CN103106483A - Multi-parameter ternary encryption anti-fake information storage brand - Google Patents

Multi-parameter ternary encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103106483A
CN103106483A CN201310023552XA CN201310023552A CN103106483A CN 103106483 A CN103106483 A CN 103106483A CN 201310023552X A CN201310023552X A CN 201310023552XA CN 201310023552 A CN201310023552 A CN 201310023552A CN 103106483 A CN103106483 A CN 103106483A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310023552XA
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310023552XA priority Critical patent/CN103106483A/en
Publication of CN103106483A publication Critical patent/CN103106483A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)

Abstract

Provided is a multi-parameter ternary encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through ternary encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots in a mode of circulating look-up table modulation. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multiparameter ternary encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, a kind of multiparameter ternary encryption anti-counterfeiting information storage trade mark particularly, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as , 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 201310023552X100002DEST_PATH_IMAGE002
, ,
Figure 201310023552X100002DEST_PATH_IMAGE004
,
Figure 201310023552X100002DEST_PATH_IMAGE005
,
Figure 201310023552X100002DEST_PATH_IMAGE006
,
Figure 201310023552X100002DEST_PATH_IMAGE007
,
Figure 201310023552X100002DEST_PATH_IMAGE008
With
Figure 201310023552X100002DEST_PATH_IMAGE009
, encryption parameter
Figure 170727DEST_PATH_IMAGE002
,
Figure 212501DEST_PATH_IMAGE003
,
Figure 116872DEST_PATH_IMAGE004
,
Figure 639645DEST_PATH_IMAGE005
,
Figure 578651DEST_PATH_IMAGE006
, ,
Figure 792780DEST_PATH_IMAGE008
With Be 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as q, the binary system positive integer that encryption variables q is 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 201310023552X100002DEST_PATH_IMAGE010
Figure 201310023552X100002DEST_PATH_IMAGE011
Figure 201310023552X100002DEST_PATH_IMAGE012
Figure 201310023552X100002DEST_PATH_IMAGE013
Figure 201310023552X100002DEST_PATH_IMAGE014
Figure 201310023552X100002DEST_PATH_IMAGE015
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 939124DEST_PATH_IMAGE010
Figure 57121DEST_PATH_IMAGE011
Figure 811451DEST_PATH_IMAGE012
Figure 673096DEST_PATH_IMAGE013
Figure 321115DEST_PATH_IMAGE014
Figure 878523DEST_PATH_IMAGE015
Figure 244783DEST_PATH_IMAGE016
Figure 644540DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 412645DEST_PATH_IMAGE010
Figure 875374DEST_PATH_IMAGE011
Figure 728930DEST_PATH_IMAGE012
Figure 554989DEST_PATH_IMAGE014
Figure 454200DEST_PATH_IMAGE015
Figure 529472DEST_PATH_IMAGE016
Figure 536611DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 889095DEST_PATH_IMAGE010
Figure 956277DEST_PATH_IMAGE011
Figure 521775DEST_PATH_IMAGE012
Figure 67026DEST_PATH_IMAGE013
Figure 539596DEST_PATH_IMAGE014
Figure 777679DEST_PATH_IMAGE015
Figure 827543DEST_PATH_IMAGE016
Figure 179415DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 365545DEST_PATH_IMAGE010
Figure 187057DEST_PATH_IMAGE012
Figure 339689DEST_PATH_IMAGE013
Figure 963142DEST_PATH_IMAGE015
Figure 987599DEST_PATH_IMAGE016
Figure 678343DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 444712DEST_PATH_IMAGE011
Figure 956465DEST_PATH_IMAGE012
Figure 450900DEST_PATH_IMAGE013
Figure 390747DEST_PATH_IMAGE015
Figure 422343DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 557658DEST_PATH_IMAGE010
Figure 525614DEST_PATH_IMAGE011
Figure 585548DEST_PATH_IMAGE013
Figure 575369DEST_PATH_IMAGE014
Figure 549852DEST_PATH_IMAGE016
