CN103106503A - Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark - Google Patents

Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106503A
CN103106503A CN2013100238091A CN201310023809A CN103106503A CN 103106503 A CN103106503 A CN 103106503A CN 2013100238091 A CN2013100238091 A CN 2013100238091A CN 201310023809 A CN201310023809 A CN 201310023809A CN 103106503 A CN103106503 A CN 103106503A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100238091A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100238091A priority Critical patent/CN103106503A/en
Publication of CN103106503A publication Critical patent/CN103106503A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Printing Methods (AREA)

Abstract

Disclosed is a multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark. The multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark can enable binary system anti-fake information to be generated into a binary system modulating signal through polynary encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 932659DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 443275DEST_PATH_IMAGE002
Figure 691854DEST_PATH_IMAGE003
Figure 149380DEST_PATH_IMAGE004
Figure 720759DEST_PATH_IMAGE007
Figure 981976DEST_PATH_IMAGE008
With
Figure 119696DEST_PATH_IMAGE009
, encryption parameter
Figure 706535DEST_PATH_IMAGE002
Figure 929706DEST_PATH_IMAGE003
Figure 729035DEST_PATH_IMAGE004
Figure 845896DEST_PATH_IMAGE005
Figure 744582DEST_PATH_IMAGE006
Figure 579682DEST_PATH_IMAGE007
Figure 323647DEST_PATH_IMAGE008
With
Figure 560594DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 958077DEST_PATH_IMAGE010
Figure 155840DEST_PATH_IMAGE011
Figure 828130DEST_PATH_IMAGE012
Figure 160071DEST_PATH_IMAGE014
Figure 173027DEST_PATH_IMAGE015
Figure 524374DEST_PATH_IMAGE016
Figure 470333DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 881723DEST_PATH_IMAGE010
Figure 913132DEST_PATH_IMAGE011
Figure 396066DEST_PATH_IMAGE012
Figure 337478DEST_PATH_IMAGE013
Figure 44402DEST_PATH_IMAGE014
Figure 438475DEST_PATH_IMAGE015
Figure 256258DEST_PATH_IMAGE016
Figure 786596DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 545791DEST_PATH_IMAGE011
Figure 167265DEST_PATH_IMAGE012
Figure 817689DEST_PATH_IMAGE013
Figure 600838DEST_PATH_IMAGE014
Figure 969502DEST_PATH_IMAGE015
Figure 899598DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 709608DEST_PATH_IMAGE011
Figure 141726DEST_PATH_IMAGE012
Figure 891693DEST_PATH_IMAGE014
Figure 94005DEST_PATH_IMAGE015
Figure 736339DEST_PATH_IMAGE016
Figure 340495DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 777293DEST_PATH_IMAGE010
Figure 466900DEST_PATH_IMAGE011
Figure 647346DEST_PATH_IMAGE012
Figure 574850DEST_PATH_IMAGE013
Figure 307183DEST_PATH_IMAGE014
Figure 890611DEST_PATH_IMAGE015
Figure 202644DEST_PATH_IMAGE016
Figure 656759DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 966518DEST_PATH_IMAGE010
Figure 630717DEST_PATH_IMAGE011
Figure 746441DEST_PATH_IMAGE012
Figure 55062DEST_PATH_IMAGE013
Figure 535722DEST_PATH_IMAGE014
Figure 433357DEST_PATH_IMAGE015
Figure 759296DEST_PATH_IMAGE016
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 760936DEST_PATH_IMAGE010
Figure 275094DEST_PATH_IMAGE011
Figure 263779DEST_PATH_IMAGE012
Figure 281413DEST_PATH_IMAGE013
Figure 962931DEST_PATH_IMAGE014
Figure 698805DEST_PATH_IMAGE015
Figure 960022DEST_PATH_IMAGE016
Figure 956797DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 402691DEST_PATH_IMAGE010
Figure 625862DEST_PATH_IMAGE011
Figure 18666DEST_PATH_IMAGE012
Figure 440737DEST_PATH_IMAGE014
Figure 10259DEST_PATH_IMAGE015
Figure 19803DEST_PATH_IMAGE016
Figure 256749DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 60757DEST_PATH_IMAGE010
Figure 383154DEST_PATH_IMAGE011
Figure 930810DEST_PATH_IMAGE012
Figure 491105DEST_PATH_IMAGE013
Figure 573013DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 609288DEST_PATH_IMAGE010
Figure 92222DEST_PATH_IMAGE019
Figure 33633DEST_PATH_IMAGE011
Figure 474979DEST_PATH_IMAGE018
Figure 869051DEST_PATH_IMAGE012
Figure 686834DEST_PATH_IMAGE019
Figure 482752DEST_PATH_IMAGE013
Figure 360578DEST_PATH_IMAGE018
Figure 241947DEST_PATH_IMAGE014
Figure 597842DEST_PATH_IMAGE019
Figure 248266DEST_PATH_IMAGE015
Figure 296993DEST_PATH_IMAGE018
Figure 665658DEST_PATH_IMAGE016
Figure 825243DEST_PATH_IMAGE019
Figure 330174DEST_PATH_IMAGE017
Figure 549803DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 405763DEST_PATH_IMAGE018
Figure 572303DEST_PATH_IMAGE010
 
