CN103106469A - Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark - Google Patents

Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106469A
CN103106469A CN2013100234480A CN201310023448A CN103106469A CN 103106469 A CN103106469 A CN 103106469A CN 2013100234480 A CN2013100234480 A CN 2013100234480A CN 201310023448 A CN201310023448 A CN 201310023448A CN 103106469 A CN103106469 A CN 103106469A
Authority
CN
China
Prior art keywords
binary
counterfeiting information
trade mark
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100234480A
Other languages
Chinese (zh)
Inventor
王明飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100234480A priority Critical patent/CN103106469A/en
Publication of CN103106469A publication Critical patent/CN103106469A/en
Pending legal-status Critical Current

Links

Images

Abstract

A single parameter multivariable unitary encryption anti-counterfeiting information storage trademark can enable binary anti-counterfeiting information to be generated into binary modulation signals through unitary encryption and channel coding, and enable the anti-counterfeiting information to be embedded into a whole trademark page through ordered changing of conductivity of amplitude modulation dots in a circulation table look-up method mode. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the single parameter multivariable unitary encryption anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

One-parameter multivariate monobasic encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of one-parameter multivariate monobasic encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 628002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, the eight-digit binary number encryption parameter is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, the eight-digit binary number encryption variables is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 108925DEST_PATH_IMAGE002
Figure 950979DEST_PATH_IMAGE003
Figure 408505DEST_PATH_IMAGE004
Figure 285194DEST_PATH_IMAGE005
Figure 683157DEST_PATH_IMAGE006
Figure 273724DEST_PATH_IMAGE008
Figure 4920DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 562065DEST_PATH_IMAGE002
Figure 441028DEST_PATH_IMAGE003
Figure 240357DEST_PATH_IMAGE004
Figure 327524DEST_PATH_IMAGE005
Figure 819685DEST_PATH_IMAGE006
Figure 123628DEST_PATH_IMAGE007
Figure 398751DEST_PATH_IMAGE008
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 3487DEST_PATH_IMAGE002
Figure 794726DEST_PATH_IMAGE003
Figure 496151DEST_PATH_IMAGE005
Figure 831580DEST_PATH_IMAGE006
Figure 844535DEST_PATH_IMAGE007
Figure 789358DEST_PATH_IMAGE008
Figure 204158DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 210740DEST_PATH_IMAGE003
Figure 792342DEST_PATH_IMAGE005
Figure 968109DEST_PATH_IMAGE006
Figure 955656DEST_PATH_IMAGE007
Figure 806063DEST_PATH_IMAGE008
Figure 929877DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 276544DEST_PATH_IMAGE002
Figure 751388DEST_PATH_IMAGE003
Figure 331450DEST_PATH_IMAGE004
Figure 789479DEST_PATH_IMAGE007
Figure 919371DEST_PATH_IMAGE008
Figure 283356DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 706247DEST_PATH_IMAGE002
Figure 155683DEST_PATH_IMAGE003
Figure 89267DEST_PATH_IMAGE004
Figure 42179DEST_PATH_IMAGE005
Figure 901551DEST_PATH_IMAGE006
Figure 572703DEST_PATH_IMAGE007
Figure 309978DEST_PATH_IMAGE008
Figure 382976DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 413249DEST_PATH_IMAGE002
Figure 847083DEST_PATH_IMAGE004
Figure 774588DEST_PATH_IMAGE005
Figure 975762DEST_PATH_IMAGE006
