008
Figure 128736DEST_PATH_IMAGE022
, unitary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 2013100233897100002DEST_PATH_IMAGE023
Figure 733417DEST_PATH_IMAGE010
Figure 535020DEST_PATH_IMAGE003
Figure 97588DEST_PATH_IMAGE011
Figure 911348DEST_PATH_IMAGE023
Figure 118339DEST_PATH_IMAGE012
Figure 356422DEST_PATH_IMAGE005
Figure 755228DEST_PATH_IMAGE023
Figure 209868DEST_PATH_IMAGE014
Figure 618852DEST_PATH_IMAGE007
Figure 890434DEST_PATH_IMAGE015
Figure 43066DEST_PATH_IMAGE023
Figure 352212DEST_PATH_IMAGE016
Figure 56732DEST_PATH_IMAGE008
Figure 956555DEST_PATH_IMAGE017
Figure 647299DEST_PATH_IMAGE023
, unitary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 2013100233897100002DEST_PATH_IMAGE024
Figure 662935DEST_PATH_IMAGE003
Figure 909109DEST_PATH_IMAGE011
Figure 406474DEST_PATH_IMAGE024
Figure 608971DEST_PATH_IMAGE005
Figure 217807DEST_PATH_IMAGE013
Figure 250354DEST_PATH_IMAGE024
Figure 388599DEST_PATH_IMAGE014
Figure 481188DEST_PATH_IMAGE007
Figure 701954DEST_PATH_IMAGE015
Figure 538192DEST_PATH_IMAGE024
Figure 796523DEST_PATH_IMAGE016
Figure 60014DEST_PATH_IMAGE008
Figure 256158DEST_PATH_IMAGE017
Figure 896087DEST_PATH_IMAGE024
, unitary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 2013100233897100002DEST_PATH_IMAGE025
Figure 497729DEST_PATH_IMAGE011
Figure 675770DEST_PATH_IMAGE025
Figure 640183DEST_PATH_IMAGE012
Figure 120843DEST_PATH_IMAGE005
Figure 806427DEST_PATH_IMAGE013
Figure 522579DEST_PATH_IMAGE025
Figure 607079DEST_PATH_IMAGE014
Figure 383274DEST_PATH_IMAGE007
Figure 314012DEST_PATH_IMAGE015
Figure 833855DEST_PATH_IMAGE025
Figure 772861DEST_PATH_IMAGE016
Figure 719957DEST_PATH_IMAGE009
Figure 114554DEST_PATH_IMAGE017
Figure 438088DEST_PATH_IMAGE025
, set encryption parameter
Figure 231600DEST_PATH_IMAGE002
Figure 224964DEST_PATH_IMAGE003
Figure 103927DEST_PATH_IMAGE004
Figure 234082DEST_PATH_IMAGE005
Figure 46366DEST_PATH_IMAGE007
With
Figure 77962DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 583417DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100233897100002DEST_PATH_IMAGE026
Carry out H1=
Figure 2013100233897100002DEST_PATH_IMAGE027
Figure 558064DEST_PATH_IMAGE010
Figure 148970DEST_PATH_IMAGE002
Figure 746676DEST_PATH_IMAGE012
Figure 821949DEST_PATH_IMAGE004
Figure 832017DEST_PATH_IMAGE013
Figure 184501DEST_PATH_IMAGE027
Figure 251683DEST_PATH_IMAGE014
Figure 814252DEST_PATH_IMAGE006
Figure 625082DEST_PATH_IMAGE015
Figure 959636DEST_PATH_IMAGE027
Figure 122950DEST_PATH_IMAGE008
Figure 471891DEST_PATH_IMAGE017
Unitary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 69936DEST_PATH_IMAGE026
Carry out H1=
Figure 607097DEST_PATH_IMAGE027
Figure 635096DEST_PATH_IMAGE010
Figure 521198DEST_PATH_IMAGE011
Figure 259568DEST_PATH_IMAGE027
Figure 950312DEST_PATH_IMAGE012
Figure 251980DEST_PATH_IMAGE004
Figure 2768DEST_PATH_IMAGE013
Figure 248941DEST_PATH_IMAGE027
Figure 746306DEST_PATH_IMAGE014
Figure 824170DEST_PATH_IMAGE015
Figure 557639DEST_PATH_IMAGE027