Figure 587849DEST_PATH_IMAGE011
 
Figure 790160DEST_PATH_IMAGE018
 
Figure 36651DEST_PATH_IMAGE020
 
Figure 683116DEST_PATH_IMAGE014
 
Figure 282725DEST_PATH_IMAGE020
Figure 15057DEST_PATH_IMAGE015
   
Figure 364633DEST_PATH_IMAGE020
 
Figure 807433DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 923156DEST_PATH_IMAGE018
Figure 899389DEST_PATH_IMAGE021
Figure 660671DEST_PATH_IMAGE011
Figure 111244DEST_PATH_IMAGE018
Figure 274372DEST_PATH_IMAGE012
Figure 519409DEST_PATH_IMAGE021
Figure 33567DEST_PATH_IMAGE013
Figure 22251DEST_PATH_IMAGE018
Figure 190245DEST_PATH_IMAGE021
Figure 50753DEST_PATH_IMAGE015
Figure 452916DEST_PATH_IMAGE018
Figure 715270DEST_PATH_IMAGE016
Figure 443054DEST_PATH_IMAGE021
Figure 525280DEST_PATH_IMAGE017
Figure 590188DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 340155DEST_PATH_IMAGE010
Figure 50622DEST_PATH_IMAGE022
Figure 31533DEST_PATH_IMAGE018
Figure 225754DEST_PATH_IMAGE012
Figure 157938DEST_PATH_IMAGE022
Figure 95807DEST_PATH_IMAGE013
Figure 62626DEST_PATH_IMAGE018
Figure 162169DEST_PATH_IMAGE014
Figure 847229DEST_PATH_IMAGE022
Figure 323209DEST_PATH_IMAGE015
Figure 321755DEST_PATH_IMAGE022
Figure 601427DEST_PATH_IMAGE017
Figure 870734DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 453025DEST_PATH_IMAGE018
Figure 971731DEST_PATH_IMAGE010
Figure 664881DEST_PATH_IMAGE023
Figure 54274DEST_PATH_IMAGE011
Figure 932100DEST_PATH_IMAGE018
Figure 547889DEST_PATH_IMAGE012
Figure 169363DEST_PATH_IMAGE023
Figure 819787DEST_PATH_IMAGE013
Figure 868515DEST_PATH_IMAGE018
Figure 237179DEST_PATH_IMAGE014
Figure 865607DEST_PATH_IMAGE023
Figure 495171DEST_PATH_IMAGE015
Figure 590166DEST_PATH_IMAGE018
Figure 316900DEST_PATH_IMAGE016
Figure 155543DEST_PATH_IMAGE023
Figure 905193DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 373401DEST_PATH_IMAGE018
Figure 750155DEST_PATH_IMAGE010
Figure 823154DEST_PATH_IMAGE024
Figure 949559DEST_PATH_IMAGE018
Figure 254638DEST_PATH_IMAGE012
Figure 854247DEST_PATH_IMAGE024
Figure 966745DEST_PATH_IMAGE018
Figure 75515DEST_PATH_IMAGE014
Figure 831485DEST_PATH_IMAGE018
Figure 947208DEST_PATH_IMAGE016
Figure 255830DEST_PATH_IMAGE024
Figure 329965DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 541821DEST_PATH_IMAGE018
Figure 970528DEST_PATH_IMAGE010
Figure 57618DEST_PATH_IMAGE011