Figure 185289DEST_PATH_IMAGE007
Figure 544912DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 551493DEST_PATH_IMAGE003
Figure 667217DEST_PATH_IMAGE004
Figure 506997DEST_PATH_IMAGE005
Figure 49974DEST_PATH_IMAGE006
Figure 404732DEST_PATH_IMAGE007
Figure 825611DEST_PATH_IMAGE008
Figure 582215DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 296093DEST_PATH_IMAGE002
Figure 403726DEST_PATH_IMAGE003
Figure 374436DEST_PATH_IMAGE004
Figure 985546DEST_PATH_IMAGE005
Figure 465254DEST_PATH_IMAGE007
Figure 227936DEST_PATH_IMAGE008
Figure 693553DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the monobasic cryptographic calculation is defined as H i=
Figure 14813DEST_PATH_IMAGE010
Figure 132252DEST_PATH_IMAGE011
Figure 717955DEST_PATH_IMAGE003
Figure 210116DEST_PATH_IMAGE012
Figure 936894DEST_PATH_IMAGE004
Figure 747167DEST_PATH_IMAGE005
Figure 144650DEST_PATH_IMAGE014
Figure 77020DEST_PATH_IMAGE015
Figure 138779DEST_PATH_IMAGE007
Figure 48015DEST_PATH_IMAGE008
Figure 556619DEST_PATH_IMAGE017
Figure 976285DEST_PATH_IMAGE018
, during binary operator control variables k=1, the monobasic cryptographic calculation is defined as H i=
Figure 460935DEST_PATH_IMAGE002
Figure 843692DEST_PATH_IMAGE003
Figure 831240DEST_PATH_IMAGE012
Figure 607611DEST_PATH_IMAGE004
Figure 997004DEST_PATH_IMAGE013
Figure 343671DEST_PATH_IMAGE005
Figure 450933DEST_PATH_IMAGE015
Figure 968502DEST_PATH_IMAGE007
Figure 432107DEST_PATH_IMAGE016
Figure 158940DEST_PATH_IMAGE017
Figure 847410DEST_PATH_IMAGE009
Figure 798311DEST_PATH_IMAGE018
, during binary operator control variables k=2, the monobasic cryptographic calculation is defined as H i=
Figure 964850DEST_PATH_IMAGE011
Figure 42714DEST_PATH_IMAGE012
Figure 215331DEST_PATH_IMAGE003
Figure 451140DEST_PATH_IMAGE010
Figure 524139DEST_PATH_IMAGE004
Figure 214325DEST_PATH_IMAGE005
Figure 722667DEST_PATH_IMAGE014
Figure 915751DEST_PATH_IMAGE006
Figure 54608DEST_PATH_IMAGE015
Figure 264135DEST_PATH_IMAGE007
Figure 623758DEST_PATH_IMAGE008
Figure 995834DEST_PATH_IMAGE017
Figure 630339DEST_PATH_IMAGE009
Figure 746063DEST_PATH_IMAGE018
, during binary operator control variables k=3, the monobasic cryptographic calculation is defined as H i=
Figure 648160DEST_PATH_IMAGE011
Figure 191137DEST_PATH_IMAGE002
Figure 978493DEST_PATH_IMAGE003
Figure 735096DEST_PATH_IMAGE013
Figure 448974DEST_PATH_IMAGE004
Figure 515599DEST_PATH_IMAGE005
Figure 277067DEST_PATH_IMAGE006
Figure 165837DEST_PATH_IMAGE007
Figure 897032DEST_PATH_IMAGE016
Figure 719757DEST_PATH_IMAGE008
Figure 208507DEST_PATH_IMAGE017
Figure 273415DEST_PATH_IMAGE009
Figure 859117DEST_PATH_IMAGE018
, during binary operator control variables k=4, the monobasic cryptographic calculation is defined as H i=
Figure 85699DEST_PATH_IMAGE011
Figure 891107DEST_PATH_IMAGE002
Figure 934335DEST_PATH_IMAGE003
Figure 597397DEST_PATH_IMAGE013
Figure 31232DEST_PATH_IMAGE014
Figure 591526DEST_PATH_IMAGE005
Figure 159911DEST_PATH_IMAGE010
Figure 299534DEST_PATH_IMAGE007
Figure 38819DEST_PATH_IMAGE016
Figure 102853DEST_PATH_IMAGE008
Figure 120673DEST_PATH_IMAGE009
, during binary operator control variables k=5, the monobasic cryptographic calculation is defined as H i=
Figure 773733DEST_PATH_IMAGE011
Figure 60358DEST_PATH_IMAGE002
Figure 449751DEST_PATH_IMAGE012
Figure 444831DEST_PATH_IMAGE013
Figure 535147DEST_PATH_IMAGE004
Figure 779046DEST_PATH_IMAGE014
Figure 296615DEST_PATH_IMAGE005
Figure 760220DEST_PATH_IMAGE015
Figure 487054DEST_PATH_IMAGE010
Figure 175524DEST_PATH_IMAGE007
Figure 860845DEST_PATH_IMAGE016
Figure 292964DEST_PATH_IMAGE008