Figure 590186DEST_PATH_IMAGE016
Figure 728431DEST_PATH_IMAGE008
Figure 917153DEST_PATH_IMAGE027
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H2=
Figure 2013100233897100002DEST_PATH_IMAGE028
Figure 878024DEST_PATH_IMAGE010
Figure 134267DEST_PATH_IMAGE011
Figure 357624DEST_PATH_IMAGE012
Figure 830980DEST_PATH_IMAGE004
Figure 265372DEST_PATH_IMAGE013
Figure 514137DEST_PATH_IMAGE014
Figure 478551DEST_PATH_IMAGE006
Figure 86774DEST_PATH_IMAGE015
Figure 769428DEST_PATH_IMAGE028
Figure 360947DEST_PATH_IMAGE016
Figure 179867DEST_PATH_IMAGE008
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100233897100002DEST_PATH_IMAGE029
Carry out H2=
Figure 587791DEST_PATH_IMAGE010
Figure 534887DEST_PATH_IMAGE003
Figure 801920DEST_PATH_IMAGE011
Figure 63332DEST_PATH_IMAGE004
Figure 942295DEST_PATH_IMAGE013
Figure 806870DEST_PATH_IMAGE028
Figure 454889DEST_PATH_IMAGE014
Figure 9367DEST_PATH_IMAGE006
Figure 375627DEST_PATH_IMAGE015
Figure 421785DEST_PATH_IMAGE016
Figure 881585DEST_PATH_IMAGE008
Figure 735140DEST_PATH_IMAGE017
Figure 813955DEST_PATH_IMAGE028
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H3=
Figure 2013100233897100002DEST_PATH_IMAGE030
Figure 688763DEST_PATH_IMAGE010
Figure 585044DEST_PATH_IMAGE003
Figure 660316DEST_PATH_IMAGE011
Figure 670385DEST_PATH_IMAGE030
Figure 147503DEST_PATH_IMAGE012
Figure 466882DEST_PATH_IMAGE004
Figure 904816DEST_PATH_IMAGE013
Figure 450067DEST_PATH_IMAGE030
Figure 47271DEST_PATH_IMAGE014
Figure 412917DEST_PATH_IMAGE006
Figure 462782DEST_PATH_IMAGE015
Figure 811724DEST_PATH_IMAGE030
Figure 534402DEST_PATH_IMAGE008
Figure 71563DEST_PATH_IMAGE017
Figure 99562DEST_PATH_IMAGE030
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out unitary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, unitary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 824211DEST_PATH_IMAGE002
Figure 724034DEST_PATH_IMAGE003
Figure 329218DEST_PATH_IMAGE006
Figure 840971DEST_PATH_IMAGE007
Figure 210772DEST_PATH_IMAGE008
With
Figure 226002DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by unitary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 399887DEST_PATH_IMAGE018
Figure 8723DEST_PATH_IMAGE010
Figure 306849DEST_PATH_IMAGE002
Figure 442165DEST_PATH_IMAGE011
Figure 662318DEST_PATH_IMAGE018
Figure 883084DEST_PATH_IMAGE012
Figure 719321DEST_PATH_IMAGE004
Figure 584509DEST_PATH_IMAGE013
Figure 558992DEST_PATH_IMAGE014
Figure 605205DEST_PATH_IMAGE018
Figure 800563DEST_PATH_IMAGE016
Figure 978603DEST_PATH_IMAGE008
Figure 818383DEST_PATH_IMAGE017
Figure 891572DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 308647DEST_PATH_IMAGE019
Figure 290379DEST_PATH_IMAGE010
Figure 984665DEST_PATH_IMAGE003
Figure 137691DEST_PATH_IMAGE011
Figure 310571DEST_PATH_IMAGE019
Figure 705780DEST_PATH_IMAGE012
Figure 379207DEST_PATH_IMAGE004
Figure 485014DEST_PATH_IMAGE019
Figure 683915DEST_PATH_IMAGE014
Figure 214778DEST_PATH_IMAGE006
Figure 598354DEST_PATH_IMAGE015
Figure 477318DEST_PATH_IMAGE019