Figure 921669DEST_PATH_IMAGE018
Figure 329517DEST_PATH_IMAGE012
Figure 620821DEST_PATH_IMAGE025
Figure 481330DEST_PATH_IMAGE013
Figure 149071DEST_PATH_IMAGE018
Figure 880267DEST_PATH_IMAGE014
Figure 278570DEST_PATH_IMAGE016
Figure 36311DEST_PATH_IMAGE025
Figure 746778DEST_PATH_IMAGE017
Figure 349797DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 321164DEST_PATH_IMAGE018
Figure 390751DEST_PATH_IMAGE010
Figure 447569DEST_PATH_IMAGE026
Figure 260804DEST_PATH_IMAGE011
Figure 555520DEST_PATH_IMAGE018
Figure 920642DEST_PATH_IMAGE012
Figure 340122DEST_PATH_IMAGE026
Figure 816103DEST_PATH_IMAGE013
Figure 637428DEST_PATH_IMAGE018
Figure 173452DEST_PATH_IMAGE014
Figure 80228DEST_PATH_IMAGE026
Figure 683203DEST_PATH_IMAGE015
Figure 359034DEST_PATH_IMAGE018
Figure 65959DEST_PATH_IMAGE016
Figure 460032DEST_PATH_IMAGE026
Figure 277815DEST_PATH_IMAGE017
Figure 759218DEST_PATH_IMAGE018
, set encryption parameter
Figure 371465DEST_PATH_IMAGE002
Figure 524732DEST_PATH_IMAGE005
Figure 676545DEST_PATH_IMAGE007
Figure 836131DEST_PATH_IMAGE008
With
Figure 606641DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 826269DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 416651DEST_PATH_IMAGE027
Carry out H1=
Figure 379927DEST_PATH_IMAGE028
Figure 598419DEST_PATH_IMAGE010
Figure 864315DEST_PATH_IMAGE019
Figure 443381DEST_PATH_IMAGE028
Figure 47538DEST_PATH_IMAGE012
Figure 484336DEST_PATH_IMAGE019
Figure 173943DEST_PATH_IMAGE013
Figure 947864DEST_PATH_IMAGE028
Figure 281893DEST_PATH_IMAGE014
Figure 14226DEST_PATH_IMAGE019
Figure 66495DEST_PATH_IMAGE015
Figure 175266DEST_PATH_IMAGE028
Figure 363802DEST_PATH_IMAGE016
Figure 267036DEST_PATH_IMAGE019
Figure 453483DEST_PATH_IMAGE028
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 762105DEST_PATH_IMAGE027
Carry out H1=
Figure 847959DEST_PATH_IMAGE028
Figure 874821DEST_PATH_IMAGE010
Figure 59814DEST_PATH_IMAGE019
Figure 222943DEST_PATH_IMAGE011
Figure 733558DEST_PATH_IMAGE028
Figure 982137DEST_PATH_IMAGE012
Figure 254035DEST_PATH_IMAGE013
Figure 669973DEST_PATH_IMAGE028
Figure 405848DEST_PATH_IMAGE014
Figure 854016DEST_PATH_IMAGE019
Figure 959113DEST_PATH_IMAGE015
Figure 545952DEST_PATH_IMAGE028
Figure 362598DEST_PATH_IMAGE016
Figure 568452DEST_PATH_IMAGE019
Figure 685312DEST_PATH_IMAGE017