Figure 511455DEST_PATH_IMAGE017
Figure 370827DEST_PATH_IMAGE009
Figure 543445DEST_PATH_IMAGE018
, during binary operator control variables k=6, the monobasic cryptographic calculation is defined as H i=
Figure 513675DEST_PATH_IMAGE011
Figure 586673DEST_PATH_IMAGE002
Figure 616946DEST_PATH_IMAGE012
Figure 276860DEST_PATH_IMAGE003
Figure 50781DEST_PATH_IMAGE013
Figure 243864DEST_PATH_IMAGE004
Figure 445039DEST_PATH_IMAGE014
Figure 966598DEST_PATH_IMAGE015
Figure 14188DEST_PATH_IMAGE006
Figure 887729DEST_PATH_IMAGE016
Figure 755191DEST_PATH_IMAGE007
Figure 870914DEST_PATH_IMAGE010
Figure 773011DEST_PATH_IMAGE008
Figure 641672DEST_PATH_IMAGE017
Figure 262009DEST_PATH_IMAGE009
Figure 915844DEST_PATH_IMAGE018
, during binary operator control variables k=7, the monobasic cryptographic calculation is defined as H i=
Figure 938027DEST_PATH_IMAGE011
Figure 153370DEST_PATH_IMAGE002
Figure 995424DEST_PATH_IMAGE012
Figure 452950DEST_PATH_IMAGE003
Figure 267322DEST_PATH_IMAGE013
Figure 152101DEST_PATH_IMAGE004
Figure 484381DEST_PATH_IMAGE014
Figure 745598DEST_PATH_IMAGE005
Figure 476794DEST_PATH_IMAGE015
Figure 532475DEST_PATH_IMAGE006
Figure 666226DEST_PATH_IMAGE007
Figure 251928DEST_PATH_IMAGE017
Figure 478510DEST_PATH_IMAGE008
Figure 283917DEST_PATH_IMAGE010
Figure 886937DEST_PATH_IMAGE009
Figure 327146DEST_PATH_IMAGE018
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 990208DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 5614DEST_PATH_IMAGE019
Carry out H 1=
Figure 707039DEST_PATH_IMAGE002
Figure 541003DEST_PATH_IMAGE011
Figure 55423DEST_PATH_IMAGE003
Figure 246DEST_PATH_IMAGE012
Figure 415046DEST_PATH_IMAGE004
Figure 419912DEST_PATH_IMAGE013
Figure 421628DEST_PATH_IMAGE005
Figure 170141DEST_PATH_IMAGE014
Figure 439448DEST_PATH_IMAGE006
Figure 615215DEST_PATH_IMAGE015
Figure 104227DEST_PATH_IMAGE007
Figure 406344DEST_PATH_IMAGE008
Figure 238165DEST_PATH_IMAGE017
Figure 713008DEST_PATH_IMAGE009
Monobasic cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right Carry out H 1=
Figure 816990DEST_PATH_IMAGE020
Figure 513550DEST_PATH_IMAGE002
Figure 141978DEST_PATH_IMAGE011
Figure 19147DEST_PATH_IMAGE003
Figure 707617DEST_PATH_IMAGE012
Figure 953790DEST_PATH_IMAGE004
Figure 887374DEST_PATH_IMAGE013
Figure 168182DEST_PATH_IMAGE005
Figure 950904DEST_PATH_IMAGE006
Figure 921134DEST_PATH_IMAGE015
Figure 24405DEST_PATH_IMAGE016
Figure 684319DEST_PATH_IMAGE008
Figure 458240DEST_PATH_IMAGE017
Figure 448061DEST_PATH_IMAGE009
Figure 150700DEST_PATH_IMAGE018
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 2=
Figure 796445DEST_PATH_IMAGE011
Figure 374057DEST_PATH_IMAGE002
Figure 91926DEST_PATH_IMAGE003
Figure 643486DEST_PATH_IMAGE004
Figure 545583DEST_PATH_IMAGE013
Figure 88560DEST_PATH_IMAGE005
Figure 272678DEST_PATH_IMAGE014
Figure 926514DEST_PATH_IMAGE006
Figure 683117DEST_PATH_IMAGE015
Figure 662574DEST_PATH_IMAGE007
Figure 6093DEST_PATH_IMAGE016
Figure 340309DEST_PATH_IMAGE017
Figure 225088DEST_PATH_IMAGE009
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 5536DEST_PATH_IMAGE022
Carry out H 2=
Figure 736731DEST_PATH_IMAGE011
Figure 792412DEST_PATH_IMAGE002
Figure 172840DEST_PATH_IMAGE021
Figure 972169DEST_PATH_IMAGE003
Figure 50032DEST_PATH_IMAGE004
Figure 855439DEST_PATH_IMAGE013
Figure 192880DEST_PATH_IMAGE005
Figure 898668DEST_PATH_IMAGE014
Figure 296151DEST_PATH_IMAGE006
Figure 588854DEST_PATH_IMAGE015
Figure 729985DEST_PATH_IMAGE007
Figure 227963DEST_PATH_IMAGE016
Figure 699744DEST_PATH_IMAGE008
Figure 463432DEST_PATH_IMAGE017
Figure 408254DEST_PATH_IMAGE009
