CN103106500A - Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark - Google Patents

Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106500A
CN103106500A CN2013100237915A CN201310023791A CN103106500A CN 103106500 A CN103106500 A CN 103106500A CN 2013100237915 A CN2013100237915 A CN 2013100237915A CN 201310023791 A CN201310023791 A CN 201310023791A CN 103106500 A CN103106500 A CN 103106500A
Authority
CN
China
Prior art keywords
binary
counterfeiting information
trade mark
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100237915A
Other languages
Chinese (zh)
Inventor
郭庆云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100237915A priority Critical patent/CN103106500A/en
Publication of CN103106500A publication Critical patent/CN103106500A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

A single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark can enable binary system anti-counterfeiting information to be generated into binary system modulating signals through unitary encryption and channel coding, and embed the anti-counterfeiting information into a whole trademark page through ordered changing of electrical conductivity of amplitude-modulated dots in a circular table look-up method modulation mode. Anti-counterfeiting information can be identified from any fragment during trademark identification, and the single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

Single argument parameter alternation monobasic encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of single argument parameter alternation monobasic encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100237915100002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100237915100002DEST_PATH_IMAGE002
,
Figure 2013100237915100002DEST_PATH_IMAGE003
,
Figure 2013100237915100002DEST_PATH_IMAGE004
,
Figure 2013100237915100002DEST_PATH_IMAGE005
, ,
Figure 2013100237915100002DEST_PATH_IMAGE007
,
Figure 2013100237915100002DEST_PATH_IMAGE008
With
Figure 2013100237915100002DEST_PATH_IMAGE009
, encryption parameter ,
Figure 700950DEST_PATH_IMAGE003
,
Figure 418371DEST_PATH_IMAGE004
,
Figure 751263DEST_PATH_IMAGE005
,
Figure 503318DEST_PATH_IMAGE006
,
Figure 263464DEST_PATH_IMAGE007
, With
Figure 604764DEST_PATH_IMAGE009
Be 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as q and j, the binary system positive integer that encryption variables q and j are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100237915100002DEST_PATH_IMAGE010
Figure 2013100237915100002DEST_PATH_IMAGE011
Figure 2013100237915100002DEST_PATH_IMAGE012
Figure 2013100237915100002DEST_PATH_IMAGE013
Figure 2013100237915100002DEST_PATH_IMAGE014
Figure 2013100237915100002DEST_PATH_IMAGE015
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 588156DEST_PATH_IMAGE010
Figure 581520DEST_PATH_IMAGE011
Figure 885911DEST_PATH_IMAGE013
Figure 346979DEST_PATH_IMAGE014
Figure 714507DEST_PATH_IMAGE015
Figure 831498DEST_PATH_IMAGE016
Figure 44305DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 625459DEST_PATH_IMAGE010
Figure 898308DEST_PATH_IMAGE011
Figure 564913DEST_PATH_IMAGE012
Figure 519094DEST_PATH_IMAGE013
Figure 954754DEST_PATH_IMAGE014
Figure 675803DEST_PATH_IMAGE015
Figure 564125DEST_PATH_IMAGE016
Figure 384313DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 674480DEST_PATH_IMAGE010
Figure 554711DEST_PATH_IMAGE011
Figure 288629DEST_PATH_IMAGE013
Figure 687698DEST_PATH_IMAGE015
Figure 550612DEST_PATH_IMAGE016
Figure 712603DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 711783DEST_PATH_IMAGE010
Figure 933817DEST_PATH_IMAGE011
Figure 284026DEST_PATH_IMAGE012
Figure 249708DEST_PATH_IMAGE013
Figure 368974DEST_PATH_IMAGE014
Figure 434013DEST_PATH_IMAGE015
Figure 271519DEST_PATH_IMAGE016
Figure 775313DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 952347DEST_PATH_IMAGE010
Figure 250605DEST_PATH_IMAGE011