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 481416DEST_PATH_IMAGE029
Figure 225381DEST_PATH_IMAGE010
Figure 462327DEST_PATH_IMAGE020
Figure 266335DEST_PATH_IMAGE011
Figure 57574DEST_PATH_IMAGE029
Figure 729863DEST_PATH_IMAGE012
Figure 61805DEST_PATH_IMAGE013
Figure 481285DEST_PATH_IMAGE029
Figure 314614DEST_PATH_IMAGE015
Figure 221391DEST_PATH_IMAGE029
Figure 704324DEST_PATH_IMAGE016
Figure 770369DEST_PATH_IMAGE020
Figure 871367DEST_PATH_IMAGE029
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 564516DEST_PATH_IMAGE030
Carry out H2=
Figure 219488DEST_PATH_IMAGE029
Figure 503839DEST_PATH_IMAGE010
Figure 657106DEST_PATH_IMAGE029
Figure 451973DEST_PATH_IMAGE012
Figure 820637DEST_PATH_IMAGE020
Figure 980223DEST_PATH_IMAGE013
Figure 750733DEST_PATH_IMAGE029
Figure 704783DEST_PATH_IMAGE014
Figure 560743DEST_PATH_IMAGE020
Figure 992862DEST_PATH_IMAGE015
Figure 742829DEST_PATH_IMAGE016
Figure 649791DEST_PATH_IMAGE017
Figure 253947DEST_PATH_IMAGE029
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 849194DEST_PATH_IMAGE010
Figure 154273DEST_PATH_IMAGE021
Figure 488303DEST_PATH_IMAGE011
Figure 220635DEST_PATH_IMAGE031
Figure 570211DEST_PATH_IMAGE013
Figure 473445DEST_PATH_IMAGE031
Figure 13011DEST_PATH_IMAGE014
Figure 659893DEST_PATH_IMAGE021
Figure 968514DEST_PATH_IMAGE015
Figure 42650DEST_PATH_IMAGE031
Figure 803932DEST_PATH_IMAGE016
Figure 254505DEST_PATH_IMAGE021
Figure 417633DEST_PATH_IMAGE017
Figure 662670DEST_PATH_IMAGE031
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 165512DEST_PATH_IMAGE002
Figure 864664DEST_PATH_IMAGE004
Figure 600539DEST_PATH_IMAGE005
Figure 392914DEST_PATH_IMAGE006
Figure 265055DEST_PATH_IMAGE007
Figure 117474DEST_PATH_IMAGE008
With
Figure 340645DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by polynary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 139973DEST_PATH_IMAGE018
Figure 256834DEST_PATH_IMAGE010
Figure 155520DEST_PATH_IMAGE019
Figure 725041DEST_PATH_IMAGE011
Figure 734586DEST_PATH_IMAGE018
Figure 775540DEST_PATH_IMAGE019
Figure 566778DEST_PATH_IMAGE013
Figure 305430DEST_PATH_IMAGE019
Figure 990490DEST_PATH_IMAGE015
Figure 935312DEST_PATH_IMAGE018
Figure 881271DEST_PATH_IMAGE016
Figure 292661DEST_PATH_IMAGE019
Figure 324071DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 353610DEST_PATH_IMAGE018
 