Figure 924201DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 34109DEST_PATH_IMAGE010
Figure 468501DEST_PATH_IMAGE011
Figure 666789DEST_PATH_IMAGE012
Figure 844829DEST_PATH_IMAGE013
Figure 289903DEST_PATH_IMAGE015
Figure 706978DEST_PATH_IMAGE016
Figure 691639DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 510559DEST_PATH_IMAGE010
Figure 286754DEST_PATH_IMAGE011
Figure 456704DEST_PATH_IMAGE012
Figure 979477DEST_PATH_IMAGE013
Figure 865579DEST_PATH_IMAGE015
Figure 257247DEST_PATH_IMAGE016
Figure 456147DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the ternary cryptographic calculation is defined as H i=
Figure 201310023552X100002DEST_PATH_IMAGE018
Figure 111643DEST_PATH_IMAGE010
Figure 495220DEST_PATH_IMAGE002
Figure 374183DEST_PATH_IMAGE011
Figure 262196DEST_PATH_IMAGE018
Figure 910215DEST_PATH_IMAGE012
Figure 464693DEST_PATH_IMAGE004
Figure 106076DEST_PATH_IMAGE018
Figure 877111DEST_PATH_IMAGE014
Figure 336911DEST_PATH_IMAGE006
Figure 190466DEST_PATH_IMAGE015
Figure 144089DEST_PATH_IMAGE016
Figure 774791DEST_PATH_IMAGE008
Figure 115642DEST_PATH_IMAGE017
Figure 125711DEST_PATH_IMAGE009
, during binary operator control variables k=1, the ternary cryptographic calculation is defined as H i=
Figure 602829DEST_PATH_IMAGE002
Figure 670011DEST_PATH_IMAGE010
Figure 107945DEST_PATH_IMAGE018
Figure 653196DEST_PATH_IMAGE011
Figure 225833DEST_PATH_IMAGE012
Figure 275698DEST_PATH_IMAGE018
Figure 488264DEST_PATH_IMAGE014
Figure 25424DEST_PATH_IMAGE018
Figure 221624DEST_PATH_IMAGE007
Figure 801510DEST_PATH_IMAGE016
Figure 825966DEST_PATH_IMAGE008
Figure 516711DEST_PATH_IMAGE017
Figure 680363DEST_PATH_IMAGE009
, during binary operator control variables k=2, the ternary cryptographic calculation is defined as H i=
Figure 818270DEST_PATH_IMAGE010
Figure 47126DEST_PATH_IMAGE003
Figure 327934DEST_PATH_IMAGE011
Figure 229115DEST_PATH_IMAGE018
Figure 260711DEST_PATH_IMAGE004
Figure 271392DEST_PATH_IMAGE013
Figure 587677DEST_PATH_IMAGE014
Figure 158336DEST_PATH_IMAGE006
Figure 413737DEST_PATH_IMAGE015
Figure 677228DEST_PATH_IMAGE018
Figure 388219DEST_PATH_IMAGE016
Figure 872476DEST_PATH_IMAGE017
, during binary operator control variables k=3, the ternary cryptographic calculation is defined as H i=
Figure 505156DEST_PATH_IMAGE002
Figure 683197DEST_PATH_IMAGE010
Figure 647611DEST_PATH_IMAGE003
Figure 128271DEST_PATH_IMAGE011
Figure 530006DEST_PATH_IMAGE012
Figure 348927DEST_PATH_IMAGE018
Figure 125122DEST_PATH_IMAGE013
Figure 295072DEST_PATH_IMAGE005
Figure 817845DEST_PATH_IMAGE014
Figure 491271DEST_PATH_IMAGE018
Figure 703947DEST_PATH_IMAGE015
Figure 95614DEST_PATH_IMAGE007
Figure 28935DEST_PATH_IMAGE016
Figure 825377DEST_PATH_IMAGE018
Figure 208954DEST_PATH_IMAGE017
Figure 822338DEST_PATH_IMAGE009
, during binary operator control variables k=4, the ternary cryptographic calculation is defined as H i=
Figure 949563DEST_PATH_IMAGE002
Figure 600511DEST_PATH_IMAGE010
Figure 889410DEST_PATH_IMAGE003
Figure 255670DEST_PATH_IMAGE011
Figure 796372DEST_PATH_IMAGE004
Figure 298898DEST_PATH_IMAGE012
Figure 863145DEST_PATH_IMAGE005
Figure 451121DEST_PATH_IMAGE013
Figure 542759DEST_PATH_IMAGE014
Figure 176391DEST_PATH_IMAGE006
Figure 517242DEST_PATH_IMAGE015
Figure 524381DEST_PATH_IMAGE018
Figure 502964DEST_PATH_IMAGE016
Figure 307496DEST_PATH_IMAGE008
Figure 870065DEST_PATH_IMAGE017
Figure 680895DEST_PATH_IMAGE018
, during binary operator control variables k=5, the ternary cryptographic calculation is defined as H i=
Figure 890815DEST_PATH_IMAGE018
Figure 128898DEST_PATH_IMAGE010
Figure 181692DEST_PATH_IMAGE003
Figure 530634DEST_PATH_IMAGE011
Figure 982344DEST_PATH_IMAGE004
Figure 391328DEST_PATH_IMAGE012
Figure 665839DEST_PATH_IMAGE005
Figure 124689DEST_PATH_IMAGE006
Figure 704574DEST_PATH_IMAGE014
Figure 274634DEST_PATH_IMAGE015