Figure 575407DEST_PATH_IMAGE012
Figure 882891DEST_PATH_IMAGE013
Figure 445908DEST_PATH_IMAGE015
Figure 992427DEST_PATH_IMAGE016
Figure 103602DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 51967DEST_PATH_IMAGE010
Figure 957606DEST_PATH_IMAGE011
Figure 917385DEST_PATH_IMAGE012
Figure 566673DEST_PATH_IMAGE013
Figure 369543DEST_PATH_IMAGE014
Figure 967195DEST_PATH_IMAGE016
Figure 154594DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 77551DEST_PATH_IMAGE010
Figure 324992DEST_PATH_IMAGE011
Figure 271083DEST_PATH_IMAGE012
Figure 39636DEST_PATH_IMAGE014
Figure 457979DEST_PATH_IMAGE015
Figure 688103DEST_PATH_IMAGE016
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 114853DEST_PATH_IMAGE010
Figure 500146DEST_PATH_IMAGE012
Figure 833039DEST_PATH_IMAGE013
Figure 319515DEST_PATH_IMAGE014
Figure 282923DEST_PATH_IMAGE015
Figure 487639DEST_PATH_IMAGE016
Figure 624222DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the monobasic cryptographic calculation is defined as H i=
Figure 2013100237915100002DEST_PATH_IMAGE018
Figure 902888DEST_PATH_IMAGE010
Figure 2013100237915100002DEST_PATH_IMAGE019
Figure 37197DEST_PATH_IMAGE011
Figure 740928DEST_PATH_IMAGE019
Figure 415623DEST_PATH_IMAGE012
Figure 157949DEST_PATH_IMAGE019
Figure 574018DEST_PATH_IMAGE014
Figure 155172DEST_PATH_IMAGE019
Figure 428021DEST_PATH_IMAGE015
Figure 94626DEST_PATH_IMAGE019
Figure 111123DEST_PATH_IMAGE016
Figure 546784DEST_PATH_IMAGE019
Figure 990535DEST_PATH_IMAGE017
Figure 144435DEST_PATH_IMAGE019
, during binary operator control variables k=1, the monobasic cryptographic calculation is defined as H i=
Figure 2013100237915100002DEST_PATH_IMAGE020
Figure 130157DEST_PATH_IMAGE018
Figure 10388DEST_PATH_IMAGE011
Figure 744306DEST_PATH_IMAGE012
Figure 154559DEST_PATH_IMAGE020
Figure 940112DEST_PATH_IMAGE013
Figure 803026DEST_PATH_IMAGE020
Figure 229777DEST_PATH_IMAGE020
Figure 739703DEST_PATH_IMAGE020
Figure 439806DEST_PATH_IMAGE016
Figure 715478DEST_PATH_IMAGE020
, during binary operator control variables k=2, the monobasic cryptographic calculation is defined as H i=
Figure 2013100237915100002DEST_PATH_IMAGE021
Figure 156954DEST_PATH_IMAGE010
Figure 130727DEST_PATH_IMAGE021
Figure 694563DEST_PATH_IMAGE011
Figure 19365DEST_PATH_IMAGE018
Figure 905861DEST_PATH_IMAGE021
Figure 640599DEST_PATH_IMAGE013
Figure 124801DEST_PATH_IMAGE021
Figure 235976DEST_PATH_IMAGE014
Figure 466811DEST_PATH_IMAGE015
Figure 500626DEST_PATH_IMAGE021
Figure 822017DEST_PATH_IMAGE016
Figure 902186DEST_PATH_IMAGE021
Figure 978726DEST_PATH_IMAGE017
, during binary operator control variables k=3, the monobasic cryptographic calculation is defined as H i=
Figure 2013100237915100002DEST_PATH_IMAGE022
Figure 562603DEST_PATH_IMAGE010
Figure 485559DEST_PATH_IMAGE022
Figure 733001DEST_PATH_IMAGE011
Figure 741408DEST_PATH_IMAGE022
Figure 732498DEST_PATH_IMAGE012
Figure 509961DEST_PATH_IMAGE018
Figure 928304DEST_PATH_IMAGE013
Figure 158428DEST_PATH_IMAGE022
Figure 953209DEST_PATH_IMAGE014
Figure 427998DEST_PATH_IMAGE016
Figure 852157DEST_PATH_IMAGE022
Figure 877882DEST_PATH_IMAGE017
Figure 82598DEST_PATH_IMAGE022
, during binary operator control variables k=4, the monobasic cryptographic calculation is defined as H i=
Figure 497847DEST_PATH_IMAGE023
Figure 694473DEST_PATH_IMAGE011
Figure 120907DEST_PATH_IMAGE023
Figure 61181DEST_PATH_IMAGE012
Figure 522249DEST_PATH_IMAGE023
Figure 561880DEST_PATH_IMAGE013
Figure 729470DEST_PATH_IMAGE018
Figure 207856DEST_PATH_IMAGE014
Figure 523431DEST_PATH_IMAGE023
Figure 744962DEST_PATH_IMAGE016
Figure 180623DEST_PATH_IMAGE023
Figure 624373DEST_PATH_IMAGE017
Figure 840591DEST_PATH_IMAGE023
, during binary operator control variables k=5, the monobasic cryptographic calculation is defined as H i=
Figure 2013100237915100002DEST_PATH_IMAGE024
Figure 598463DEST_PATH_IMAGE010
Figure 888630DEST_PATH_IMAGE024
Figure 503282DEST_PATH_IMAGE011
