CN103106516A - Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark - Google Patents

Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106516A
CN103106516A CN201310022446XA CN201310022446A CN103106516A CN 103106516 A CN103106516 A CN 103106516A CN 201310022446X A CN201310022446X A CN 201310022446XA CN 201310022446 A CN201310022446 A CN 201310022446A CN 103106516 A CN103106516 A CN 103106516A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310022446XA
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022446XA priority Critical patent/CN103106516A/en
Publication of CN103106516A publication Critical patent/CN103106516A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

Disclosed is a multivariate multi-parameter gradient binary encryption anti-fake information storage trademark. The multivariate multi-parameter gradient binary encryption anti-fake information storage trademark can enable binary system anti-fake information to be generated into a binary system modulating signal through binary encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate multi-parameter gradient binary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 321865DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 707847DEST_PATH_IMAGE002
Figure 945111DEST_PATH_IMAGE004
Figure 352958DEST_PATH_IMAGE005
Figure 237738DEST_PATH_IMAGE006
Figure 973612DEST_PATH_IMAGE007
With
Figure 903708DEST_PATH_IMAGE009
, encryption parameter
Figure 490547DEST_PATH_IMAGE002
Figure 713718DEST_PATH_IMAGE003
Figure 44205DEST_PATH_IMAGE004
Figure 653227DEST_PATH_IMAGE006
Figure 488328DEST_PATH_IMAGE007
With
Figure 469239DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 397881DEST_PATH_IMAGE010
Figure 720278DEST_PATH_IMAGE011
Figure 330251DEST_PATH_IMAGE012
Figure 421704DEST_PATH_IMAGE013
Figure 255668DEST_PATH_IMAGE014
Figure 675148DEST_PATH_IMAGE015
Figure 151128DEST_PATH_IMAGE016
Figure 972454DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 508477DEST_PATH_IMAGE010
Figure 415253DEST_PATH_IMAGE011
Figure 429346DEST_PATH_IMAGE012
Figure 77682DEST_PATH_IMAGE014
Figure 471754DEST_PATH_IMAGE015
Figure 289537DEST_PATH_IMAGE016
Figure 819876DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 697702DEST_PATH_IMAGE010
Figure 172546DEST_PATH_IMAGE011
Figure 669386DEST_PATH_IMAGE012
Figure 444444DEST_PATH_IMAGE013
Figure 102959DEST_PATH_IMAGE014
Figure 596257DEST_PATH_IMAGE015
Figure 631209DEST_PATH_IMAGE016
Figure 526353DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 355768DEST_PATH_IMAGE010
Figure 348081DEST_PATH_IMAGE011
Figure 186724DEST_PATH_IMAGE012
Figure 936692DEST_PATH_IMAGE014
Figure 139003DEST_PATH_IMAGE015
Figure 781337DEST_PATH_IMAGE016
Figure 854335DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 415766DEST_PATH_IMAGE010
Figure 980740DEST_PATH_IMAGE011
Figure 285819DEST_PATH_IMAGE012
Figure 619849DEST_PATH_IMAGE013
Figure 821023DEST_PATH_IMAGE014
Figure 997926DEST_PATH_IMAGE015
Figure 716484DEST_PATH_IMAGE016
Figure 764074DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 667308DEST_PATH_IMAGE010
Figure 853756DEST_PATH_IMAGE012
Figure 162377DEST_PATH_IMAGE013
Figure 236513DEST_PATH_IMAGE014
Figure 997795DEST_PATH_IMAGE015
Figure 917210DEST_PATH_IMAGE016
Figure 204971DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 325374DEST_PATH_IMAGE010
Figure 828217DEST_PATH_IMAGE012
Figure 970485DEST_PATH_IMAGE013
Figure 527368DEST_PATH_IMAGE014
Figure 387877DEST_PATH_IMAGE015
Figure 55619DEST_PATH_IMAGE016
Figure 52394DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 127983DEST_PATH_IMAGE011
Figure 450697DEST_PATH_IMAGE013
Figure 349383DEST_PATH_IMAGE014
Figure 387746DEST_PATH_IMAGE015
Figure 634237DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 562878DEST_PATH_IMAGE010
Figure 760641DEST_PATH_IMAGE011
Figure 432931DEST_PATH_IMAGE012
Figure 399750DEST_PATH_IMAGE013
Figure 75134DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 486524DEST_PATH_IMAGE018
Figure 517934DEST_PATH_IMAGE010
Figure 407392DEST_PATH_IMAGE019
Figure 473437DEST_PATH_IMAGE011
Figure 790149DEST_PATH_IMAGE019
Figure 308855DEST_PATH_IMAGE012
Figure 922556DEST_PATH_IMAGE013
Figure 681751DEST_PATH_IMAGE014
Figure 913012DEST_PATH_IMAGE019
Figure 623882DEST_PATH_IMAGE019
Figure 117180DEST_PATH_IMAGE016
Figure 152133DEST_PATH_IMAGE019
Figure 781697DEST_PATH_IMAGE017
Figure 876692DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 326128DEST_PATH_IMAGE020
Figure 23825DEST_PATH_IMAGE010
 