Figure 435357DEST_PATH_IMAGE007
Figure 186144DEST_PATH_IMAGE016
Figure 432318DEST_PATH_IMAGE018
Figure 929682DEST_PATH_IMAGE017
Figure 210491DEST_PATH_IMAGE009
, during binary operator control variables k=6, the ternary cryptographic calculation is defined as H i=
Figure 132180DEST_PATH_IMAGE002
Figure 865649DEST_PATH_IMAGE010
Figure 773562DEST_PATH_IMAGE018
Figure 129031DEST_PATH_IMAGE004
Figure 349797DEST_PATH_IMAGE012
Figure 188964DEST_PATH_IMAGE005
Figure 444365DEST_PATH_IMAGE013
Figure 707856DEST_PATH_IMAGE006
Figure 25705DEST_PATH_IMAGE014
Figure 665634DEST_PATH_IMAGE007
Figure 778471DEST_PATH_IMAGE015
Figure 212863DEST_PATH_IMAGE018
Figure 142642DEST_PATH_IMAGE016
Figure 320682DEST_PATH_IMAGE008
Figure 288026DEST_PATH_IMAGE017
Figure 893319DEST_PATH_IMAGE018
, during binary operator control variables k=7, the ternary cryptographic calculation is defined as H i=
Figure 575974DEST_PATH_IMAGE018
Figure 167492DEST_PATH_IMAGE010
Figure 251991DEST_PATH_IMAGE003
Figure 31116DEST_PATH_IMAGE011
Figure 935487DEST_PATH_IMAGE018
Figure 455330DEST_PATH_IMAGE012
Figure 344362DEST_PATH_IMAGE013
Figure 736029DEST_PATH_IMAGE006
Figure 59563DEST_PATH_IMAGE014
Figure 853076DEST_PATH_IMAGE007
Figure 997440DEST_PATH_IMAGE015
Figure 751770DEST_PATH_IMAGE008
Figure 878995DEST_PATH_IMAGE016
Figure 527014DEST_PATH_IMAGE018
Figure 815913DEST_PATH_IMAGE017
Figure 57538DEST_PATH_IMAGE009
, set encryption parameter
Figure 725804DEST_PATH_IMAGE002
,
Figure 732724DEST_PATH_IMAGE003
,
Figure 458104DEST_PATH_IMAGE004
,
Figure 921446DEST_PATH_IMAGE005
,
Figure 390474DEST_PATH_IMAGE006
, ,
Figure 646716DEST_PATH_IMAGE008
With
Figure 721988DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 604494DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 201310023552X100002DEST_PATH_IMAGE019
Carry out H 1=
Figure 276357DEST_PATH_IMAGE010
Figure 838925DEST_PATH_IMAGE002
Figure 649755DEST_PATH_IMAGE011
Figure 984309DEST_PATH_IMAGE020
Figure 496565DEST_PATH_IMAGE013
Figure 948275DEST_PATH_IMAGE020
Figure 71172DEST_PATH_IMAGE014
Figure 760966DEST_PATH_IMAGE015
Figure 67182DEST_PATH_IMAGE007
Figure 649998DEST_PATH_IMAGE016
Figure 284241DEST_PATH_IMAGE008
Figure 974986DEST_PATH_IMAGE017
Figure 401288DEST_PATH_IMAGE009
Ternary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 152075DEST_PATH_IMAGE019
Carry out H 1=
Figure 273615DEST_PATH_IMAGE020
Figure 770980DEST_PATH_IMAGE010
Figure 51788DEST_PATH_IMAGE002
Figure 973477DEST_PATH_IMAGE011
Figure 706946DEST_PATH_IMAGE020
Figure 753104DEST_PATH_IMAGE004
Figure 845694DEST_PATH_IMAGE013
Figure 66460DEST_PATH_IMAGE020
Figure 902698DEST_PATH_IMAGE014
Figure 895449DEST_PATH_IMAGE006
Figure 34306DEST_PATH_IMAGE015
Figure 742368DEST_PATH_IMAGE007
Figure 382297DEST_PATH_IMAGE016
Figure 226625DEST_PATH_IMAGE008
Figure 536384DEST_PATH_IMAGE017
Figure 734671DEST_PATH_IMAGE009
Carry out i+1, q+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 2=
Figure 912712DEST_PATH_IMAGE002
Figure 877126DEST_PATH_IMAGE010
Figure 168003DEST_PATH_IMAGE003
Figure 703076DEST_PATH_IMAGE021
Figure 744850DEST_PATH_IMAGE013
Figure 652150DEST_PATH_IMAGE005
Figure 47360DEST_PATH_IMAGE014
Figure 986366DEST_PATH_IMAGE021
Figure 933462DEST_PATH_IMAGE015
Figure 325129DEST_PATH_IMAGE007
Figure 675030DEST_PATH_IMAGE016
Figure 340870DEST_PATH_IMAGE009
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 202515DEST_PATH_IMAGE022
Carry out H 2=
Figure 283308DEST_PATH_IMAGE010
Figure 530793DEST_PATH_IMAGE021
Figure 930551DEST_PATH_IMAGE011
Figure 574022DEST_PATH_IMAGE003
Figure 574712DEST_PATH_IMAGE013
Figure 197323DEST_PATH_IMAGE005
Figure 421073DEST_PATH_IMAGE021
Figure 428213DEST_PATH_IMAGE015
Figure 905330DEST_PATH_IMAGE007
Figure 975442DEST_PATH_IMAGE016
Figure 662644DEST_PATH_IMAGE008
Figure 83261DEST_PATH_IMAGE017