Figure 338963DEST_PATH_IMAGE016
Figure 862348DEST_PATH_IMAGE008
Figure 170489DEST_PATH_IMAGE017
Figure 271169DEST_PATH_IMAGE019
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 915998DEST_PATH_IMAGE020
Figure 559468DEST_PATH_IMAGE010
Figure 19269DEST_PATH_IMAGE003
Figure 872824DEST_PATH_IMAGE011
Figure 76272DEST_PATH_IMAGE020
Figure 207881DEST_PATH_IMAGE004
Figure 548732DEST_PATH_IMAGE013
Figure 32989DEST_PATH_IMAGE014
Figure 975537DEST_PATH_IMAGE006
Figure 541035DEST_PATH_IMAGE015
Figure 683490DEST_PATH_IMAGE016
Figure 655994DEST_PATH_IMAGE008
Figure 708788DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 384806DEST_PATH_IMAGE021
Figure 793790DEST_PATH_IMAGE010
Figure 330951DEST_PATH_IMAGE003
Figure 220934DEST_PATH_IMAGE011
Figure 402517DEST_PATH_IMAGE021
Figure 982403DEST_PATH_IMAGE012
Figure 6859DEST_PATH_IMAGE005
Figure 733693DEST_PATH_IMAGE021
Figure 487410DEST_PATH_IMAGE014
Figure 999162DEST_PATH_IMAGE006
Figure 228019DEST_PATH_IMAGE015
Figure 508827DEST_PATH_IMAGE021
Figure 305882DEST_PATH_IMAGE016
Figure 42281DEST_PATH_IMAGE008
Figure 340407DEST_PATH_IMAGE017
Figure 475722DEST_PATH_IMAGE021
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 568312DEST_PATH_IMAGE022
Figure 664444DEST_PATH_IMAGE010
Figure 493433DEST_PATH_IMAGE011
Figure 756925DEST_PATH_IMAGE022
Figure 340353DEST_PATH_IMAGE012
Figure 285369DEST_PATH_IMAGE022
Figure 356093DEST_PATH_IMAGE014
Figure 534134DEST_PATH_IMAGE006
Figure 498547DEST_PATH_IMAGE015
Figure 106771DEST_PATH_IMAGE022
Figure 523846DEST_PATH_IMAGE016
Figure 505577DEST_PATH_IMAGE008
Figure 324497DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 148938DEST_PATH_IMAGE023
Figure 668782DEST_PATH_IMAGE010
Figure 342208DEST_PATH_IMAGE003
Figure 554884DEST_PATH_IMAGE011
Figure 676314DEST_PATH_IMAGE005
Figure 673275DEST_PATH_IMAGE023
Figure 675866DEST_PATH_IMAGE014
Figure 326815DEST_PATH_IMAGE007
Figure 615713DEST_PATH_IMAGE015
Figure 647309DEST_PATH_IMAGE016
Figure 152764DEST_PATH_IMAGE008
Figure 753510DEST_PATH_IMAGE017
Figure 341486DEST_PATH_IMAGE023
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 810514DEST_PATH_IMAGE024
Figure 433125DEST_PATH_IMAGE010
Figure 66756DEST_PATH_IMAGE003
Figure 282974DEST_PATH_IMAGE011
Figure 290113DEST_PATH_IMAGE024
Figure 568833DEST_PATH_IMAGE005
Figure 6768DEST_PATH_IMAGE013
Figure 820528DEST_PATH_IMAGE024
Figure 390235DEST_PATH_IMAGE007
Figure 440100DEST_PATH_IMAGE015
Figure 768534DEST_PATH_IMAGE024
Figure 95610DEST_PATH_IMAGE016
Figure 504594DEST_PATH_IMAGE008
Figure 776176DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 110391DEST_PATH_IMAGE025
Figure 693207DEST_PATH_IMAGE010
Figure 717663DEST_PATH_IMAGE003
Figure 408408DEST_PATH_IMAGE011
Figure 569131DEST_PATH_IMAGE025
Figure 322847DEST_PATH_IMAGE012
Figure 444387DEST_PATH_IMAGE005
Figure 938823DEST_PATH_IMAGE013
Figure 219631DEST_PATH_IMAGE025
Figure 141320DEST_PATH_IMAGE014
Figure 877719DEST_PATH_IMAGE007
Figure 785632DEST_PATH_IMAGE015
Figure 920947DEST_PATH_IMAGE025