Figure 878899DEST_PATH_IMAGE024
Figure 502779DEST_PATH_IMAGE012
Figure 647452DEST_PATH_IMAGE024
Figure 698585DEST_PATH_IMAGE013
Figure 312231DEST_PATH_IMAGE024
Figure 23332DEST_PATH_IMAGE015
Figure 73645DEST_PATH_IMAGE016
Figure 192911DEST_PATH_IMAGE024
Figure 585846DEST_PATH_IMAGE017
Figure 423352DEST_PATH_IMAGE024
, during binary operator control variables k=6, the monobasic cryptographic calculation is defined as H i=
Figure 927145DEST_PATH_IMAGE025
Figure 900918DEST_PATH_IMAGE010
Figure 464754DEST_PATH_IMAGE025
Figure 523977DEST_PATH_IMAGE011
Figure 843180DEST_PATH_IMAGE025
Figure 937038DEST_PATH_IMAGE012
Figure 671776DEST_PATH_IMAGE025
Figure 218295DEST_PATH_IMAGE013
Figure 12256DEST_PATH_IMAGE014
Figure 917895DEST_PATH_IMAGE025
Figure 951710DEST_PATH_IMAGE015
Figure 600997DEST_PATH_IMAGE018
Figure 745988DEST_PATH_IMAGE025
Figure 1520DEST_PATH_IMAGE017
, during binary operator control variables k=7, the monobasic cryptographic calculation is defined as H i=
Figure 2013100237915100002DEST_PATH_IMAGE026
Figure 377454DEST_PATH_IMAGE010
Figure 624896DEST_PATH_IMAGE026
Figure 367724DEST_PATH_IMAGE011
Figure 358814DEST_PATH_IMAGE026
Figure 136277DEST_PATH_IMAGE012
Figure 554620DEST_PATH_IMAGE026
Figure 50324DEST_PATH_IMAGE013
Figure 477074DEST_PATH_IMAGE014
Figure 66318DEST_PATH_IMAGE026
Figure 783738DEST_PATH_IMAGE015
Figure 116631DEST_PATH_IMAGE026
Figure 806369DEST_PATH_IMAGE016
Figure 566515DEST_PATH_IMAGE018
Figure 771231DEST_PATH_IMAGE017
Figure 907815DEST_PATH_IMAGE026
, set encryption parameter ,
Figure 445423DEST_PATH_IMAGE003
,
Figure 125717DEST_PATH_IMAGE004
, ,
Figure 527059DEST_PATH_IMAGE006
,
Figure 566691DEST_PATH_IMAGE007
,
Figure 745999DEST_PATH_IMAGE008
With
Figure 224385DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables q and j, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 539960DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure 2013100237915100002DEST_PATH_IMAGE028
Figure 354780DEST_PATH_IMAGE010
Figure 699174DEST_PATH_IMAGE019
Figure 869255DEST_PATH_IMAGE011
Figure 578586DEST_PATH_IMAGE019
Figure 466907DEST_PATH_IMAGE012
Figure 287096DEST_PATH_IMAGE019
Figure 404411DEST_PATH_IMAGE013
Figure 284642DEST_PATH_IMAGE019
Figure 681010DEST_PATH_IMAGE015
Figure 732143DEST_PATH_IMAGE019
Figure 595057DEST_PATH_IMAGE016
Figure 757048DEST_PATH_IMAGE019
Figure 959490DEST_PATH_IMAGE017
Figure 915945DEST_PATH_IMAGE019
Monobasic cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 266155DEST_PATH_IMAGE027
Carry out H 1=
Figure 288785DEST_PATH_IMAGE010
Figure 681721DEST_PATH_IMAGE019
Figure 253647DEST_PATH_IMAGE011
Figure 757441DEST_PATH_IMAGE019
Figure 860440DEST_PATH_IMAGE012
Figure 424276DEST_PATH_IMAGE019
Figure 790984DEST_PATH_IMAGE019
Figure 884842DEST_PATH_IMAGE014
Figure 619580DEST_PATH_IMAGE019
Figure 166099DEST_PATH_IMAGE015
Figure 960059DEST_PATH_IMAGE016
Figure 865698DEST_PATH_IMAGE019
Figure 548801DEST_PATH_IMAGE019
Carry out i+1, q+1, j+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 2=
Figure 289355DEST_PATH_IMAGE020
Figure 365895DEST_PATH_IMAGE010
Figure 762373DEST_PATH_IMAGE029
Figure 215351DEST_PATH_IMAGE011
Figure 197135DEST_PATH_IMAGE012
Figure 205542DEST_PATH_IMAGE020
Figure 196632DEST_PATH_IMAGE013
Figure 974095DEST_PATH_IMAGE020
Figure 392438DEST_PATH_IMAGE014
Figure 888142DEST_PATH_IMAGE020
Figure 417343DEST_PATH_IMAGE015
Figure 49313DEST_PATH_IMAGE020
Figure 904136DEST_PATH_IMAGE016
Figure 621557DEST_PATH_IMAGE020
Figure 954449DEST_PATH_IMAGE017
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 2013100237915100002DEST_PATH_IMAGE030
Carry out H 2=
Figure 217382DEST_PATH_IMAGE020
Figure 422099DEST_PATH_IMAGE010
Figure 558682DEST_PATH_IMAGE029
Figure 165244DEST_PATH_IMAGE011
Figure 96291DEST_PATH_IMAGE020
Figure 788303DEST_PATH_IMAGE012
Figure 462998DEST_PATH_IMAGE020
Figure 291594DEST_PATH_IMAGE020
Figure 470903DEST_PATH_IMAGE014
Figure 683709DEST_PATH_IMAGE020