Figure 648842DEST_PATH_IMAGE018
Figure 39372DEST_PATH_IMAGE011
 
Figure 884017DEST_PATH_IMAGE012
 
Figure 363540DEST_PATH_IMAGE020
 
Figure 83420DEST_PATH_IMAGE020
Figure 998286DEST_PATH_IMAGE014
 
Figure 722529DEST_PATH_IMAGE020
Figure 330228DEST_PATH_IMAGE015
 
Figure 507131DEST_PATH_IMAGE020
 
Figure 210962DEST_PATH_IMAGE020
 
Figure 653762DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 671582DEST_PATH_IMAGE010
Figure 745717DEST_PATH_IMAGE021
Figure 507000DEST_PATH_IMAGE011
Figure 957573DEST_PATH_IMAGE018
Figure 120701DEST_PATH_IMAGE012
Figure 365738DEST_PATH_IMAGE021
Figure 473371DEST_PATH_IMAGE013
Figure 930897DEST_PATH_IMAGE021
Figure 948532DEST_PATH_IMAGE014
Figure 365923DEST_PATH_IMAGE015
Figure 892720DEST_PATH_IMAGE021
Figure 30440DEST_PATH_IMAGE016
Figure 840450DEST_PATH_IMAGE017
Figure 436517DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 428743DEST_PATH_IMAGE022
Figure 186484DEST_PATH_IMAGE010
Figure 896951DEST_PATH_IMAGE022
Figure 31129DEST_PATH_IMAGE011
Figure 877862DEST_PATH_IMAGE022
Figure 72083DEST_PATH_IMAGE012
Figure 4267DEST_PATH_IMAGE018
Figure 942136DEST_PATH_IMAGE013
Figure 477340DEST_PATH_IMAGE014
Figure 287033DEST_PATH_IMAGE022
Figure 638380DEST_PATH_IMAGE015
Figure 584339DEST_PATH_IMAGE022
Figure 730149DEST_PATH_IMAGE016
Figure 761559DEST_PATH_IMAGE022
Figure 916597DEST_PATH_IMAGE017
Figure 717063DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 904548DEST_PATH_IMAGE023
Figure 298620DEST_PATH_IMAGE010
Figure 116404DEST_PATH_IMAGE023
Figure 912321DEST_PATH_IMAGE011
Figure 790147DEST_PATH_IMAGE023
Figure 999412DEST_PATH_IMAGE012
Figure 271310DEST_PATH_IMAGE013
Figure 195404DEST_PATH_IMAGE018
Figure 688702DEST_PATH_IMAGE014
Figure 723654DEST_PATH_IMAGE023
Figure 41689DEST_PATH_IMAGE023
Figure 632070DEST_PATH_IMAGE016
Figure 220364DEST_PATH_IMAGE017
Figure 610894DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 688571DEST_PATH_IMAGE024
Figure 189960DEST_PATH_IMAGE010
Figure 262958DEST_PATH_IMAGE024
Figure 699755DEST_PATH_IMAGE011
Figure 107472DEST_PATH_IMAGE024
Figure 412551DEST_PATH_IMAGE012
Figure 12160DEST_PATH_IMAGE024
Figure 744492DEST_PATH_IMAGE013
Figure 466144DEST_PATH_IMAGE015
Figure 864764DEST_PATH_IMAGE024
Figure 387012DEST_PATH_IMAGE016
Figure 820268DEST_PATH_IMAGE024
Figure 769769DEST_PATH_IMAGE017
Figure 921265DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 981625DEST_PATH_IMAGE025
Figure 534966DEST_PATH_IMAGE010
Figure 655368DEST_PATH_IMAGE025