Figure 680465DEST_PATH_IMAGE009
Carry out i+1, q+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 3=
Figure 444918DEST_PATH_IMAGE003
Figure 506415DEST_PATH_IMAGE011
Figure 201310023552X100002DEST_PATH_IMAGE023
Figure 292230DEST_PATH_IMAGE012
Figure 860319DEST_PATH_IMAGE013
Figure 166536DEST_PATH_IMAGE023
Figure 605476DEST_PATH_IMAGE014
Figure 505299DEST_PATH_IMAGE006
Figure 198973DEST_PATH_IMAGE015
Figure 625275DEST_PATH_IMAGE023
Figure 110483DEST_PATH_IMAGE016
Figure 622236DEST_PATH_IMAGE008
Figure 143039DEST_PATH_IMAGE017
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this ternary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 79956DEST_PATH_IMAGE001
carry out the ternary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the ternary cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 688792DEST_PATH_IMAGE002
,
Figure 986918DEST_PATH_IMAGE003
,
Figure 125163DEST_PATH_IMAGE004
, ,
Figure 64617DEST_PATH_IMAGE006
,
Figure 903785DEST_PATH_IMAGE007
,
Figure 893607DEST_PATH_IMAGE008
With
Figure 157098DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value of the initial value of setting encryption variables q when encrypting, the initial value design of binary operator control variables k is k=0, known by the ternary ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 740526DEST_PATH_IMAGE018
Figure 227712DEST_PATH_IMAGE002
Figure 662105DEST_PATH_IMAGE011
Figure 857463DEST_PATH_IMAGE018
Figure 910869DEST_PATH_IMAGE012
Figure 875283DEST_PATH_IMAGE004
Figure 483507DEST_PATH_IMAGE013
Figure 900581DEST_PATH_IMAGE018
Figure 757679DEST_PATH_IMAGE014
Figure 576599DEST_PATH_IMAGE006
Figure 45517DEST_PATH_IMAGE016
Figure 718944DEST_PATH_IMAGE008
Figure 931620DEST_PATH_IMAGE017
Figure 326216DEST_PATH_IMAGE009
, during binary operator control variables k=1, decrypt operation is M i=
Figure 649750DEST_PATH_IMAGE002
Figure 53050DEST_PATH_IMAGE010
Figure 436627DEST_PATH_IMAGE018
Figure 315590DEST_PATH_IMAGE011
Figure 156728DEST_PATH_IMAGE003
Figure 680113DEST_PATH_IMAGE012
Figure 234591DEST_PATH_IMAGE018
Figure 335271DEST_PATH_IMAGE013
Figure 607DEST_PATH_IMAGE005
Figure 771642DEST_PATH_IMAGE014
Figure 84997DEST_PATH_IMAGE015
Figure 163812DEST_PATH_IMAGE007
Figure 786423DEST_PATH_IMAGE016
Figure 760906DEST_PATH_IMAGE017
, during binary operator control variables k=2, decrypt operation is M i=
Figure 120529DEST_PATH_IMAGE002
Figure 187711DEST_PATH_IMAGE010
Figure 753209DEST_PATH_IMAGE003
Figure 298460DEST_PATH_IMAGE011
Figure 771029DEST_PATH_IMAGE018
Figure 743533DEST_PATH_IMAGE012
Figure 145269DEST_PATH_IMAGE013
Figure 596979DEST_PATH_IMAGE018
Figure 5964DEST_PATH_IMAGE014
Figure 305544DEST_PATH_IMAGE015
Figure 614690DEST_PATH_IMAGE018
Figure 194576DEST_PATH_IMAGE016
Figure 219033DEST_PATH_IMAGE008
Figure 785143DEST_PATH_IMAGE017
, during binary operator control variables k=3, decrypt operation is M i=
Figure 440192DEST_PATH_IMAGE003
Figure 518055DEST_PATH_IMAGE004
Figure 254455DEST_PATH_IMAGE012
Figure 552581DEST_PATH_IMAGE018
Figure 876618DEST_PATH_IMAGE014
Figure 541544DEST_PATH_IMAGE015
Figure 805035DEST_PATH_IMAGE007
Figure 388464DEST_PATH_IMAGE016
Figure 762813DEST_PATH_IMAGE018
Figure 875650DEST_PATH_IMAGE017
Figure 191268DEST_PATH_IMAGE009
, during binary operator control variables k=4, decrypt operation is M i=
Figure 440033DEST_PATH_IMAGE010
Figure 404447DEST_PATH_IMAGE003
Figure 554379DEST_PATH_IMAGE004
Figure 411476DEST_PATH_IMAGE012
Figure 230396DEST_PATH_IMAGE005
Figure 6591DEST_PATH_IMAGE013
Figure 179471DEST_PATH_IMAGE018
Figure 699314DEST_PATH_IMAGE014
Figure 248107DEST_PATH_IMAGE006
Figure 460783DEST_PATH_IMAGE015
Figure 889897DEST_PATH_IMAGE016
Figure 683409DEST_PATH_IMAGE008
Figure 555736DEST_PATH_IMAGE018
, during binary operator control variables k=5, decrypt operation is M i=