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 3=
Figure 81834DEST_PATH_IMAGE002
Figure 564768DEST_PATH_IMAGE012
Figure 99654DEST_PATH_IMAGE003
Figure 776885DEST_PATH_IMAGE023
Figure 889067DEST_PATH_IMAGE004
Figure 677156DEST_PATH_IMAGE013
Figure 800970DEST_PATH_IMAGE005
Figure 147638DEST_PATH_IMAGE014
Figure 202543DEST_PATH_IMAGE015
Figure 446443DEST_PATH_IMAGE007
Figure 698433DEST_PATH_IMAGE016
Figure 660573DEST_PATH_IMAGE008
Figure 790465DEST_PATH_IMAGE017
Figure 154450DEST_PATH_IMAGE009
Figure 577341DEST_PATH_IMAGE018
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 26777DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the monobasic cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h, r and p is encryption, the initial value design of binary operator control variables k is k=0, known by the monobasic ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 960360DEST_PATH_IMAGE010
Figure 850956DEST_PATH_IMAGE002
Figure 710328DEST_PATH_IMAGE011
Figure 381480DEST_PATH_IMAGE003
Figure 617290DEST_PATH_IMAGE012
Figure 191753DEST_PATH_IMAGE004
Figure 222026DEST_PATH_IMAGE013
Figure 380474DEST_PATH_IMAGE005
Figure 154395DEST_PATH_IMAGE014
Figure 583365DEST_PATH_IMAGE006
Figure 784539DEST_PATH_IMAGE015
Figure 742317DEST_PATH_IMAGE016
Figure 291372DEST_PATH_IMAGE008
Figure 663447DEST_PATH_IMAGE017
Figure 796489DEST_PATH_IMAGE009
, during binary operator control variables k=1, decrypt operation is M i=
Figure 315774DEST_PATH_IMAGE011
Figure 858751DEST_PATH_IMAGE002
Figure 213509DEST_PATH_IMAGE010
Figure 132923DEST_PATH_IMAGE003
Figure 390991DEST_PATH_IMAGE012
Figure 42553DEST_PATH_IMAGE004
Figure 150186DEST_PATH_IMAGE013
Figure 607712DEST_PATH_IMAGE005
Figure 218822DEST_PATH_IMAGE014
Figure 882364DEST_PATH_IMAGE006
Figure 211714DEST_PATH_IMAGE015
Figure 472931DEST_PATH_IMAGE007
Figure 938548DEST_PATH_IMAGE016
Figure 761273DEST_PATH_IMAGE008
Figure 577919DEST_PATH_IMAGE017
Figure 962950DEST_PATH_IMAGE018
, during binary operator control variables k=2, decrypt operation is M i=
Figure 956576DEST_PATH_IMAGE011
Figure 496404DEST_PATH_IMAGE002
Figure 140378DEST_PATH_IMAGE010
Figure 433081DEST_PATH_IMAGE004
Figure 574212DEST_PATH_IMAGE013
Figure 134507DEST_PATH_IMAGE005
Figure 482891DEST_PATH_IMAGE006
Figure 842514DEST_PATH_IMAGE007
Figure 285313DEST_PATH_IMAGE008
Figure 269712DEST_PATH_IMAGE017
Figure 804599DEST_PATH_IMAGE009
Figure 714786DEST_PATH_IMAGE018
, during binary operator control variables k=3, decrypt operation is M i=
Figure 702334DEST_PATH_IMAGE011
Figure 478704DEST_PATH_IMAGE002
Figure 214765DEST_PATH_IMAGE003
Figure 689609DEST_PATH_IMAGE013
Figure 15810DEST_PATH_IMAGE004
Figure 259710DEST_PATH_IMAGE010
Figure 777279DEST_PATH_IMAGE005
Figure 739419DEST_PATH_IMAGE014
Figure 869311DEST_PATH_IMAGE006
Figure 929802DEST_PATH_IMAGE017
Figure 789173DEST_PATH_IMAGE009
Figure 460326DEST_PATH_IMAGE018
, during binary operator control variables k=4, decrypt operation is M i=
Figure 696136DEST_PATH_IMAGE011
Figure 270599DEST_PATH_IMAGE002
Figure 300871DEST_PATH_IMAGE012
Figure 459320DEST_PATH_IMAGE003
Figure 967662DEST_PATH_IMAGE013
Figure 662211DEST_PATH_IMAGE004
Figure 509130DEST_PATH_IMAGE005
Figure 821163DEST_PATH_IMAGE010
Figure 806436DEST_PATH_IMAGE006
Figure 679977DEST_PATH_IMAGE015
Figure 813018DEST_PATH_IMAGE007
Figure 928741DEST_PATH_IMAGE016
Figure 830838DEST_PATH_IMAGE008
Figure 875280DEST_PATH_IMAGE017
Figure 230038DEST_PATH_IMAGE009
Figure 149452DEST_PATH_IMAGE018
, during binary operator control variables k=5, decrypt operation is M i=
Figure 906056DEST_PATH_IMAGE011