Figure 28581DEST_PATH_IMAGE011
Figure 892632DEST_PATH_IMAGE025
Figure 300479DEST_PATH_IMAGE012
Figure 591783DEST_PATH_IMAGE025
Figure 452292DEST_PATH_IMAGE013
Figure 120034DEST_PATH_IMAGE025
Figure 382388DEST_PATH_IMAGE014
Figure 192398DEST_PATH_IMAGE015
Figure 663831DEST_PATH_IMAGE018
Figure 780691DEST_PATH_IMAGE016
Figure 413798DEST_PATH_IMAGE025
Figure 248899DEST_PATH_IMAGE017
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 710370DEST_PATH_IMAGE026
Figure 836775DEST_PATH_IMAGE026
Figure 774644DEST_PATH_IMAGE011
Figure 475884DEST_PATH_IMAGE026
Figure 841006DEST_PATH_IMAGE012
Figure 260486DEST_PATH_IMAGE026
Figure 736467DEST_PATH_IMAGE013
Figure 151268DEST_PATH_IMAGE026
Figure 562657DEST_PATH_IMAGE014
Figure 18413DEST_PATH_IMAGE026
Figure 725337DEST_PATH_IMAGE016
Figure 119410DEST_PATH_IMAGE018
Figure 937193DEST_PATH_IMAGE017
Figure 733111DEST_PATH_IMAGE018
, set encryption parameter
Figure 820201DEST_PATH_IMAGE003
Figure 317042DEST_PATH_IMAGE004
Figure 92100DEST_PATH_IMAGE005
Figure 16193DEST_PATH_IMAGE006
Figure 962021DEST_PATH_IMAGE007
Figure 121607DEST_PATH_IMAGE008
With
Figure 892117DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 111746DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 794138DEST_PATH_IMAGE027
Carry out H1=
Figure 632781DEST_PATH_IMAGE028
Figure 382431DEST_PATH_IMAGE010
Figure 648327DEST_PATH_IMAGE019
Figure 455833DEST_PATH_IMAGE011
Figure 957221DEST_PATH_IMAGE019
Figure 436744DEST_PATH_IMAGE012
Figure 998175DEST_PATH_IMAGE019
Figure 930545DEST_PATH_IMAGE019
Figure 264574DEST_PATH_IMAGE014
Figure 996907DEST_PATH_IMAGE019
Figure 312034DEST_PATH_IMAGE019
Figure 498482DEST_PATH_IMAGE028
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 807103DEST_PATH_IMAGE027
Carry out H1=
Figure 881238DEST_PATH_IMAGE028
Figure 908100DEST_PATH_IMAGE010
Figure 93094DEST_PATH_IMAGE019
Figure 912014DEST_PATH_IMAGE011
Figure 297996DEST_PATH_IMAGE019
Figure 140050DEST_PATH_IMAGE012
Figure 128735DEST_PATH_IMAGE019
Figure 411949DEST_PATH_IMAGE013
Figure 827886DEST_PATH_IMAGE019
Figure 563761DEST_PATH_IMAGE014
Figure 356137DEST_PATH_IMAGE019
Figure 493857DEST_PATH_IMAGE015
Figure 80696DEST_PATH_IMAGE019
Figure 303867DEST_PATH_IMAGE016
Figure 634354DEST_PATH_IMAGE019
Figure 626581DEST_PATH_IMAGE017
Figure 649901DEST_PATH_IMAGE028
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2=
Figure 360368DEST_PATH_IMAGE020
Figure 228967DEST_PATH_IMAGE010
Figure 341279DEST_PATH_IMAGE029