Figure 682961DEST_PATH_IMAGE018
Figure 333910DEST_PATH_IMAGE010
Figure 498175DEST_PATH_IMAGE003
Figure 529771DEST_PATH_IMAGE004
Figure 32296DEST_PATH_IMAGE012
Figure 760605DEST_PATH_IMAGE005
Figure 348582DEST_PATH_IMAGE013
Figure 817609DEST_PATH_IMAGE006
Figure 315587DEST_PATH_IMAGE014
Figure 290069DEST_PATH_IMAGE015
Figure 297208DEST_PATH_IMAGE007
Figure 649692DEST_PATH_IMAGE016
Figure 451295DEST_PATH_IMAGE018
Figure 827623DEST_PATH_IMAGE009
, during binary operator control variables k=6, decrypt operation is M i=
Figure 159247DEST_PATH_IMAGE002
Figure 272697DEST_PATH_IMAGE010
Figure 322561DEST_PATH_IMAGE018
Figure 671503DEST_PATH_IMAGE011
Figure 126143DEST_PATH_IMAGE004
Figure 535127DEST_PATH_IMAGE012
Figure 806709DEST_PATH_IMAGE005
Figure 748196DEST_PATH_IMAGE007
Figure 438941DEST_PATH_IMAGE015
Figure 599663DEST_PATH_IMAGE018
Figure 353380DEST_PATH_IMAGE016
Figure 474920DEST_PATH_IMAGE008
Figure 969355DEST_PATH_IMAGE017
Figure 250164DEST_PATH_IMAGE018
, during binary operator control variables k=7, decrypt operation is M i=
Figure 171852DEST_PATH_IMAGE018
Figure 839602DEST_PATH_IMAGE003
Figure 192141DEST_PATH_IMAGE018
Figure 288273DEST_PATH_IMAGE012
Figure 252074DEST_PATH_IMAGE005
Figure 507475DEST_PATH_IMAGE013
Figure 731674DEST_PATH_IMAGE007
Figure 81118DEST_PATH_IMAGE016
Figure 259159DEST_PATH_IMAGE018
Figure 226502DEST_PATH_IMAGE017
Figure 831796DEST_PATH_IMAGE009
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 514450DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 105968DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 190468DEST_PATH_IMAGE019
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 969593DEST_PATH_IMAGE001
carry out the ternary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 873964DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multiparameter ternary encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 201310023552X100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 201310023552X100001DEST_PATH_IMAGE002
,
Figure 201310023552X100001DEST_PATH_IMAGE003
,
Figure 201310023552X100001DEST_PATH_IMAGE004
,
Figure DEST_PATH_IMAGE005
,
Figure DEST_PATH_IMAGE006
,
Figure DEST_PATH_IMAGE007
,
Figure DEST_PATH_IMAGE008
With
Figure DEST_PATH_IMAGE009
, encryption parameter
Figure 84744DEST_PATH_IMAGE002
,
Figure 126518DEST_PATH_IMAGE003
,
Figure 30889DEST_PATH_IMAGE004
, ,
Figure 492668DEST_PATH_IMAGE006
,
Figure 439764DEST_PATH_IMAGE007
,
Figure 706797DEST_PATH_IMAGE008
With
Figure 30331DEST_PATH_IMAGE009
Be 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as q, the binary system positive integer that encryption variables q is 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 725577DEST_PATH_IMAGE010
Figure 846504DEST_PATH_IMAGE011
Figure 725468DEST_PATH_IMAGE012
Figure 462479DEST_PATH_IMAGE013
Figure 110498DEST_PATH_IMAGE014
Figure 664976DEST_PATH_IMAGE015
Figure 34165DEST_PATH_IMAGE016
Figure 309289DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 390749DEST_PATH_IMAGE012
Figure 597127DEST_PATH_IMAGE013
Figure 219738DEST_PATH_IMAGE014
Figure 991385DEST_PATH_IMAGE015
Figure 66658DEST_PATH_IMAGE016
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 621026DEST_PATH_IMAGE011
Figure 183595DEST_PATH_IMAGE012
Figure 728845DEST_PATH_IMAGE013
Figure 201415DEST_PATH_IMAGE014
Figure 442428DEST_PATH_IMAGE015
Figure 492292DEST_PATH_IMAGE016
Figure 841234DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 439279DEST_PATH_IMAGE011
Figure 976440DEST_PATH_IMAGE012
Figure 129072DEST_PATH_IMAGE013
Figure 435289DEST_PATH_IMAGE014
Figure 752525DEST_PATH_IMAGE015
Figure 70387DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 499619DEST_PATH_IMAGE010
Figure 860193DEST_PATH_IMAGE011
Figure 371946DEST_PATH_IMAGE012
Figure 866381DEST_PATH_IMAGE013
Figure 806229DEST_PATH_IMAGE015