Figure 264863DEST_PATH_IMAGE015
Figure 537713DEST_PATH_IMAGE020
Figure 266634DEST_PATH_IMAGE016
Figure 271413DEST_PATH_IMAGE020
Figure 644757DEST_PATH_IMAGE017
Figure 416404DEST_PATH_IMAGE020
Carry out i+1, q+1, j+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 3=
Figure 124914DEST_PATH_IMAGE010
Figure 295312DEST_PATH_IMAGE011
Figure 670930DEST_PATH_IMAGE031
Figure 966913DEST_PATH_IMAGE012
Figure 377166DEST_PATH_IMAGE021
Figure 291212DEST_PATH_IMAGE021
Figure 453203DEST_PATH_IMAGE014
Figure 452383DEST_PATH_IMAGE021
Figure 674417DEST_PATH_IMAGE015
Figure 24627DEST_PATH_IMAGE021
Figure 616408DEST_PATH_IMAGE016
Figure 797990DEST_PATH_IMAGE021
Figure 925346DEST_PATH_IMAGE017
Figure 762852DEST_PATH_IMAGE021
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 266646DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the monobasic cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 505997DEST_PATH_IMAGE002
,
Figure 804255DEST_PATH_IMAGE003
, ,
Figure 436541DEST_PATH_IMAGE005
,
Figure 264820DEST_PATH_IMAGE006
,
Figure 11277DEST_PATH_IMAGE007
,
Figure 557796DEST_PATH_IMAGE008
With
Figure 668971DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value of the initial value of setting encryption variables q and j when encrypting, the initial value design of binary operator control variables k is k=0, known by the monobasic ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 617335DEST_PATH_IMAGE018
Figure 522975DEST_PATH_IMAGE010
Figure 556790DEST_PATH_IMAGE019
Figure 946631DEST_PATH_IMAGE019
Figure 23171DEST_PATH_IMAGE012
Figure 544282DEST_PATH_IMAGE019
Figure 731681DEST_PATH_IMAGE013
Figure 716955DEST_PATH_IMAGE019
Figure 964397DEST_PATH_IMAGE014
Figure 901577DEST_PATH_IMAGE015
Figure 97383DEST_PATH_IMAGE016
Figure 327507DEST_PATH_IMAGE019
Figure 184605DEST_PATH_IMAGE017
Figure 754257DEST_PATH_IMAGE019
, during binary operator control variables k=1, decrypt operation is M i=
Figure 405819DEST_PATH_IMAGE020
Figure 388818DEST_PATH_IMAGE010
Figure 721710DEST_PATH_IMAGE018
Figure 208187DEST_PATH_IMAGE011
Figure 233911DEST_PATH_IMAGE020
Figure 438628DEST_PATH_IMAGE012
Figure 112820DEST_PATH_IMAGE020
Figure 804832DEST_PATH_IMAGE014
Figure 479527DEST_PATH_IMAGE020
Figure 940596DEST_PATH_IMAGE015
Figure 210134DEST_PATH_IMAGE016
Figure 269674DEST_PATH_IMAGE017
Figure 542523DEST_PATH_IMAGE020
, during binary operator control variables k=2, decrypt operation is M i=
Figure 209128DEST_PATH_IMAGE021
Figure 225625DEST_PATH_IMAGE010
Figure 105037DEST_PATH_IMAGE011
Figure 258937DEST_PATH_IMAGE018
Figure 369293DEST_PATH_IMAGE021
Figure 249524DEST_PATH_IMAGE013
Figure 625142DEST_PATH_IMAGE021
Figure 983442DEST_PATH_IMAGE014
Figure 393695DEST_PATH_IMAGE021
Figure 179248DEST_PATH_IMAGE015
Figure 42162DEST_PATH_IMAGE021
Figure 908060DEST_PATH_IMAGE021
Figure 130094DEST_PATH_IMAGE017
Figure 480304DEST_PATH_IMAGE021
, during binary operator control variables k=3, decrypt operation is M i=
Figure 180407DEST_PATH_IMAGE022
Figure 311391DEST_PATH_IMAGE010
Figure 704327DEST_PATH_IMAGE022
Figure 19398DEST_PATH_IMAGE012
Figure 970354DEST_PATH_IMAGE013
Figure 12259DEST_PATH_IMAGE022
Figure 106117DEST_PATH_IMAGE014
Figure 840855DEST_PATH_IMAGE022
Figure 387374DEST_PATH_IMAGE015
Figure 498549DEST_PATH_IMAGE022
Figure 446914DEST_PATH_IMAGE016
Figure 352553DEST_PATH_IMAGE022
Figure 386368DEST_PATH_IMAGE017
Figure 770076DEST_PATH_IMAGE022
, during binary operator control variables k=4, decrypt operation is M i=
Figure 838526DEST_PATH_IMAGE023
Figure 915067DEST_PATH_IMAGE010
Figure 436178DEST_PATH_IMAGE023
Figure 623577DEST_PATH_IMAGE011
Figure 546533DEST_PATH_IMAGE023
Figure 793975DEST_PATH_IMAGE012
Figure 793472DEST_PATH_IMAGE013
Figure 570935DEST_PATH_IMAGE018
Figure 989278DEST_PATH_IMAGE014
Figure 14183DEST_PATH_IMAGE015
Figure 646153DEST_PATH_IMAGE023
Figure 235397DEST_PATH_IMAGE016
Figure 218396DEST_PATH_IMAGE023