Figure 944494DEST_PATH_IMAGE011
 
Figure 271570DEST_PATH_IMAGE018
 
Figure 30765DEST_PATH_IMAGE020
Figure 917818DEST_PATH_IMAGE013
 
Figure 692876DEST_PATH_IMAGE018
Figure 616970DEST_PATH_IMAGE014
 
Figure 110268DEST_PATH_IMAGE020
Figure 456805DEST_PATH_IMAGE015
 
Figure 617528DEST_PATH_IMAGE018
Figure 837156DEST_PATH_IMAGE016
 
Figure 693117DEST_PATH_IMAGE020
Figure 859656DEST_PATH_IMAGE017
 , it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 875203DEST_PATH_IMAGE018
Figure 77514DEST_PATH_IMAGE010
Figure 313323DEST_PATH_IMAGE021
Figure 792846DEST_PATH_IMAGE011
Figure 354277DEST_PATH_IMAGE018
Figure 919251DEST_PATH_IMAGE012
Figure 427593DEST_PATH_IMAGE021
Figure 759534DEST_PATH_IMAGE018
Figure 936437DEST_PATH_IMAGE014
Figure 296060DEST_PATH_IMAGE015
Figure 74660DEST_PATH_IMAGE018
Figure 738860DEST_PATH_IMAGE016
Figure 756680DEST_PATH_IMAGE017
Figure 706182DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 592098DEST_PATH_IMAGE018
Figure 511513DEST_PATH_IMAGE010
Figure 433835DEST_PATH_IMAGE018
Figure 434239DEST_PATH_IMAGE012
Figure 451873DEST_PATH_IMAGE022
Figure 133390DEST_PATH_IMAGE013
Figure 869265DEST_PATH_IMAGE018
Figure 396061DEST_PATH_IMAGE014
Figure 533782DEST_PATH_IMAGE022
Figure 386200DEST_PATH_IMAGE015
Figure 343792DEST_PATH_IMAGE018
Figure 251443DEST_PATH_IMAGE016
Figure 243669DEST_PATH_IMAGE022
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 846055DEST_PATH_IMAGE018
Figure 692788DEST_PATH_IMAGE010
Figure 887009DEST_PATH_IMAGE023
Figure 819193DEST_PATH_IMAGE011
Figure 757062DEST_PATH_IMAGE018
Figure 723881DEST_PATH_IMAGE012
Figure 823424DEST_PATH_IMAGE023
Figure 508483DEST_PATH_IMAGE013
Figure 984464DEST_PATH_IMAGE018
Figure 805790DEST_PATH_IMAGE014
Figure 76234DEST_PATH_IMAGE023
Figure 983010DEST_PATH_IMAGE015
Figure 262682DEST_PATH_IMAGE018
Figure 938514DEST_PATH_IMAGE016
Figure 645439DEST_PATH_IMAGE023
Figure 39511DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 653212DEST_PATH_IMAGE018
Figure 740302DEST_PATH_IMAGE024
Figure 237143DEST_PATH_IMAGE011
Figure 12201DEST_PATH_IMAGE018
Figure 936294DEST_PATH_IMAGE012
Figure 429593DEST_PATH_IMAGE024
Figure 464545DEST_PATH_IMAGE013
Figure 94109DEST_PATH_IMAGE018
Figure 189104DEST_PATH_IMAGE014
Figure 805079DEST_PATH_IMAGE015
Figure 554729DEST_PATH_IMAGE018
Figure 22937DEST_PATH_IMAGE024
Figure 399692DEST_PATH_IMAGE017
Figure 3848DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 440646DEST_PATH_IMAGE018
Figure 130253DEST_PATH_IMAGE010
Figure 310699DEST_PATH_IMAGE025
Figure 34941DEST_PATH_IMAGE011
Figure 642640DEST_PATH_IMAGE018
Figure 565683DEST_PATH_IMAGE012
Figure 549819DEST_PATH_IMAGE025
Figure 305789DEST_PATH_IMAGE014
Figure 828037DEST_PATH_IMAGE025
Figure 261292DEST_PATH_IMAGE015
Figure 210794DEST_PATH_IMAGE018
Figure 362289DEST_PATH_IMAGE016
Figure 422649DEST_PATH_IMAGE025
Figure 975990DEST_PATH_IMAGE017
Figure 96393DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 469606DEST_PATH_IMAGE018
Figure 115405DEST_PATH_IMAGE026
Figure 406710DEST_PATH_IMAGE011
Figure 267218DEST_PATH_IMAGE018
Figure 934960DEST_PATH_IMAGE012
Figure 197314DEST_PATH_IMAGE026
Figure 659519DEST_PATH_IMAGE013
Figure 7324DEST_PATH_IMAGE018
Figure 478757DEST_PATH_IMAGE014
Figure 595617DEST_PATH_IMAGE026
Figure 228724DEST_PATH_IMAGE015
Figure 73369DEST_PATH_IMAGE016
Figure 44736DEST_PATH_IMAGE026
Figure 114323DEST_PATH_IMAGE017
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 577852DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 279091DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 644214DEST_PATH_IMAGE027