Figure 415065DEST_PATH_IMAGE016
Figure 713191DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 848506DEST_PATH_IMAGE010
Figure 941096DEST_PATH_IMAGE011
Figure 164791DEST_PATH_IMAGE012
Figure 990851DEST_PATH_IMAGE014
Figure 129708DEST_PATH_IMAGE015
Figure 965334DEST_PATH_IMAGE016
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 449590DEST_PATH_IMAGE010
Figure 883983DEST_PATH_IMAGE011
Figure 82270DEST_PATH_IMAGE012
Figure 260311DEST_PATH_IMAGE013
Figure 705385DEST_PATH_IMAGE015
Figure 122459DEST_PATH_IMAGE016
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 577602DEST_PATH_IMAGE011
Figure 747552DEST_PATH_IMAGE012
Figure 267395DEST_PATH_IMAGE013
Figure 943752DEST_PATH_IMAGE014
Figure 746994DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the ternary cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE018
Figure 622006DEST_PATH_IMAGE002
Figure 376335DEST_PATH_IMAGE011
Figure 237981DEST_PATH_IMAGE018
Figure 886000DEST_PATH_IMAGE012
Figure 443407DEST_PATH_IMAGE004
Figure 209424DEST_PATH_IMAGE018
Figure 977529DEST_PATH_IMAGE014
Figure 440259DEST_PATH_IMAGE006
Figure 293814DEST_PATH_IMAGE015
Figure 497262DEST_PATH_IMAGE007
Figure 995240DEST_PATH_IMAGE016
Figure 969722DEST_PATH_IMAGE017
, during binary operator control variables k=1, the ternary cryptographic calculation is defined as H i=
Figure 453979DEST_PATH_IMAGE002
Figure 521161DEST_PATH_IMAGE010
Figure 959096DEST_PATH_IMAGE018
Figure 104480DEST_PATH_IMAGE003
Figure 76984DEST_PATH_IMAGE012
Figure 126848DEST_PATH_IMAGE018
Figure 351156DEST_PATH_IMAGE013
Figure 805796DEST_PATH_IMAGE005
Figure 751941DEST_PATH_IMAGE018
Figure 638994DEST_PATH_IMAGE015
Figure 820577DEST_PATH_IMAGE007
Figure 403393DEST_PATH_IMAGE016
Figure 427849DEST_PATH_IMAGE008
Figure 279317DEST_PATH_IMAGE009
, during binary operator control variables k=2, the ternary cryptographic calculation is defined as H i=
Figure 794054DEST_PATH_IMAGE010
Figure 898276DEST_PATH_IMAGE003
Figure 158577DEST_PATH_IMAGE011
Figure 207829DEST_PATH_IMAGE018
Figure 941299DEST_PATH_IMAGE012
Figure 114791DEST_PATH_IMAGE004
Figure 253036DEST_PATH_IMAGE013
Figure 470259DEST_PATH_IMAGE018
Figure 691025DEST_PATH_IMAGE014
Figure 264613DEST_PATH_IMAGE006
Figure 658872DEST_PATH_IMAGE018
Figure 366933DEST_PATH_IMAGE016
Figure 741283DEST_PATH_IMAGE008
Figure 854120DEST_PATH_IMAGE017
Figure 163879DEST_PATH_IMAGE009
, during binary operator control variables k=3, the ternary cryptographic calculation is defined as H i=
Figure 359237DEST_PATH_IMAGE002
Figure 537277DEST_PATH_IMAGE010
Figure 501691DEST_PATH_IMAGE003
Figure 109914DEST_PATH_IMAGE011
Figure 402355DEST_PATH_IMAGE004
Figure 384087DEST_PATH_IMAGE012
Figure 203007DEST_PATH_IMAGE018
Figure 979202DEST_PATH_IMAGE013
Figure 220718DEST_PATH_IMAGE018
Figure 558027DEST_PATH_IMAGE015
Figure 976061DEST_PATH_IMAGE007
Figure 909382DEST_PATH_IMAGE016
Figure 702895DEST_PATH_IMAGE018
Figure 86472DEST_PATH_IMAGE017
Figure 699856DEST_PATH_IMAGE009
, during binary operator control variables k=4, the ternary cryptographic calculation is defined as H i=
Figure 702447DEST_PATH_IMAGE002
Figure 268393DEST_PATH_IMAGE003
Figure 634652DEST_PATH_IMAGE011
Figure 175355DEST_PATH_IMAGE004
Figure 680810DEST_PATH_IMAGE012
Figure 994166DEST_PATH_IMAGE013
Figure 463193DEST_PATH_IMAGE018
Figure 88734DEST_PATH_IMAGE014
Figure 594802DEST_PATH_IMAGE006
Figure 942792DEST_PATH_IMAGE018
Figure 419910DEST_PATH_IMAGE016
Figure 224443DEST_PATH_IMAGE008
Figure 662377DEST_PATH_IMAGE017
Figure 473207DEST_PATH_IMAGE018
, during binary operator control variables k=5, the ternary cryptographic calculation is defined as H i=
Figure 804831DEST_PATH_IMAGE018
Figure 42915DEST_PATH_IMAGE010
Figure 968145DEST_PATH_IMAGE003
Figure 320017DEST_PATH_IMAGE011
Figure 771727DEST_PATH_IMAGE004