Figure 133117DEST_PATH_IMAGE002
Figure 240751DEST_PATH_IMAGE012
Figure 698277DEST_PATH_IMAGE003
Figure 247070DEST_PATH_IMAGE013
Figure 290560DEST_PATH_IMAGE014
Figure 286198DEST_PATH_IMAGE005
Figure 276337DEST_PATH_IMAGE006
Figure 141918DEST_PATH_IMAGE010
Figure 206826DEST_PATH_IMAGE007
Figure 792528DEST_PATH_IMAGE016
Figure 762200DEST_PATH_IMAGE017
, during binary operator control variables k=6, decrypt operation is M i=
Figure 468491DEST_PATH_IMAGE011
Figure 495615DEST_PATH_IMAGE002
Figure 902326DEST_PATH_IMAGE012
Figure 462620DEST_PATH_IMAGE003
Figure 31005DEST_PATH_IMAGE013
Figure 755826DEST_PATH_IMAGE014
Figure 170627DEST_PATH_IMAGE005
Figure 909913DEST_PATH_IMAGE015
Figure 336839DEST_PATH_IMAGE016
Figure 606147DEST_PATH_IMAGE007
Figure 781913DEST_PATH_IMAGE010
Figure 769461DEST_PATH_IMAGE008
Figure 557550DEST_PATH_IMAGE017
Figure 946943DEST_PATH_IMAGE009
Figure 293611DEST_PATH_IMAGE018
, during binary operator control variables k=7, decrypt operation is M i=
Figure 502876DEST_PATH_IMAGE011
Figure 530874DEST_PATH_IMAGE002
Figure 276239DEST_PATH_IMAGE012
Figure 793808DEST_PATH_IMAGE003
Figure 755948DEST_PATH_IMAGE013
Figure 384375DEST_PATH_IMAGE004
Figure 984246DEST_PATH_IMAGE014
Figure 672716DEST_PATH_IMAGE005
Figure 856573DEST_PATH_IMAGE015
Figure 288691DEST_PATH_IMAGE006
Figure 8648DEST_PATH_IMAGE016
Figure 868019DEST_PATH_IMAGE007
Figure 539172DEST_PATH_IMAGE017
Figure 509402DEST_PATH_IMAGE008
Figure 83865DEST_PATH_IMAGE010
Figure 114138DEST_PATH_IMAGE009
Figure 210270DEST_PATH_IMAGE018
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 984191DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 177275DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 879914DEST_PATH_IMAGE019
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 260080DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 900009DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the one-parameter multivariate monobasic encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100234480100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, the eight-digit binary number encryption parameter is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, the eight-digit binary number encryption variables is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100234480100001DEST_PATH_IMAGE002
Figure 2013100234480100001DEST_PATH_IMAGE004
Figure 2013100234480100001DEST_PATH_IMAGE005
Figure 2013100234480100001DEST_PATH_IMAGE007
Figure 2013100234480100001DEST_PATH_IMAGE008
Figure 2013100234480100001DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 957084DEST_PATH_IMAGE003
Figure 799138DEST_PATH_IMAGE004
Figure 256665DEST_PATH_IMAGE005
Figure 634818DEST_PATH_IMAGE006
Figure 519598DEST_PATH_IMAGE007
Figure 848948DEST_PATH_IMAGE008
Figure 110165DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 342826DEST_PATH_IMAGE002
Figure 398506DEST_PATH_IMAGE003
Figure 215153DEST_PATH_IMAGE004
Figure 14481DEST_PATH_IMAGE005
Figure 101648DEST_PATH_IMAGE006
Figure 531493DEST_PATH_IMAGE007
Figure 835435DEST_PATH_IMAGE008
Figure 172875DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 777611DEST_PATH_IMAGE003
Figure 568850DEST_PATH_IMAGE004
Figure 709981DEST_PATH_IMAGE005
Figure 270276DEST_PATH_IMAGE006
Figure 605704DEST_PATH_IMAGE007
Figure 618660DEST_PATH_IMAGE008
Figure 563482DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 978283DEST_PATH_IMAGE002
Figure 484613DEST_PATH_IMAGE003
Figure 984864DEST_PATH_IMAGE004
Figure 467798DEST_PATH_IMAGE005
Figure 2685DEST_PATH_IMAGE006
Figure 742233DEST_PATH_IMAGE007