Figure 13537DEST_PATH_IMAGE016
Figure 234303DEST_PATH_IMAGE009
Figure 73470DEST_PATH_IMAGE017
Figure 204237DEST_PATH_IMAGE025
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 221391DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 690240DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 330169DEST_PATH_IMAGE026
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out unitary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 749835DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Multi-parametric-vargradient gradient hierarchical gradient polynary encryption anti-fake storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100233897100001DEST_PATH_IMAGE002
Figure 2013100233897100001DEST_PATH_IMAGE003
Figure 2013100233897100001DEST_PATH_IMAGE004
Figure 2013100233897100001DEST_PATH_IMAGE005
Figure 2013100233897100001DEST_PATH_IMAGE006
Figure 2013100233897100001DEST_PATH_IMAGE007
Figure 2013100233897100001DEST_PATH_IMAGE008
With, encryption parameter
Figure 177258DEST_PATH_IMAGE002
Figure 219032DEST_PATH_IMAGE003
Figure 998769DEST_PATH_IMAGE004
Figure 518612DEST_PATH_IMAGE005
Figure 799311DEST_PATH_IMAGE008
WithFor 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100233897100001DEST_PATH_IMAGE011
Figure 2013100233897100001DEST_PATH_IMAGE012
Figure 2013100233897100001DEST_PATH_IMAGE013
Figure 2013100233897100001DEST_PATH_IMAGE014
Figure 2013100233897100001DEST_PATH_IMAGE015
Figure 2013100233897100001DEST_PATH_IMAGE016
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 794654DEST_PATH_IMAGE010
Figure 939018DEST_PATH_IMAGE011
Figure 693348DEST_PATH_IMAGE012
Figure 203012DEST_PATH_IMAGE014
Figure 757491DEST_PATH_IMAGE015
Figure 999116DEST_PATH_IMAGE016
Figure 401803DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 169908DEST_PATH_IMAGE010
Figure 629708DEST_PATH_IMAGE011
Figure 562078DEST_PATH_IMAGE013
Figure 187619DEST_PATH_IMAGE014
Figure 83899DEST_PATH_IMAGE015
Figure 159172DEST_PATH_IMAGE016
Figure 166311DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 646358DEST_PATH_IMAGE010
Figure 588906DEST_PATH_IMAGE011
Figure 151475DEST_PATH_IMAGE012
Figure 696726DEST_PATH_IMAGE013
Figure 293929DEST_PATH_IMAGE014
Figure 86271DEST_PATH_IMAGE016
Figure 435213DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 621344DEST_PATH_IMAGE010
Figure 33258DEST_PATH_IMAGE011
Figure 723051DEST_PATH_IMAGE013
Figure 904634DEST_PATH_IMAGE014
Figure 218941DEST_PATH_IMAGE015
Figure 246327DEST_PATH_IMAGE016
Figure 937071DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 363373DEST_PATH_IMAGE010
Figure 723948DEST_PATH_IMAGE011
Figure 709628DEST_PATH_IMAGE013
Figure 724857DEST_PATH_IMAGE014
Figure 521912DEST_PATH_IMAGE015
Figure 255382DEST_PATH_IMAGE016
Figure 553508DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 691753DEST_PATH_IMAGE010
Figure 659709DEST_PATH_IMAGE011
Figure 880474DEST_PATH_IMAGE012
Figure 841346DEST_PATH_IMAGE013
Figure 97588DEST_PATH_IMAGE015