Figure 180711DEST_PATH_IMAGE012
Figure 452293DEST_PATH_IMAGE005
Figure 393780DEST_PATH_IMAGE018
Figure 84525DEST_PATH_IMAGE015
Figure 224740DEST_PATH_IMAGE007
Figure 850893DEST_PATH_IMAGE016
Figure 97067DEST_PATH_IMAGE018
Figure 591502DEST_PATH_IMAGE017
Figure 872311DEST_PATH_IMAGE009
, during binary operator control variables k=6, the ternary cryptographic calculation is defined as H i=
Figure 669365DEST_PATH_IMAGE002
Figure 405765DEST_PATH_IMAGE010
Figure 438312DEST_PATH_IMAGE018
Figure 573627DEST_PATH_IMAGE011
Figure 541583DEST_PATH_IMAGE004
Figure 601516DEST_PATH_IMAGE005
Figure 856917DEST_PATH_IMAGE013
Figure 245042DEST_PATH_IMAGE006
Figure 690454DEST_PATH_IMAGE014
Figure 330383DEST_PATH_IMAGE007
Figure 315656DEST_PATH_IMAGE015
Figure 750049DEST_PATH_IMAGE018
Figure 679828DEST_PATH_IMAGE016
Figure 825211DEST_PATH_IMAGE017
, during binary operator control variables k=7, the ternary cryptographic calculation is defined as H i=
Figure 988525DEST_PATH_IMAGE018
Figure 704678DEST_PATH_IMAGE010
Figure 792107DEST_PATH_IMAGE003
Figure 568302DEST_PATH_IMAGE011
Figure 348039DEST_PATH_IMAGE018
Figure 806888DEST_PATH_IMAGE005
Figure 756914DEST_PATH_IMAGE013
Figure 148581DEST_PATH_IMAGE006
Figure 140994DEST_PATH_IMAGE007
Figure 258991DEST_PATH_IMAGE015
Figure 791494DEST_PATH_IMAGE018
Figure 80393DEST_PATH_IMAGE017
Figure 446652DEST_PATH_IMAGE009
, set encryption parameter , ,
Figure 241627DEST_PATH_IMAGE004
,
Figure 829603DEST_PATH_IMAGE005
,
Figure 298631DEST_PATH_IMAGE006
,
Figure 658593DEST_PATH_IMAGE007
,
Figure 554873DEST_PATH_IMAGE008
With
Figure 505512DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 512651DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure 241966DEST_PATH_IMAGE010
Figure 892466DEST_PATH_IMAGE012
Figure 55780DEST_PATH_IMAGE013
Figure 404722DEST_PATH_IMAGE020
Figure 856432DEST_PATH_IMAGE014
Figure 2767DEST_PATH_IMAGE006
Figure 539928DEST_PATH_IMAGE015
Figure 692560DEST_PATH_IMAGE007
Figure 874143DEST_PATH_IMAGE016
Figure 454029DEST_PATH_IMAGE008
Figure 906580DEST_PATH_IMAGE009
Ternary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 208249DEST_PATH_IMAGE019
Carry out H 1=
Figure 959036DEST_PATH_IMAGE020
Figure 205210DEST_PATH_IMAGE010
Figure 983383DEST_PATH_IMAGE011
Figure 780438DEST_PATH_IMAGE020
Figure 513907DEST_PATH_IMAGE012
Figure 781074DEST_PATH_IMAGE004
Figure 916389DEST_PATH_IMAGE013
Figure 8978DEST_PATH_IMAGE020
Figure 232674DEST_PATH_IMAGE014
Figure 68912DEST_PATH_IMAGE006
Figure 197591DEST_PATH_IMAGE007
Figure 905653DEST_PATH_IMAGE016
Figure 548511DEST_PATH_IMAGE008
Figure 268205DEST_PATH_IMAGE017
Figure 702598DEST_PATH_IMAGE009
Carry out i+1, q+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 2=
Figure 897956DEST_PATH_IMAGE002
Figure 75996DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE021
Figure 43340DEST_PATH_IMAGE011
Figure 648633DEST_PATH_IMAGE003
Figure 455921DEST_PATH_IMAGE012
Figure 47440DEST_PATH_IMAGE021
Figure 869290DEST_PATH_IMAGE013
Figure 911064DEST_PATH_IMAGE005
Figure 210644DEST_PATH_IMAGE021
Figure 149650DEST_PATH_IMAGE015
Figure 514781DEST_PATH_IMAGE016
Figure 838315DEST_PATH_IMAGE008
Figure 507193DEST_PATH_IMAGE017
Figure 625191DEST_PATH_IMAGE009
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure DEST_PATH_IMAGE022
Carry out H 2=
Figure 631718DEST_PATH_IMAGE002
Figure 368729DEST_PATH_IMAGE010
Figure 16748DEST_PATH_IMAGE021
Figure 571226DEST_PATH_IMAGE011
Figure 940415DEST_PATH_IMAGE003
Figure 340173DEST_PATH_IMAGE012
Figure 108277DEST_PATH_IMAGE021
Figure 568078DEST_PATH_IMAGE013
Figure 296999DEST_PATH_IMAGE005
Figure 503377DEST_PATH_IMAGE014
Figure 22269DEST_PATH_IMAGE015
Figure 972908DEST_PATH_IMAGE007
Figure 980047DEST_PATH_IMAGE016
Carry out i+1, q+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 3=
Figure 510462DEST_PATH_IMAGE002