Figure 729780DEST_PATH_IMAGE008
Figure 16405DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 629965DEST_PATH_IMAGE002
Figure 914316DEST_PATH_IMAGE003
Figure 389160DEST_PATH_IMAGE004
Figure 479475DEST_PATH_IMAGE005
Figure 723375DEST_PATH_IMAGE006
Figure 476829DEST_PATH_IMAGE007
Figure 438969DEST_PATH_IMAGE008
Figure 67397DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 431382DEST_PATH_IMAGE002
Figure 355738DEST_PATH_IMAGE003
Figure 805174DEST_PATH_IMAGE004
Figure 551041DEST_PATH_IMAGE007
Figure 458003DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 531001DEST_PATH_IMAGE002
Figure 62739DEST_PATH_IMAGE003
Figure 221188DEST_PATH_IMAGE004
Figure 995109DEST_PATH_IMAGE005
Figure 625253DEST_PATH_IMAGE007
Figure 270998DEST_PATH_IMAGE008
Figure 583030DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 630621DEST_PATH_IMAGE002
Figure 504161DEST_PATH_IMAGE003
Figure 637202DEST_PATH_IMAGE004
Figure 752926DEST_PATH_IMAGE005
Figure 655023DEST_PATH_IMAGE006
Figure 699464DEST_PATH_IMAGE007
Figure 54222DEST_PATH_IMAGE008
Figure 973637DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the monobasic cryptographic calculation is defined as H i=
Figure 2013100234480100001DEST_PATH_IMAGE010
Figure 305741DEST_PATH_IMAGE002
Figure 2013100234480100001DEST_PATH_IMAGE011
Figure 19619DEST_PATH_IMAGE003
Figure 2013100234480100001DEST_PATH_IMAGE012
Figure 189569DEST_PATH_IMAGE004
Figure 2013100234480100001DEST_PATH_IMAGE013
Figure 210877DEST_PATH_IMAGE005
Figure 2013100234480100001DEST_PATH_IMAGE014
Figure 884304DEST_PATH_IMAGE006
Figure 2013100234480100001DEST_PATH_IMAGE015
Figure 598444DEST_PATH_IMAGE007
Figure 2013100234480100001DEST_PATH_IMAGE016
Figure 990111DEST_PATH_IMAGE008
Figure 752793DEST_PATH_IMAGE017
Figure 218409DEST_PATH_IMAGE009
, during binary operator control variables k=1, the monobasic cryptographic calculation is defined as H i=
Figure 670830DEST_PATH_IMAGE011
Figure 470158DEST_PATH_IMAGE002
Figure 744276DEST_PATH_IMAGE010
Figure 236437DEST_PATH_IMAGE003
Figure 274800DEST_PATH_IMAGE012
Figure 379285DEST_PATH_IMAGE004
Figure 482556DEST_PATH_IMAGE005
Figure 273794DEST_PATH_IMAGE014
Figure 904672DEST_PATH_IMAGE006
Figure 33351DEST_PATH_IMAGE007
Figure 311885DEST_PATH_IMAGE016
Figure 758173DEST_PATH_IMAGE008
Figure 172973DEST_PATH_IMAGE017
Figure 177838DEST_PATH_IMAGE009
Figure 678090DEST_PATH_IMAGE018
, during binary operator control variables k=2, the monobasic cryptographic calculation is defined as H i=
Figure 662489DEST_PATH_IMAGE011
Figure 197375DEST_PATH_IMAGE002
Figure 107562DEST_PATH_IMAGE012
Figure 95110DEST_PATH_IMAGE003
Figure 883200DEST_PATH_IMAGE010
Figure 272593DEST_PATH_IMAGE004
Figure 619260DEST_PATH_IMAGE013
Figure 657886DEST_PATH_IMAGE005
Figure 482622DEST_PATH_IMAGE014
Figure 726522DEST_PATH_IMAGE006
Figure 273806DEST_PATH_IMAGE016
Figure 60682DEST_PATH_IMAGE017
Figure 510118DEST_PATH_IMAGE009
Figure 178122DEST_PATH_IMAGE018
, during binary operator control variables k=3, the monobasic cryptographic calculation is defined as H i=
Figure 396614DEST_PATH_IMAGE011
Figure 255986DEST_PATH_IMAGE002
Figure 927138DEST_PATH_IMAGE012
Figure 737411DEST_PATH_IMAGE013
Figure 767684DEST_PATH_IMAGE004
Figure 926133DEST_PATH_IMAGE010
Figure 947658DEST_PATH_IMAGE005
Figure 279599DEST_PATH_IMAGE006
Figure 925344DEST_PATH_IMAGE015
Figure 158507DEST_PATH_IMAGE008
Figure 291549DEST_PATH_IMAGE017
Figure 810834DEST_PATH_IMAGE018
, during binary operator control variables k=4, the monobasic cryptographic calculation is defined as H i=
Figure 353811DEST_PATH_IMAGE011