Figure 551289DEST_PATH_IMAGE017
Figure 37765DEST_PATH_IMAGE023
, during binary operator control variables k=5, decrypt operation is M i=
Figure 51771DEST_PATH_IMAGE024
Figure 256487DEST_PATH_IMAGE010
Figure 127491DEST_PATH_IMAGE024
Figure 734053DEST_PATH_IMAGE011
Figure 930679DEST_PATH_IMAGE024
Figure 297387DEST_PATH_IMAGE024
Figure 758455DEST_PATH_IMAGE013
Figure 860403DEST_PATH_IMAGE024
Figure 102029DEST_PATH_IMAGE014
Figure 580415DEST_PATH_IMAGE018
Figure 895990DEST_PATH_IMAGE015
Figure 434418DEST_PATH_IMAGE024
Figure 996932DEST_PATH_IMAGE024
, during binary operator control variables k=6, decrypt operation is M i=
Figure 26199DEST_PATH_IMAGE025
Figure 136554DEST_PATH_IMAGE025
Figure 751207DEST_PATH_IMAGE011
Figure 126824DEST_PATH_IMAGE025
Figure 750704DEST_PATH_IMAGE012
Figure 895377DEST_PATH_IMAGE025
Figure 884193DEST_PATH_IMAGE013
Figure 747107DEST_PATH_IMAGE025
Figure 909098DEST_PATH_IMAGE014
Figure 173857DEST_PATH_IMAGE025
Figure 395891DEST_PATH_IMAGE015
Figure 480522DEST_PATH_IMAGE018
Figure 457922DEST_PATH_IMAGE016
Figure 577188DEST_PATH_IMAGE025
Figure 970123DEST_PATH_IMAGE017
Figure 807629DEST_PATH_IMAGE025
, during binary operator control variables k=7, decrypt operation is M i=
Figure 311423DEST_PATH_IMAGE026
Figure 285195DEST_PATH_IMAGE010
Figure 849032DEST_PATH_IMAGE026
Figure 908254DEST_PATH_IMAGE011
Figure 215739DEST_PATH_IMAGE026
Figure 309597DEST_PATH_IMAGE012
Figure 44335DEST_PATH_IMAGE026
Figure 590854DEST_PATH_IMAGE013
Figure 436450DEST_PATH_IMAGE026
Figure 290454DEST_PATH_IMAGE026
Figure 35873DEST_PATH_IMAGE026
Figure 104323DEST_PATH_IMAGE016
Figure 180863DEST_PATH_IMAGE018
Figure 889373DEST_PATH_IMAGE026
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 812330DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 59772DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 731373DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 508836DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the single argument parameter alternation monobasic encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 818844DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 673668DEST_PATH_IMAGE002
,
Figure 391088DEST_PATH_IMAGE003
,
Figure 723980DEST_PATH_IMAGE004
,
Figure 476036DEST_PATH_IMAGE005
,
Figure 236181DEST_PATH_IMAGE006
,
Figure 440898DEST_PATH_IMAGE007
,
Figure 515164DEST_PATH_IMAGE008
With , encryption parameter
Figure 52773DEST_PATH_IMAGE002
,
Figure 744785DEST_PATH_IMAGE003
,
Figure 419480DEST_PATH_IMAGE004
,
Figure 880548DEST_PATH_IMAGE005
,
Figure 185759DEST_PATH_IMAGE006
,
Figure 365068DEST_PATH_IMAGE007
,
Figure 577874DEST_PATH_IMAGE008
With
Figure 159028DEST_PATH_IMAGE009
Be 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as q and j, the binary system positive integer that encryption variables q and j are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 98482DEST_PATH_IMAGE011
Figure 114980DEST_PATH_IMAGE012
Figure 538922DEST_PATH_IMAGE013
Figure 248252DEST_PATH_IMAGE014
Figure 956762DEST_PATH_IMAGE016
Figure 246929DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 127160DEST_PATH_IMAGE010
Figure 502778DEST_PATH_IMAGE011
Figure 271331DEST_PATH_IMAGE013
Figure 384780DEST_PATH_IMAGE014
Figure 347368DEST_PATH_IMAGE016
Figure 346548DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 568582DEST_PATH_IMAGE010
Figure 918792DEST_PATH_IMAGE011
Figure 941423DEST_PATH_IMAGE013
Figure 68779DEST_PATH_IMAGE014
Figure 906285DEST_PATH_IMAGE015
Figure 649430DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 947687DEST_PATH_IMAGE010
Figure 579974DEST_PATH_IMAGE012
Figure 408253DEST_PATH_IMAGE013
Figure 142990DEST_PATH_IMAGE014
Figure 800685DEST_PATH_IMAGE016
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 654688DEST_PATH_IMAGE010
Figure 688504DEST_PATH_IMAGE011
Figure 349509DEST_PATH_IMAGE012
Figure 152380DEST_PATH_IMAGE013
Figure 228921DEST_PATH_IMAGE014