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 63694DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 539674DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 205029DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 591011DEST_PATH_IMAGE002
Figure 964223DEST_PATH_IMAGE003
Figure 828274DEST_PATH_IMAGE004
Figure 236122DEST_PATH_IMAGE005
Figure 527426DEST_PATH_IMAGE006
Figure 387934DEST_PATH_IMAGE007
With
Figure 786872DEST_PATH_IMAGE009
, encryption parameter
Figure 596882DEST_PATH_IMAGE003
Figure 396210DEST_PATH_IMAGE004
Figure 513071DEST_PATH_IMAGE005
Figure 411757DEST_PATH_IMAGE006
Figure 246858DEST_PATH_IMAGE007
Figure 990823DEST_PATH_IMAGE008
With
Figure 227769DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 31777DEST_PATH_IMAGE010
Figure 495305DEST_PATH_IMAGE012
Figure 462124DEST_PATH_IMAGE013
Figure 827247DEST_PATH_IMAGE014
Figure 246727DEST_PATH_IMAGE015
Figure 722707DEST_PATH_IMAGE016
Figure 137508DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 986832DEST_PATH_IMAGE011
Figure 925DEST_PATH_IMAGE012
Figure 942336DEST_PATH_IMAGE013
Figure 649261DEST_PATH_IMAGE014
Figure 43333DEST_PATH_IMAGE015
Figure 861116DEST_PATH_IMAGE016
Figure 391455DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 269281DEST_PATH_IMAGE010
Figure 755843DEST_PATH_IMAGE011
Figure 252684DEST_PATH_IMAGE012
Figure 27742DEST_PATH_IMAGE013
Figure 686256DEST_PATH_IMAGE014
Figure 179555DEST_PATH_IMAGE015
Figure 214507DEST_PATH_IMAGE016
Figure 109650DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 939066DEST_PATH_IMAGE010
Figure 388502DEST_PATH_IMAGE011
Figure 351779DEST_PATH_IMAGE012
Figure 711216DEST_PATH_IMAGE013
Figure 101746DEST_PATH_IMAGE014
Figure 179423DEST_PATH_IMAGE015
Figure 946391DEST_PATH_IMAGE016
Figure 425914DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 987345DEST_PATH_IMAGE010
Figure 552319DEST_PATH_IMAGE011
Figure 857398DEST_PATH_IMAGE012
Figure 191428DEST_PATH_IMAGE013
Figure 923760DEST_PATH_IMAGE014
Figure 976030DEST_PATH_IMAGE015
Figure 819221DEST_PATH_IMAGE016
Figure 273336DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 176570DEST_PATH_IMAGE010
Figure 363018DEST_PATH_IMAGE012
Figure 265115DEST_PATH_IMAGE013
Figure 100533DEST_PATH_IMAGE015
Figure 426472DEST_PATH_IMAGE016
Figure 714234DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 834636DEST_PATH_IMAGE010
Figure 473428DEST_PATH_IMAGE011
Figure 930954DEST_PATH_IMAGE012
Figure 948589DEST_PATH_IMAGE013
Figure 630106DEST_PATH_IMAGE014
Figure 365981DEST_PATH_IMAGE015
Figure 158356DEST_PATH_IMAGE016
Figure 623973DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 351757DEST_PATH_IMAGE010
Figure 699562DEST_PATH_IMAGE011
Figure 905415DEST_PATH_IMAGE012
Figure 22276DEST_PATH_IMAGE013
Figure 920962DEST_PATH_IMAGE014
Figure 490483DEST_PATH_IMAGE015
Figure 736974DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 540982DEST_PATH_IMAGE010
Figure 863379DEST_PATH_IMAGE011
Figure 411035DEST_PATH_IMAGE012
Figure 502488DEST_PATH_IMAGE013
Figure 477397DEST_PATH_IMAGE014
Figure 287090DEST_PATH_IMAGE015
Figure 231912DEST_PATH_IMAGE016
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 589261DEST_PATH_IMAGE018
Figure 496037DEST_PATH_IMAGE010
Figure 510130DEST_PATH_IMAGE019
Figure 525577DEST_PATH_IMAGE011
Figure 610262DEST_PATH_IMAGE012
Figure 428045DEST_PATH_IMAGE019
Figure 817438DEST_PATH_IMAGE013
Figure 570631DEST_PATH_IMAGE018
Figure 576633DEST_PATH_IMAGE014
Figure 807894DEST_PATH_IMAGE019
Figure 582952DEST_PATH_IMAGE015
Figure 507046DEST_PATH_IMAGE018
Figure 344DEST_PATH_IMAGE016
Figure 628771DEST_PATH_IMAGE019
Figure 133702DEST_PATH_IMAGE017
Figure 353331DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 209291DEST_PATH_IMAGE018
Figure 906989DEST_PATH_IMAGE010
 