Figure 708569DEST_PATH_IMAGE002
Figure 886051DEST_PATH_IMAGE003
Figure 707563DEST_PATH_IMAGE004
Figure 277664DEST_PATH_IMAGE005
Figure 991804DEST_PATH_IMAGE010
Figure 818257DEST_PATH_IMAGE015
Figure 421779DEST_PATH_IMAGE008
Figure 976434DEST_PATH_IMAGE017
Figure 562136DEST_PATH_IMAGE009
, during binary operator control variables k=5, the monobasic cryptographic calculation is defined as H i=
Figure 92660DEST_PATH_IMAGE011
Figure 197145DEST_PATH_IMAGE002
Figure 637353DEST_PATH_IMAGE012
Figure 238099DEST_PATH_IMAGE003
Figure 826075DEST_PATH_IMAGE013
Figure 734250DEST_PATH_IMAGE004
Figure 294545DEST_PATH_IMAGE014
Figure 862929DEST_PATH_IMAGE005
Figure 141464DEST_PATH_IMAGE015
Figure 587751DEST_PATH_IMAGE006
Figure 2552DEST_PATH_IMAGE010
Figure 741838DEST_PATH_IMAGE007
Figure 179772DEST_PATH_IMAGE016
Figure 699058DEST_PATH_IMAGE017
Figure 874824DEST_PATH_IMAGE009
, during binary operator control variables k=6, the monobasic cryptographic calculation is defined as H i=
Figure 148996DEST_PATH_IMAGE011
Figure 386522DEST_PATH_IMAGE012
Figure 595786DEST_PATH_IMAGE003
Figure 686102DEST_PATH_IMAGE013
Figure 431467DEST_PATH_IMAGE004
Figure 911175DEST_PATH_IMAGE005
Figure 539603DEST_PATH_IMAGE015
Figure 139474DEST_PATH_IMAGE006
Figure 765627DEST_PATH_IMAGE016
Figure 949484DEST_PATH_IMAGE007
Figure 381602DEST_PATH_IMAGE010
Figure 972649DEST_PATH_IMAGE017
Figure 643802DEST_PATH_IMAGE009
Figure 614032DEST_PATH_IMAGE018
, during binary operator control variables k=7, the monobasic cryptographic calculation is defined as H i=
Figure 439534DEST_PATH_IMAGE012
Figure 213454DEST_PATH_IMAGE003
Figure 908003DEST_PATH_IMAGE013
Figure 109177DEST_PATH_IMAGE004
Figure 489343DEST_PATH_IMAGE014
Figure 66955DEST_PATH_IMAGE005
Figure 616010DEST_PATH_IMAGE015
Figure 988086DEST_PATH_IMAGE006
Figure 971271DEST_PATH_IMAGE007
Figure 374833DEST_PATH_IMAGE017
Figure 980127DEST_PATH_IMAGE008
Figure 600464DEST_PATH_IMAGE010
Figure 755764DEST_PATH_IMAGE009
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 491825DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure 292870DEST_PATH_IMAGE020
Figure 383689DEST_PATH_IMAGE003
Figure 146370DEST_PATH_IMAGE012
Figure 933247DEST_PATH_IMAGE013
Figure 749893DEST_PATH_IMAGE005
Figure 304547DEST_PATH_IMAGE014
Figure 890249DEST_PATH_IMAGE006
Figure 116831DEST_PATH_IMAGE015
Figure 420774DEST_PATH_IMAGE007
Figure 525258DEST_PATH_IMAGE016
Figure 965467DEST_PATH_IMAGE008
Figure 628529DEST_PATH_IMAGE017
Figure 154188DEST_PATH_IMAGE009
Monobasic cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 294762DEST_PATH_IMAGE019
Carry out H 1=
Figure 128726DEST_PATH_IMAGE020
Figure 141681DEST_PATH_IMAGE002
Figure 86504DEST_PATH_IMAGE011
Figure 2769DEST_PATH_IMAGE003
Figure 7634DEST_PATH_IMAGE012
Figure 507886DEST_PATH_IMAGE004
Figure 256399DEST_PATH_IMAGE013
Figure 202937DEST_PATH_IMAGE014
Figure 190485DEST_PATH_IMAGE006
Figure 804186DEST_PATH_IMAGE007
Figure 386739DEST_PATH_IMAGE016
Figure 923900DEST_PATH_IMAGE008
Figure 14216DEST_PATH_IMAGE017
Figure 195798DEST_PATH_IMAGE009
Figure 214832DEST_PATH_IMAGE018
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 2=
Figure 911393DEST_PATH_IMAGE011
Figure 903805DEST_PATH_IMAGE021
Figure 93741DEST_PATH_IMAGE003
Figure 277597DEST_PATH_IMAGE012
Figure 709716DEST_PATH_IMAGE004
Figure 363079DEST_PATH_IMAGE005
Figure 568244DEST_PATH_IMAGE006
Figure 329658DEST_PATH_IMAGE015
Figure 359931DEST_PATH_IMAGE007
Figure 580696DEST_PATH_IMAGE016
Figure 856082DEST_PATH_IMAGE008
Figure 783587DEST_PATH_IMAGE017
Figure 47078DEST_PATH_IMAGE009
Figure 695753DEST_PATH_IMAGE018