Figure 61159DEST_PATH_IMAGE020
Figure 608815DEST_PATH_IMAGE012
Figure 700268DEST_PATH_IMAGE020
Figure 484870DEST_PATH_IMAGE020
Figure 836217DEST_PATH_IMAGE014
Figure 782177DEST_PATH_IMAGE020
Figure 193566DEST_PATH_IMAGE015
Figure 693818DEST_PATH_IMAGE020
Figure 707910DEST_PATH_IMAGE016
Figure 356246DEST_PATH_IMAGE017
Figure 750319DEST_PATH_IMAGE029
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 568102DEST_PATH_IMAGE030
Carry out H2=
Figure 98440DEST_PATH_IMAGE020
Figure 976267DEST_PATH_IMAGE010
Figure 857635DEST_PATH_IMAGE029
Figure 141252DEST_PATH_IMAGE020
Figure 924400DEST_PATH_IMAGE012
Figure 293065DEST_PATH_IMAGE020
Figure 452651DEST_PATH_IMAGE013
Figure 223160DEST_PATH_IMAGE020
Figure 177210DEST_PATH_IMAGE014
Figure 33171DEST_PATH_IMAGE020
Figure 996447DEST_PATH_IMAGE015
Figure 949360DEST_PATH_IMAGE020
Figure 215256DEST_PATH_IMAGE016
Figure 417567DEST_PATH_IMAGE020
Figure 59901DEST_PATH_IMAGE017
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 100855DEST_PATH_IMAGE021
Figure 259304DEST_PATH_IMAGE010
Figure 564384DEST_PATH_IMAGE021
Figure 898413DEST_PATH_IMAGE011
Figure 99587DEST_PATH_IMAGE031
Figure 276491DEST_PATH_IMAGE012
Figure 995048DEST_PATH_IMAGE021
Figure 573797DEST_PATH_IMAGE013
Figure 8189DEST_PATH_IMAGE021
Figure 141230DEST_PATH_IMAGE014
Figure 663479DEST_PATH_IMAGE021
Figure 96734DEST_PATH_IMAGE015
Figure 46235DEST_PATH_IMAGE021
Figure 932152DEST_PATH_IMAGE016
Figure 258091DEST_PATH_IMAGE021
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, binary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 169098DEST_PATH_IMAGE002
Figure 311366DEST_PATH_IMAGE003
Figure 728758DEST_PATH_IMAGE005
Figure 396500DEST_PATH_IMAGE006
Figure 393275DEST_PATH_IMAGE007
Figure 121060DEST_PATH_IMAGE008
With
Figure 937706DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by binary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 268193DEST_PATH_IMAGE018
Figure 260420DEST_PATH_IMAGE010
Figure 283739DEST_PATH_IMAGE019
Figure 728627DEST_PATH_IMAGE011
Figure 862805DEST_PATH_IMAGE019
Figure 975118DEST_PATH_IMAGE012
Figure 903760DEST_PATH_IMAGE019
Figure 242654DEST_PATH_IMAGE019
Figure 334107DEST_PATH_IMAGE014
Figure 309016DEST_PATH_IMAGE019
Figure 118709DEST_PATH_IMAGE015
Figure 416015DEST_PATH_IMAGE016
Figure 827405DEST_PATH_IMAGE019
Figure 870534DEST_PATH_IMAGE017
Figure 759992DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 826037DEST_PATH_IMAGE020
Figure 142749DEST_PATH_IMAGE010
 