Figure 750032DEST_PATH_IMAGE015
Figure 860388DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 116237DEST_PATH_IMAGE011
Figure 107326DEST_PATH_IMAGE012
Figure 822473DEST_PATH_IMAGE013
Figure 240816DEST_PATH_IMAGE014
Figure 265720DEST_PATH_IMAGE016
Figure 897690DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 469934DEST_PATH_IMAGE011
Figure 802826DEST_PATH_IMAGE012
Figure 289302DEST_PATH_IMAGE013
Figure 315027DEST_PATH_IMAGE014
Figure 656327DEST_PATH_IMAGE016
Figure 997309DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 193936DEST_PATH_IMAGE010
Figure 885948DEST_PATH_IMAGE011
Figure 560643DEST_PATH_IMAGE012
Figure 21711DEST_PATH_IMAGE013
Figure 389239DEST_PATH_IMAGE014
Figure 302968DEST_PATH_IMAGE015
Figure 781354DEST_PATH_IMAGE016
Figure 362508DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 635357DEST_PATH_IMAGE010
Figure 290243DEST_PATH_IMAGE011
Figure 244424DEST_PATH_IMAGE012
Figure 123835DEST_PATH_IMAGE014
Figure 277736DEST_PATH_IMAGE015
Figure 97925DEST_PATH_IMAGE016
Figure 388092DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the monobasic cryptographic calculation is defined as H i=
Figure 268323DEST_PATH_IMAGE018
Figure 2241DEST_PATH_IMAGE019
Figure 412494DEST_PATH_IMAGE011
Figure 198047DEST_PATH_IMAGE019
Figure 60961DEST_PATH_IMAGE012
Figure 160635DEST_PATH_IMAGE019
Figure 51493DEST_PATH_IMAGE013
Figure 273527DEST_PATH_IMAGE019
Figure 561420DEST_PATH_IMAGE014
Figure 380788DEST_PATH_IMAGE015
Figure 548913DEST_PATH_IMAGE016
Figure 52706DEST_PATH_IMAGE019
Figure 38197DEST_PATH_IMAGE017
Figure 602034DEST_PATH_IMAGE019
, during binary operator control variables k=1, the monobasic cryptographic calculation is defined as H i=
Figure 926836DEST_PATH_IMAGE020
Figure 906424DEST_PATH_IMAGE010
Figure 282DEST_PATH_IMAGE018
Figure 735020DEST_PATH_IMAGE011
Figure 281539DEST_PATH_IMAGE020
Figure 392715DEST_PATH_IMAGE012
Figure 341079DEST_PATH_IMAGE020
Figure 246718DEST_PATH_IMAGE013
Figure 280533DEST_PATH_IMAGE020
Figure 795008DEST_PATH_IMAGE020
Figure 871549DEST_PATH_IMAGE015
Figure 392660DEST_PATH_IMAGE020
Figure 455425DEST_PATH_IMAGE016
Figure 378381DEST_PATH_IMAGE020
Figure 625823DEST_PATH_IMAGE017
Figure 634230DEST_PATH_IMAGE020
, during binary operator control variables k=2, the monobasic cryptographic calculation is defined as H i=
Figure 625320DEST_PATH_IMAGE021
Figure 402783DEST_PATH_IMAGE010
Figure 821126DEST_PATH_IMAGE021
Figure 783714DEST_PATH_IMAGE018
Figure 987928DEST_PATH_IMAGE013
Figure 320820DEST_PATH_IMAGE021
Figure 821302DEST_PATH_IMAGE021
Figure 26019DEST_PATH_IMAGE015
Figure 897023DEST_PATH_IMAGE021
Figure 503585DEST_PATH_IMAGE016
Figure 126644DEST_PATH_IMAGE017
Figure 66918DEST_PATH_IMAGE021
, during binary operator control variables k=3, the monobasic cryptographic calculation is defined as H i=
Figure 629935DEST_PATH_IMAGE010
Figure 287629DEST_PATH_IMAGE011
Figure 141633DEST_PATH_IMAGE012
Figure 542658DEST_PATH_IMAGE018
Figure 762418DEST_PATH_IMAGE013
Figure 704146DEST_PATH_IMAGE014
Figure 795730DEST_PATH_IMAGE022
Figure 615919DEST_PATH_IMAGE015
Figure 906086DEST_PATH_IMAGE022
Figure 520738DEST_PATH_IMAGE016
Figure 896355DEST_PATH_IMAGE022
Figure 664908DEST_PATH_IMAGE022
, during binary operator control variables k=4, the monobasic cryptographic calculation is defined as H i=
Figure 716041DEST_PATH_IMAGE023
Figure 641272DEST_PATH_IMAGE010
Figure 740946DEST_PATH_IMAGE023
Figure 68022DEST_PATH_IMAGE011
Figure 290056DEST_PATH_IMAGE023
Figure 374687DEST_PATH_IMAGE012
Figure 848184DEST_PATH_IMAGE013
Figure 241119DEST_PATH_IMAGE018
Figure 78625DEST_PATH_IMAGE014
Figure 582419DEST_PATH_IMAGE023
Figure 120028DEST_PATH_IMAGE023
Figure 179251DEST_PATH_IMAGE016
Figure 486735DEST_PATH_IMAGE023
Figure 580593DEST_PATH_IMAGE017
Figure 315331DEST_PATH_IMAGE023
, during binary operator control variables k=5, the monobasic cryptographic calculation is defined as H i=