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 273365DEST_PATH_IMAGE022
Carry out H 2=
Figure 427451DEST_PATH_IMAGE002
Figure 124274DEST_PATH_IMAGE021
Figure 857472DEST_PATH_IMAGE013
Figure 511307DEST_PATH_IMAGE005
Figure 769375DEST_PATH_IMAGE014
Figure 748832DEST_PATH_IMAGE006
Figure 653203DEST_PATH_IMAGE015
Figure 373663DEST_PATH_IMAGE008
Figure 465695DEST_PATH_IMAGE009
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 3=
Figure 252571DEST_PATH_IMAGE011
Figure 73973DEST_PATH_IMAGE023
Figure 128648DEST_PATH_IMAGE004
Figure 466088DEST_PATH_IMAGE013
Figure 171876DEST_PATH_IMAGE005
Figure 70824DEST_PATH_IMAGE014
Figure 65511DEST_PATH_IMAGE015
Figure 951489DEST_PATH_IMAGE007
Figure 785453DEST_PATH_IMAGE016
Figure 743230DEST_PATH_IMAGE017
Figure 659496DEST_PATH_IMAGE009
Figure 664361DEST_PATH_IMAGE018
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 102296DEST_PATH_IMAGE001
Carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100234480A 2013-01-22 2013-01-22 Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark Pending CN103106469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100234480A CN103106469A (en) 2013-01-22 2013-01-22 Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100234480A CN103106469A (en) 2013-01-22 2013-01-22 Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark

Publications (1)

Publication Number Publication Date
CN103106469A true CN103106469A (en) 2013-05-15

Family

ID=48314315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100234480A Pending CN103106469A (en) 2013-01-22 2013-01-22 Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103106469A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国,裴定一: "《密码学导引》", 30 April 1999, article "AES候选算法简介", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106469A (en) Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark
CN103106445A (en) Single parameter multivariable binary encryption anti-counterfeiting information storage trademark
CN103106433A (en) Single parameter multivariable multiple-encryption anti-counterfeiting information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103106471A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106489A (en) Single parameter ternary encryption anti-counterfeiting information storage trademark
CN103106486A (en) Single parameter multivariable ternary circulation encryption anti-counterfeiting information storage trademark
CN103106487A (en) Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106491A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103116785A (en) Multi-parameter multivariable unitary circulation encryption anti-fake information storage trademark
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106508A (en) Single parameter ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116795A (en) One-parameter multivariate ternary encryption anti-fake information storage trademark
CN103106515A (en) Multivariate parameter gradation unitary encryption anti-fake information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106437A (en) Single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark
CN103116778A (en) One-parameter multivariate binary variable circulation encryption anti-fake information storage trademark
CN103106506A (en) Multi-parametric-variable gradient ternary encryption anti-fake information storage trademark
CN103116777A (en) One-parameter multivariate multivariable circulation encryption anti-fake information storage trademark
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515