Figure 805650DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 165273DEST_PATH_IMAGE010
Figure 602595DEST_PATH_IMAGE011
Figure 797953DEST_PATH_IMAGE012
Figure 975994DEST_PATH_IMAGE013
Figure 940408DEST_PATH_IMAGE014
Figure 548631DEST_PATH_IMAGE015
Figure 965706DEST_PATH_IMAGE016
Figure 947437DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 641724DEST_PATH_IMAGE010
Figure 417919DEST_PATH_IMAGE011
Figure 590799DEST_PATH_IMAGE012
Figure 110642DEST_PATH_IMAGE013
Figure 784069DEST_PATH_IMAGE014
Figure 872110DEST_PATH_IMAGE015
Figure 263777DEST_PATH_IMAGE016
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100233897100001DEST_PATH_IMAGE018
Figure 242808DEST_PATH_IMAGE010
Figure 501751DEST_PATH_IMAGE002
Figure 380714DEST_PATH_IMAGE011
Figure 245290DEST_PATH_IMAGE018
Figure 893309DEST_PATH_IMAGE012
Figure 447787DEST_PATH_IMAGE004
Figure 423833DEST_PATH_IMAGE013
Figure 89170DEST_PATH_IMAGE018
Figure 883641DEST_PATH_IMAGE014
Figure 343442DEST_PATH_IMAGE006
Figure 196997DEST_PATH_IMAGE015
Figure 898423DEST_PATH_IMAGE016
Figure 532054DEST_PATH_IMAGE008
Figure 872905DEST_PATH_IMAGE017
Figure 880044DEST_PATH_IMAGE018
, unitary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 2013100233897100001DEST_PATH_IMAGE019
Figure 484726DEST_PATH_IMAGE010
Figure 551908DEST_PATH_IMAGE003
Figure 114476DEST_PATH_IMAGE011
Figure 659727DEST_PATH_IMAGE019
Figure 132297DEST_PATH_IMAGE012
Figure 232364DEST_PATH_IMAGE004
Figure 282229DEST_PATH_IMAGE013
Figure 506536DEST_PATH_IMAGE019
Figure 794375DEST_PATH_IMAGE019
Figure 555843DEST_PATH_IMAGE008
Figure 84694DEST_PATH_IMAGE017
Figure 775439DEST_PATH_IMAGE019
, unitary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100233897100001DEST_PATH_IMAGE020
Figure 936162DEST_PATH_IMAGE010
Figure 814512DEST_PATH_IMAGE003
Figure 326265DEST_PATH_IMAGE011
Figure 711296DEST_PATH_IMAGE012
Figure 632985DEST_PATH_IMAGE004
Figure 345946DEST_PATH_IMAGE013
Figure 644073DEST_PATH_IMAGE020
Figure 779388DEST_PATH_IMAGE014
Figure 871977DEST_PATH_IMAGE006
Figure 968109DEST_PATH_IMAGE015
Figure 541698DEST_PATH_IMAGE020
Figure 797099DEST_PATH_IMAGE016
Figure 185223DEST_PATH_IMAGE008
Figure 896215DEST_PATH_IMAGE017
Figure 270565DEST_PATH_IMAGE020
, unitary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 2013100233897100001DEST_PATH_IMAGE021
Figure 814864DEST_PATH_IMAGE003
Figure 13152DEST_PATH_IMAGE011
Figure 30972DEST_PATH_IMAGE012
Figure 636266DEST_PATH_IMAGE005
Figure 53341DEST_PATH_IMAGE013
Figure 910439DEST_PATH_IMAGE021
Figure 508484DEST_PATH_IMAGE006
Figure 198277DEST_PATH_IMAGE021
Figure 874633DEST_PATH_IMAGE016
Figure 478976DEST_PATH_IMAGE017
Figure 412297DEST_PATH_IMAGE021
, unitary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 2013100233897100001DEST_PATH_IMAGE022
Figure 333373DEST_PATH_IMAGE010
Figure 716950DEST_PATH_IMAGE003
Figure 397406DEST_PATH_IMAGE005
Figure 806894DEST_PATH_IMAGE014
Figure 558640DEST_PATH_IMAGE006
Figure 146616DEST_PATH_IMAGE015
Figure 615644DEST_PATH_IMAGE022
Figure 238255DEST_PATH_IMAGE016