Figure 532005DEST_PATH_IMAGE020
Figure 922535DEST_PATH_IMAGE011
 
Figure 213DEST_PATH_IMAGE018
Figure 767180DEST_PATH_IMAGE012
 
Figure 246703DEST_PATH_IMAGE020
Figure 808135DEST_PATH_IMAGE013
 
Figure 373108DEST_PATH_IMAGE018
Figure 412608DEST_PATH_IMAGE014
 
Figure 12217DEST_PATH_IMAGE020
 
Figure 796819DEST_PATH_IMAGE018
Figure 640010DEST_PATH_IMAGE016
 
Figure 94125DEST_PATH_IMAGE020
Figure 997359DEST_PATH_IMAGE017
 
Figure 536925DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 652649DEST_PATH_IMAGE018
Figure 492429DEST_PATH_IMAGE010
Figure 566564DEST_PATH_IMAGE021
Figure 247261DEST_PATH_IMAGE018
Figure 535023DEST_PATH_IMAGE012
Figure 655426DEST_PATH_IMAGE021
Figure 294217DEST_PATH_IMAGE013
Figure 158268DEST_PATH_IMAGE018
Figure 300537DEST_PATH_IMAGE014
Figure 857420DEST_PATH_IMAGE021
Figure 717928DEST_PATH_IMAGE015
Figure 120091DEST_PATH_IMAGE018
Figure 851287DEST_PATH_IMAGE016
Figure 703705DEST_PATH_IMAGE021
Figure 257363DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 249590DEST_PATH_IMAGE018
Figure 7330DEST_PATH_IMAGE010
Figure 772744DEST_PATH_IMAGE018
Figure 961466DEST_PATH_IMAGE022
Figure 899335DEST_PATH_IMAGE013
Figure 866154DEST_PATH_IMAGE018
Figure 372222DEST_PATH_IMAGE014
Figure 650756DEST_PATH_IMAGE022
Figure 126737DEST_PATH_IMAGE015
Figure 948063DEST_PATH_IMAGE018
Figure 218507DEST_PATH_IMAGE016
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 787712DEST_PATH_IMAGE018
Figure 181784DEST_PATH_IMAGE010
Figure 999567DEST_PATH_IMAGE023
Figure 795485DEST_PATH_IMAGE011
Figure 673311DEST_PATH_IMAGE018
Figure 289100DEST_PATH_IMAGE012
Figure 910574DEST_PATH_IMAGE023
Figure 560998DEST_PATH_IMAGE013
Figure 609726DEST_PATH_IMAGE018
Figure 978390DEST_PATH_IMAGE014
Figure 137976DEST_PATH_IMAGE023
Figure 236382DEST_PATH_IMAGE015
Figure 862536DEST_PATH_IMAGE018
Figure 452917DEST_PATH_IMAGE016
Figure 416194DEST_PATH_IMAGE023
Figure 634685DEST_PATH_IMAGE017
Figure 900582DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 102893DEST_PATH_IMAGE018
Figure 479648DEST_PATH_IMAGE010
Figure 520602DEST_PATH_IMAGE011
Figure 210209DEST_PATH_IMAGE018
Figure 390655DEST_PATH_IMAGE012
Figure 114897DEST_PATH_IMAGE024
Figure 722596DEST_PATH_IMAGE013
Figure 633920DEST_PATH_IMAGE018
Figure 196806DEST_PATH_IMAGE024
Figure 975406DEST_PATH_IMAGE015
Figure 896274DEST_PATH_IMAGE016
Figure 329530DEST_PATH_IMAGE024
Figure 279031DEST_PATH_IMAGE017
Figure 430527DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 44228DEST_PATH_IMAGE010
Figure 164631DEST_PATH_IMAGE025
Figure 537843DEST_PATH_IMAGE011
Figure 809741DEST_PATH_IMAGE012
Figure 101045DEST_PATH_IMAGE025
Figure 961554DEST_PATH_IMAGE013
Figure 629296DEST_PATH_IMAGE018
Figure 360491DEST_PATH_IMAGE014
Figure 959049DEST_PATH_IMAGE025
Figure 182220DEST_PATH_IMAGE015
Figure 371762DEST_PATH_IMAGE018
Figure 957464DEST_PATH_IMAGE016
Figure 715205DEST_PATH_IMAGE025
Figure 559850DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 406583DEST_PATH_IMAGE018
Figure 600804DEST_PATH_IMAGE010
Figure 470857DEST_PATH_IMAGE011
Figure 172097DEST_PATH_IMAGE018
Figure 537219DEST_PATH_IMAGE012
Figure 956699DEST_PATH_IMAGE026
Figure 847480DEST_PATH_IMAGE018
Figure 258870DEST_PATH_IMAGE014
Figure 290280DEST_PATH_IMAGE026
Figure 445318DEST_PATH_IMAGE015
Figure 245784DEST_PATH_IMAGE018
Figure 828075DEST_PATH_IMAGE016
Figure 346781DEST_PATH_IMAGE026
Figure 22799DEST_PATH_IMAGE018
, set encryption parameter
Figure 516414DEST_PATH_IMAGE003
Figure 606730DEST_PATH_IMAGE004
Figure 850629DEST_PATH_IMAGE005
Figure 774723DEST_PATH_IMAGE006
Figure 2442DEST_PATH_IMAGE007