Figure 107665DEST_PATH_IMAGE010
Figure 348678DEST_PATH_IMAGE003
Figure 398542DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE023
Figure 872118DEST_PATH_IMAGE012
Figure 933615DEST_PATH_IMAGE004
Figure 345529DEST_PATH_IMAGE013
Figure 882690DEST_PATH_IMAGE023
Figure 35322DEST_PATH_IMAGE014
Figure 576158DEST_PATH_IMAGE006
Figure 890465DEST_PATH_IMAGE015
Figure 790288DEST_PATH_IMAGE023
Figure 481032DEST_PATH_IMAGE016
Figure 34898DEST_PATH_IMAGE008
Figure 520105DEST_PATH_IMAGE017
Figure 907224DEST_PATH_IMAGE009
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this ternary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 401660DEST_PATH_IMAGE001
Carry out the ternary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310023552XA 2013-01-22 2013-01-22 Multi-parameter ternary encryption anti-fake information storage brand Pending CN103106483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310023552XA CN103106483A (en) 2013-01-22 2013-01-22 Multi-parameter ternary encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310023552XA CN103106483A (en) 2013-01-22 2013-01-22 Multi-parameter ternary encryption anti-fake information storage brand

Publications (1)

Publication Number Publication Date
CN103106483A true CN103106483A (en) 2013-05-15

Family

ID=48314329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310023552XA Pending CN103106483A (en) 2013-01-22 2013-01-22 Multi-parameter ternary encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103106483A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106428A (en) One-parameter unary circulating encryption anti-fake information storage brand
CN103106430A (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103106483A (en) Multi-parameter ternary encryption anti-fake information storage brand
CN103106514A (en) Multi-parameter binary encryption anti-fake information storage brand
CN103106510A (en) Multi-parameter multivariant circulating encryption anti-fake information storage brand
CN103106496A (en) Multi-parameter unitary circulating encryption anti-fake information storage brand
CN103106480A (en) Multi-parameter ternary multivariant circulating encryption anti-fake information storage brand
CN103106477A (en) Multi-parameter binary multivariant circulating encryption anti-fake information storage brand
CN103106505A (en) One-parameter double-variant ternary encryption anti-fake information storage brand
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103136564A (en) Multi-parameter variable-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106473A (en) One-parameter double-variant binary encryption anti-fake information storage brand
CN103106481A (en) One-parameter double-variant binary circulating encryption anti-fake information storage brand
CN103106525A (en) Multiparameter multielement encryption anti-fake information storage trademark
CN103106502A (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103106482A (en) Multiparameter univariate binary encryption anti-fake information storage trademark
CN103123693A (en) One-parameter binary-encryption anti-counterfeiting information storage trademark
CN103106462A (en) One-parameter double-variant multi-variant circulating encryption anti-fake information storage brand
CN103106521A (en) Multiparameter univariate ternary encryption anti-fake information storage trademark
CN103106485A (en) One-parameter double-variant unary circulating encryption anti-fake information storage brand
CN103136561A (en) One-parameter multi-variable binary circulating encryption anti-fake information storage brand
CN103106522A (en) Multi-variable-parameter gradient binary-variant circulating encryption anti-fake information storage brand
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515