Figure 861850DEST_PATH_IMAGE024
Figure 707446DEST_PATH_IMAGE010
Figure 655811DEST_PATH_IMAGE024
Figure 561450DEST_PATH_IMAGE011
Figure 595265DEST_PATH_IMAGE024
Figure 244552DEST_PATH_IMAGE012
Figure 313002DEST_PATH_IMAGE024
Figure 389542DEST_PATH_IMAGE013
Figure 645074DEST_PATH_IMAGE024
Figure 21009DEST_PATH_IMAGE018
Figure 268451DEST_PATH_IMAGE015
Figure 11279DEST_PATH_IMAGE024
Figure 990650DEST_PATH_IMAGE016
Figure 768113DEST_PATH_IMAGE024
Figure 682159DEST_PATH_IMAGE024
, during binary operator control variables k=6, the monobasic cryptographic calculation is defined as H i=
Figure 211361DEST_PATH_IMAGE025
Figure 760471DEST_PATH_IMAGE025
Figure 477891DEST_PATH_IMAGE011
Figure 748467DEST_PATH_IMAGE025
Figure 322985DEST_PATH_IMAGE025
Figure 465384DEST_PATH_IMAGE013
Figure 208529DEST_PATH_IMAGE014
Figure 827992DEST_PATH_IMAGE025
Figure 520004DEST_PATH_IMAGE015
Figure 460278DEST_PATH_IMAGE018
Figure 921347DEST_PATH_IMAGE016
Figure 23295DEST_PATH_IMAGE025
Figure 264920DEST_PATH_IMAGE017
Figure 743306DEST_PATH_IMAGE025
, during binary operator control variables k=7, the monobasic cryptographic calculation is defined as H i=
Figure 58881DEST_PATH_IMAGE026
Figure 597310DEST_PATH_IMAGE010
Figure 998335DEST_PATH_IMAGE026
Figure 280412DEST_PATH_IMAGE011
Figure 450493DEST_PATH_IMAGE026
Figure 159823DEST_PATH_IMAGE012
Figure 48145DEST_PATH_IMAGE026
Figure 817735DEST_PATH_IMAGE013
Figure 988134DEST_PATH_IMAGE014
Figure 363751DEST_PATH_IMAGE026
Figure 987631DEST_PATH_IMAGE015
Figure 46351DEST_PATH_IMAGE018
Figure 208342DEST_PATH_IMAGE017
Figure 473101DEST_PATH_IMAGE026
, set encryption parameter
Figure 429556DEST_PATH_IMAGE002
,
Figure 779765DEST_PATH_IMAGE003
, ,
Figure 864713DEST_PATH_IMAGE005
, ,
Figure 829575DEST_PATH_IMAGE007
,
Figure 333369DEST_PATH_IMAGE008
With
Figure 572720DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables q and j, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 136557DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure 503264DEST_PATH_IMAGE028
Figure 597122DEST_PATH_IMAGE010
Figure 331860DEST_PATH_IMAGE019
Figure 878379DEST_PATH_IMAGE011
Figure 672340DEST_PATH_IMAGE012
Figure 577979DEST_PATH_IMAGE019
Figure 63952DEST_PATH_IMAGE014
Figure 140492DEST_PATH_IMAGE019
Figure 649885DEST_PATH_IMAGE015
Figure 102863DEST_PATH_IMAGE019
Figure 760240DEST_PATH_IMAGE016
Figure 7682DEST_PATH_IMAGE019
Figure 16089DEST_PATH_IMAGE017
Figure 7179DEST_PATH_IMAGE019
Monobasic cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 784642DEST_PATH_IMAGE027
Carry out H 1=
Figure 698689DEST_PATH_IMAGE010
Figure 227890DEST_PATH_IMAGE019
Figure 859860DEST_PATH_IMAGE011
Figure 714683DEST_PATH_IMAGE019
Figure 432103DEST_PATH_IMAGE012
Figure 578045DEST_PATH_IMAGE019
Figure 330100DEST_PATH_IMAGE013
Figure 90246DEST_PATH_IMAGE019
Figure 294962DEST_PATH_IMAGE014
Figure 38108DEST_PATH_IMAGE015
Figure 661167DEST_PATH_IMAGE016
Figure 335862DEST_PATH_IMAGE019
Figure 164458DEST_PATH_IMAGE019
Carry out i+1, q+1, j+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 2=
Figure 343766DEST_PATH_IMAGE020
Figure 556573DEST_PATH_IMAGE010
Figure 137727DEST_PATH_IMAGE029
Figure 410576DEST_PATH_IMAGE011
Figure 77181DEST_PATH_IMAGE020
Figure 43081DEST_PATH_IMAGE012
Figure 478741DEST_PATH_IMAGE020
Figure 188071DEST_PATH_IMAGE013
Figure 76393DEST_PATH_IMAGE020
Figure 66980DEST_PATH_IMAGE015
Figure 442597DEST_PATH_IMAGE020
Figure 800897DEST_PATH_IMAGE016
Figure 211150DEST_PATH_IMAGE020
Figure 262283DEST_PATH_IMAGE017
Figure 125197DEST_PATH_IMAGE020
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 287188DEST_PATH_IMAGE030
Carry out H 2=
Figure 286368DEST_PATH_IMAGE020
Figure 570718DEST_PATH_IMAGE010
Figure 824293DEST_PATH_IMAGE011
Figure 943559DEST_PATH_IMAGE020
Figure 70915DEST_PATH_IMAGE012
Figure 908421DEST_PATH_IMAGE020
Figure 474532DEST_PATH_IMAGE013
Figure 713883DEST_PATH_IMAGE020
Figure 12140DEST_PATH_IMAGE014