Figure 871886DEST_PATH_IMAGE008
Figure 212738DEST_PATH_IMAGE017
Figure 95243DEST_PATH_IMAGE022
, unitary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 2013100233897100001DEST_PATH_IMAGE023
Figure 696994DEST_PATH_IMAGE010
Figure 501527DEST_PATH_IMAGE003
Figure 939462DEST_PATH_IMAGE011
Figure 319999DEST_PATH_IMAGE005
Figure 372793DEST_PATH_IMAGE013
Figure 597101DEST_PATH_IMAGE023
Figure 48811DEST_PATH_IMAGE014
Figure 884939DEST_PATH_IMAGE023
Figure 646408DEST_PATH_IMAGE008
Figure 364539DEST_PATH_IMAGE023
, unitary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 528191DEST_PATH_IMAGE024
Figure 278978DEST_PATH_IMAGE010
Figure 525152DEST_PATH_IMAGE003
Figure 279888DEST_PATH_IMAGE024
Figure 76943DEST_PATH_IMAGE012
Figure 810412DEST_PATH_IMAGE005
Figure 842959DEST_PATH_IMAGE013
Figure 978275DEST_PATH_IMAGE024
Figure 946231DEST_PATH_IMAGE014
Figure 6164DEST_PATH_IMAGE015
Figure 261565DEST_PATH_IMAGE024
Figure 842905DEST_PATH_IMAGE008
Figure 595670DEST_PATH_IMAGE024
, unitary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 30063DEST_PATH_IMAGE025
Figure 959842DEST_PATH_IMAGE010
Figure 140812DEST_PATH_IMAGE003
Figure 105226DEST_PATH_IMAGE011
Figure 710519DEST_PATH_IMAGE025
Figure 268539DEST_PATH_IMAGE012
Figure 984692DEST_PATH_IMAGE005
Figure 72121DEST_PATH_IMAGE013
Figure 848316DEST_PATH_IMAGE025
Figure 628053DEST_PATH_IMAGE014
Figure 147896DEST_PATH_IMAGE007
Figure 86902DEST_PATH_IMAGE015
Figure 428595DEST_PATH_IMAGE016
Figure 752129DEST_PATH_IMAGE009
Figure 421008DEST_PATH_IMAGE017
Figure 539005DEST_PATH_IMAGE025
, set encryption parameter
Figure 420898DEST_PATH_IMAGE002
Figure 548123DEST_PATH_IMAGE003
Figure 196142DEST_PATH_IMAGE004
Figure 726667DEST_PATH_IMAGE006
Figure 394933DEST_PATH_IMAGE007
Figure 897458DEST_PATH_IMAGE008
WithInitial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 86180DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 555207DEST_PATH_IMAGE026
Carry out H1=
Figure 251107DEST_PATH_IMAGE027
Figure 347293DEST_PATH_IMAGE002
Figure 229799DEST_PATH_IMAGE011
Figure 709846DEST_PATH_IMAGE027
Figure 612544DEST_PATH_IMAGE027
Figure 725994DEST_PATH_IMAGE014
Figure 152689DEST_PATH_IMAGE006
Figure 99676DEST_PATH_IMAGE016
Figure 789469DEST_PATH_IMAGE017
Figure 95685DEST_PATH_IMAGE027
Unitary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 550938DEST_PATH_IMAGE026
Carry out H1=
Figure 429791DEST_PATH_IMAGE002
Figure 180578DEST_PATH_IMAGE011
Figure 302118DEST_PATH_IMAGE027
Figure 776046DEST_PATH_IMAGE012
Figure 56854DEST_PATH_IMAGE004
Figure 978543DEST_PATH_IMAGE013
Figure 587379DEST_PATH_IMAGE027
Figure 619925DEST_PATH_IMAGE014
Figure 758170DEST_PATH_IMAGE006
Figure 850760DEST_PATH_IMAGE015
Figure 71526DEST_PATH_IMAGE027
Figure 872068DEST_PATH_IMAGE027
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H2=
Figure 231691DEST_PATH_IMAGE010
Figure 669013DEST_PATH_IMAGE003
Figure 864371DEST_PATH_IMAGE011
Figure 917778DEST_PATH_IMAGE028
Figure 882192DEST_PATH_IMAGE012
Figure 487485DEST_PATH_IMAGE004