Figure 37394DEST_PATH_IMAGE008
With
Figure 526013DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 745642DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 336023DEST_PATH_IMAGE027
Carry out H1=
Figure 299300DEST_PATH_IMAGE028
Figure 783688DEST_PATH_IMAGE019
Figure 362754DEST_PATH_IMAGE028
Figure 498069DEST_PATH_IMAGE012
Figure 59500DEST_PATH_IMAGE019
Figure 624474DEST_PATH_IMAGE013
Figure 929553DEST_PATH_IMAGE028
Figure 868777DEST_PATH_IMAGE014
Figure 69951DEST_PATH_IMAGE019
Figure 122221DEST_PATH_IMAGE015
Figure 230991DEST_PATH_IMAGE028
Figure 696662DEST_PATH_IMAGE019
Figure 236228DEST_PATH_IMAGE017
Figure 883110DEST_PATH_IMAGE028
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 847524DEST_PATH_IMAGE027
Carry out H1=
Figure 948521DEST_PATH_IMAGE010
Figure 8881DEST_PATH_IMAGE019
Figure 765484DEST_PATH_IMAGE011
Figure 276100DEST_PATH_IMAGE028
Figure 524679DEST_PATH_IMAGE012
Figure 513363DEST_PATH_IMAGE019
Figure 796577DEST_PATH_IMAGE013
Figure 948390DEST_PATH_IMAGE014
Figure 740765DEST_PATH_IMAGE019
Figure 776909DEST_PATH_IMAGE028
Figure 80DEST_PATH_IMAGE016
Figure 330567DEST_PATH_IMAGE019
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 56581DEST_PATH_IMAGE029
Figure 925179DEST_PATH_IMAGE010
Figure 37492DEST_PATH_IMAGE020
Figure 966134DEST_PATH_IMAGE011
Figure 836187DEST_PATH_IMAGE012
Figure 803006DEST_PATH_IMAGE020
Figure 168128DEST_PATH_IMAGE013
Figure 587608DEST_PATH_IMAGE029
Figure 63589DEST_PATH_IMAGE014
Figure 614742DEST_PATH_IMAGE020
Figure 26132DEST_PATH_IMAGE015
Figure 57542DEST_PATH_IMAGE029
Figure 947000DEST_PATH_IMAGE016
Figure 13045DEST_PATH_IMAGE020
Figure 595336DEST_PATH_IMAGE017
Figure 114042DEST_PATH_IMAGE029
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 807192DEST_PATH_IMAGE030
Carry out H2=
Figure 462164DEST_PATH_IMAGE029
Figure 215356DEST_PATH_IMAGE010
Figure 221359DEST_PATH_IMAGE020
Figure 718199DEST_PATH_IMAGE011
Figure 493257DEST_PATH_IMAGE029
Figure 151771DEST_PATH_IMAGE012
Figure 645070DEST_PATH_IMAGE020
Figure 680022DEST_PATH_IMAGE013
Figure 575165DEST_PATH_IMAGE029
Figure 404581DEST_PATH_IMAGE014
Figure 385176DEST_PATH_IMAGE020
Figure 223819DEST_PATH_IMAGE015
Figure 707889DEST_PATH_IMAGE029
Figure 176097DEST_PATH_IMAGE020
Figure 818431DEST_PATH_IMAGE017
Figure 422588DEST_PATH_IMAGE029
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 859385DEST_PATH_IMAGE031
Figure 548992DEST_PATH_IMAGE010
Figure 188101DEST_PATH_IMAGE011
Figure 795800DEST_PATH_IMAGE031
Figure 972704DEST_PATH_IMAGE012
Figure 691261DEST_PATH_IMAGE021
Figure 48610DEST_PATH_IMAGE031
Figure 712809DEST_PATH_IMAGE014
Figure 235058DEST_PATH_IMAGE021
Figure 668313DEST_PATH_IMAGE015
Figure 617814DEST_PATH_IMAGE031
Figure 503731DEST_PATH_IMAGE016
Figure 117432DEST_PATH_IMAGE017
Figure 237835DEST_PATH_IMAGE031
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 876626DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100238091A 2013-01-22 2013-01-22 Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark Pending CN103106503A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100238091A CN103106503A (en) 2013-01-22 2013-01-22 Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100238091A CN103106503A (en) 2013-01-22 2013-01-22 Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106503A true CN103106503A (en) 2013-05-15

Family

ID=48314349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100238091A Pending CN103106503A (en) 2013-01-22 2013-01-22 Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106503A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515