Figure 336942DEST_PATH_IMAGE020
Figure 644427DEST_PATH_IMAGE015
Figure 472706DEST_PATH_IMAGE020
Figure 207444DEST_PATH_IMAGE016
Figure 753963DEST_PATH_IMAGE020
Figure 865138DEST_PATH_IMAGE017
Figure 813502DEST_PATH_IMAGE020
Carry out i+1, q+1, j+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 3=
Figure 719142DEST_PATH_IMAGE021
Figure 752957DEST_PATH_IMAGE010
Figure 390525DEST_PATH_IMAGE021
Figure 193396DEST_PATH_IMAGE011
Figure 269936DEST_PATH_IMAGE031
Figure 791048DEST_PATH_IMAGE012
Figure 978446DEST_PATH_IMAGE021
Figure 901403DEST_PATH_IMAGE013
Figure 148845DEST_PATH_IMAGE021
Figure 925805DEST_PATH_IMAGE015
Figure 344148DEST_PATH_IMAGE021
Figure 574272DEST_PATH_IMAGE016
Figure 369053DEST_PATH_IMAGE021
Figure 1023DEST_PATH_IMAGE017
Figure 590267DEST_PATH_IMAGE021
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100237915A 2013-01-22 2013-01-22 Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark Pending CN103106500A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100237915A CN103106500A (en) 2013-01-22 2013-01-22 Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100237915A CN103106500A (en) 2013-01-22 2013-01-22 Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark

Publications (1)

Publication Number Publication Date
CN103106500A true CN103106500A (en) 2013-05-15

Family

ID=48314346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100237915A Pending CN103106500A (en) 2013-01-22 2013-01-22 Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103106500A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102225671A (en) * 2011-04-14 2011-10-26 北京印刷学院 Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102831835A (en) * 2011-06-14 2012-12-19 张晋 Inkless printing book paper

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102225671A (en) * 2011-04-14 2011-10-26 北京印刷学院 Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102831835A (en) * 2011-06-14 2012-12-19 张晋 Inkless printing book paper

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, article "《密码学导引》", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106500A (en) Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark
CN103106476A (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106504A (en) Single variable parameter transmutation binary encryption anti-fake information storage trademark
CN103106444A (en) Single variable parameter transmutation ternary encryption anti-fake information storage trademark
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103106478A (en) Single variable parameter transmutation ternary circulation encryption anti-fake information storage trademark
CN103106507A (en) Multiparameter univariate unitary encryption anti-fake information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116783A (en) Parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106509A (en) Single variable parameter transmutation multi-element variable circulation encryption anti-fake information storage trademark
CN103106479A (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106487A (en) Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106493A (en) Parameter transmutation ternary circulation encryption anti-fake information storage trademark
CN103106468A (en) Parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106436A (en) Multiparameter univariate unitary cycle encryption anti-fake information storage trademark
CN103106458A (en) Single variable parameter transmutation multi-element circulation encryption anti-fake information storage trademark
CN103116782A (en) Univariate parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106471A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106521A (en) Multiparameter univariate ternary encryption anti-fake information storage trademark
CN103106525A (en) Multiparameter multielement encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515