Figure 661455DEST_PATH_IMAGE018
Figure 354605DEST_PATH_IMAGE011
 
Figure 275156DEST_PATH_IMAGE020
Figure 28349DEST_PATH_IMAGE012
 
Figure 503192DEST_PATH_IMAGE020
Figure 859087DEST_PATH_IMAGE013
 
Figure 509511DEST_PATH_IMAGE020
 
Figure 926903DEST_PATH_IMAGE020
Figure 86489DEST_PATH_IMAGE015
 
Figure 591420DEST_PATH_IMAGE020
Figure 811049DEST_PATH_IMAGE016
 
Figure 667009DEST_PATH_IMAGE020
Figure 364707DEST_PATH_IMAGE017
 
Figure 989723DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 380253DEST_PATH_IMAGE021
Figure 457931DEST_PATH_IMAGE010
Figure 693740DEST_PATH_IMAGE021
Figure 486618DEST_PATH_IMAGE012
Figure 401485DEST_PATH_IMAGE021
Figure 125727DEST_PATH_IMAGE013
Figure 733426DEST_PATH_IMAGE021
Figure 910329DEST_PATH_IMAGE014
Figure 628887DEST_PATH_IMAGE021
Figure 207636DEST_PATH_IMAGE015
Figure 986236DEST_PATH_IMAGE021
Figure 650435DEST_PATH_IMAGE016
Figure 172683DEST_PATH_IMAGE021
Figure 605939DEST_PATH_IMAGE017
Figure 555440DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 441357DEST_PATH_IMAGE022
Figure 767296DEST_PATH_IMAGE010
Figure 55058DEST_PATH_IMAGE022
Figure 175460DEST_PATH_IMAGE011
Figure 283094DEST_PATH_IMAGE022
Figure 271778DEST_PATH_IMAGE012
Figure 289413DEST_PATH_IMAGE018
Figure 970930DEST_PATH_IMAGE013
Figure 371321DEST_PATH_IMAGE022
Figure 223740DEST_PATH_IMAGE015
Figure 181331DEST_PATH_IMAGE022
Figure 777398DEST_PATH_IMAGE016
Figure 237832DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 372010DEST_PATH_IMAGE023
Figure 218744DEST_PATH_IMAGE010
Figure 412964DEST_PATH_IMAGE023
Figure 283017DEST_PATH_IMAGE023
Figure 249836DEST_PATH_IMAGE012
Figure 829940DEST_PATH_IMAGE023
Figure 639633DEST_PATH_IMAGE013
Figure 522138DEST_PATH_IMAGE018
Figure 343464DEST_PATH_IMAGE014
Figure 613908DEST_PATH_IMAGE023
Figure 520684DEST_PATH_IMAGE015
Figure 800356DEST_PATH_IMAGE023
Figure 476188DEST_PATH_IMAGE016
Figure 183113DEST_PATH_IMAGE023
Figure 577185DEST_PATH_IMAGE017
Figure 394968DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 784361DEST_PATH_IMAGE024
Figure 537553DEST_PATH_IMAGE010
Figure 746818DEST_PATH_IMAGE024
Figure 368292DEST_PATH_IMAGE011
Figure 18716DEST_PATH_IMAGE024
Figure 67444DEST_PATH_IMAGE012
Figure 436108DEST_PATH_IMAGE024
Figure 595694DEST_PATH_IMAGE013
Figure 100625DEST_PATH_IMAGE024
Figure 320253DEST_PATH_IMAGE014
Figure 910635DEST_PATH_IMAGE018
Figure 873912DEST_PATH_IMAGE015
Figure 889458DEST_PATH_IMAGE016
Figure 622928DEST_PATH_IMAGE024
Figure 999682DEST_PATH_IMAGE017
Figure 603839DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 40637DEST_PATH_IMAGE025
Figure 730244DEST_PATH_IMAGE010
Figure 910690DEST_PATH_IMAGE025
Figure 634932DEST_PATH_IMAGE011
Figure 242631DEST_PATH_IMAGE025
Figure 153955DEST_PATH_IMAGE012
Figure 138092DEST_PATH_IMAGE025
Figure 716840DEST_PATH_IMAGE013
Figure 495441DEST_PATH_IMAGE025
Figure 894061DEST_PATH_IMAGE014
Figure 416309DEST_PATH_IMAGE025
Figure 849564DEST_PATH_IMAGE015
Figure 799066DEST_PATH_IMAGE018
Figure 950562DEST_PATH_IMAGE016
Figure 10921DEST_PATH_IMAGE025
Figure 564263DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 775987DEST_PATH_IMAGE026
Figure 463823DEST_PATH_IMAGE011
Figure 3792DEST_PATH_IMAGE012
Figure 141513DEST_PATH_IMAGE026
Figure 728352DEST_PATH_IMAGE013
Figure 951523DEST_PATH_IMAGE026
Figure 547589DEST_PATH_IMAGE014
Figure 539816DEST_PATH_IMAGE026
Figure 297556DEST_PATH_IMAGE015
Figure 8023DEST_PATH_IMAGE026
Figure 142201DEST_PATH_IMAGE016
Figure 988935DEST_PATH_IMAGE018
Figure 183156DEST_PATH_IMAGE017
Figure 115340DEST_PATH_IMAGE018