Figure 422337DEST_PATH_IMAGE013
Figure 13855DEST_PATH_IMAGE028
Figure 832775DEST_PATH_IMAGE014
Figure 877479DEST_PATH_IMAGE006
Figure 927792DEST_PATH_IMAGE028
Figure 869728DEST_PATH_IMAGE016
Figure 692190DEST_PATH_IMAGE008
Figure 208491DEST_PATH_IMAGE017
Figure 532025DEST_PATH_IMAGE028
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 351905DEST_PATH_IMAGE029
Carry out H2=
Figure 345268DEST_PATH_IMAGE028
Figure 725696DEST_PATH_IMAGE010
Figure 462708DEST_PATH_IMAGE003
Figure 110727DEST_PATH_IMAGE011
Figure 665205DEST_PATH_IMAGE028
Figure 34394DEST_PATH_IMAGE012
Figure 434152DEST_PATH_IMAGE004
Figure 202256DEST_PATH_IMAGE013
Figure 662057DEST_PATH_IMAGE028
Figure 643175DEST_PATH_IMAGE014
Figure 846624DEST_PATH_IMAGE006
Figure 344601DEST_PATH_IMAGE015
Figure 240882DEST_PATH_IMAGE028
Figure 443718DEST_PATH_IMAGE016
Figure 927974DEST_PATH_IMAGE017
Figure 998086DEST_PATH_IMAGE028
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H3=
Figure 438950DEST_PATH_IMAGE030
Figure 984201DEST_PATH_IMAGE010
Figure 456771DEST_PATH_IMAGE003
Figure 694854DEST_PATH_IMAGE011
Figure 744719DEST_PATH_IMAGE030
Figure 134649DEST_PATH_IMAGE004
Figure 543634DEST_PATH_IMAGE013
Figure 80795DEST_PATH_IMAGE030
Figure 542573DEST_PATH_IMAGE006
Figure 856880DEST_PATH_IMAGE015
Figure 756703DEST_PATH_IMAGE030
Figure 447447DEST_PATH_IMAGE016
Figure 361887DEST_PATH_IMAGE017
Figure 749006DEST_PATH_IMAGE030
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 243441DEST_PATH_IMAGE001
Carry out unitary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100233897A 2013-01-22 2013-01-22 Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark Pending CN103106460A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100233897A CN103106460A (en) 2013-01-22 2013-01-22 Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100233897A CN103106460A (en) 2013-01-22 2013-01-22 Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark

Publications (1)

Publication Number Publication Date
CN103106460A true CN103106460A (en) 2013-05-15

Family

ID=48314306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100233897A Pending CN103106460A (en) 2013-01-22 2013-01-22 Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark

Country Status (1)

Country Link
CN (1) CN103106460A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106183533A (en) * 2016-09-25 2016-12-07 北京印刷学院 Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106218263A (en) * 2016-09-25 2016-12-14 北京印刷学院 Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427283A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427282A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106183533A (en) * 2016-09-25 2016-12-07 北京印刷学院 Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106218263A (en) * 2016-09-25 2016-12-14 北京印刷学院 Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427283A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427282A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515