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 53209DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 754448DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tablesStart, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 539051DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 15031DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the multivariate multi-parameter gradient binary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 383171DEST_PATH_IMAGE002
Figure 225225DEST_PATH_IMAGE003
Figure 89276DEST_PATH_IMAGE004
Figure 497123DEST_PATH_IMAGE005
Figure 788427DEST_PATH_IMAGE006
Figure 648936DEST_PATH_IMAGE007
With
Figure 47873DEST_PATH_IMAGE009
, encryption parameter
Figure 634712DEST_PATH_IMAGE002
Figure 451359DEST_PATH_IMAGE003
Figure 657212DEST_PATH_IMAGE004
Figure 774073DEST_PATH_IMAGE005
Figure 672758DEST_PATH_IMAGE006
Figure 507859DEST_PATH_IMAGE007
Figure 845300DEST_PATH_IMAGE008
With
Figure 957612DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 84017DEST_PATH_IMAGE011
Figure 756307DEST_PATH_IMAGE012
Figure 557090DEST_PATH_IMAGE014
Figure 101204DEST_PATH_IMAGE015
Figure 452550DEST_PATH_IMAGE016
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 809899DEST_PATH_IMAGE010
Figure 324243DEST_PATH_IMAGE012
Figure 265655DEST_PATH_IMAGE013
Figure 366652DEST_PATH_IMAGE015
Figure 184435DEST_PATH_IMAGE016
Figure 714773DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 592600DEST_PATH_IMAGE010
Figure 67443DEST_PATH_IMAGE011
Figure 564284DEST_PATH_IMAGE012
Figure 339342DEST_PATH_IMAGE013
Figure 997856DEST_PATH_IMAGE014
Figure 491154DEST_PATH_IMAGE015
Figure 119582DEST_PATH_IMAGE016
Figure 890092DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 663378DEST_PATH_IMAGE012
Figure 22816DEST_PATH_IMAGE013
Figure 237564DEST_PATH_IMAGE014
Figure 908717DEST_PATH_IMAGE015
Figure 551051DEST_PATH_IMAGE016
Figure 155208DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 592005DEST_PATH_IMAGE010
Figure 281613DEST_PATH_IMAGE011
Figure 462058DEST_PATH_IMAGE012
Figure 920721DEST_PATH_IMAGE013
Figure 528420DEST_PATH_IMAGE014
Figure 705324DEST_PATH_IMAGE015
Figure 423881DEST_PATH_IMAGE016
Figure 2630DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 781230DEST_PATH_IMAGE010
Figure 445430DEST_PATH_IMAGE011
Figure 967678DEST_PATH_IMAGE012
Figure 400933DEST_PATH_IMAGE013
Figure 350435DEST_PATH_IMAGE014
Figure 236351DEST_PATH_IMAGE015
Figure 155766DEST_PATH_IMAGE016
Figure 318894DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 563930DEST_PATH_IMAGE010
Figure 78088DEST_PATH_IMAGE011
Figure 66773DEST_PATH_IMAGE012
Figure 172449DEST_PATH_IMAGE014
Figure 32958DEST_PATH_IMAGE015
Figure 700699DEST_PATH_IMAGE016
Figure 697474DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 425259DEST_PATH_IMAGE010
Figure 773063DEST_PATH_IMAGE011
Figure 978917DEST_PATH_IMAGE012
Figure 95777DEST_PATH_IMAGE013
Figure 994463DEST_PATH_IMAGE014
Figure 563985DEST_PATH_IMAGE015
Figure 167005DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 207959DEST_PATH_IMAGE010
Figure 405722DEST_PATH_IMAGE011
Figure 44831DEST_PATH_IMAGE013
Figure 144374DEST_PATH_IMAGE014
Figure 829433DEST_PATH_IMAGE015
Figure 961206DEST_PATH_IMAGE016
Figure 907165DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 318555DEST_PATH_IMAGE018
Figure 349965DEST_PATH_IMAGE010
Figure 239424DEST_PATH_IMAGE019
Figure 305468DEST_PATH_IMAGE011
Figure 622180DEST_PATH_IMAGE019
Figure 140886DEST_PATH_IMAGE012
Figure 834036DEST_PATH_IMAGE019
Figure 754587DEST_PATH_IMAGE013
Figure 745043DEST_PATH_IMAGE019
Figure 531820DEST_PATH_IMAGE015
Figure 455913DEST_PATH_IMAGE019
Figure 949212DEST_PATH_IMAGE016
Figure 984164DEST_PATH_IMAGE019
Figure 613728DEST_PATH_IMAGE017
Figure 708723DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 689318DEST_PATH_IMAGE020
Figure 262381DEST_PATH_IMAGE010
 
Figure 12031DEST_PATH_IMAGE018
Figure 277928DEST_PATH_IMAGE011
 
Figure 480239DEST_PATH_IMAGE020
Figure 184890DEST_PATH_IMAGE012
 
Figure 789046DEST_PATH_IMAGE020
Figure 225844DEST_PATH_IMAGE013
 
Figure 915451DEST_PATH_IMAGE020
Figure 830318DEST_PATH_IMAGE014
 
Figure 162259DEST_PATH_IMAGE015
 
Figure 339162DEST_PATH_IMAGE020
 
Figure 636469DEST_PATH_IMAGE020
Figure 415069DEST_PATH_IMAGE017
 
Figure 79268DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 601516DEST_PATH_IMAGE021
Figure 34772DEST_PATH_IMAGE010
Figure 870190DEST_PATH_IMAGE011
Figure 952732DEST_PATH_IMAGE012
Figure 197769DEST_PATH_IMAGE021
Figure 711927DEST_PATH_IMAGE013
Figure 700611DEST_PATH_IMAGE021
Figure 718246DEST_PATH_IMAGE014
Figure 399763DEST_PATH_IMAGE021
Figure 135638DEST_PATH_IMAGE015
Figure 662434DEST_PATH_IMAGE021
Figure 800154DEST_PATH_IMAGE016
Figure 652573DEST_PATH_IMAGE021
Figure 610164DEST_PATH_IMAGE017
Figure 206231DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 198458DEST_PATH_IMAGE022
Figure 956198DEST_PATH_IMAGE010
Figure 447091DEST_PATH_IMAGE022
Figure 91065DEST_PATH_IMAGE012
Figure 23249DEST_PATH_IMAGE018
Figure 961118DEST_PATH_IMAGE013
Figure 927937DEST_PATH_IMAGE022
Figure 27480DEST_PATH_IMAGE014
Figure 712539DEST_PATH_IMAGE022
Figure 615040DEST_PATH_IMAGE022
Figure 760850DEST_PATH_IMAGE016
Figure 792260DEST_PATH_IMAGE022
Figure 947298DEST_PATH_IMAGE017
Figure 747764DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 330055DEST_PATH_IMAGE023
Figure 541910DEST_PATH_IMAGE023
Figure 462462DEST_PATH_IMAGE011
Figure 215654DEST_PATH_IMAGE023
Figure 515234DEST_PATH_IMAGE023
Figure 290292DEST_PATH_IMAGE013
Figure 214386DEST_PATH_IMAGE018
Figure 707684DEST_PATH_IMAGE014
Figure 742636DEST_PATH_IMAGE023
Figure 372201DEST_PATH_IMAGE015
Figure 467196DEST_PATH_IMAGE023
Figure 20854DEST_PATH_IMAGE023
Figure 770504DEST_PATH_IMAGE017
Figure 36400DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 238711DEST_PATH_IMAGE024
Figure 615466DEST_PATH_IMAGE010
Figure 219623DEST_PATH_IMAGE024
Figure 656420DEST_PATH_IMAGE011
Figure 346028DEST_PATH_IMAGE024
Figure 526473DEST_PATH_IMAGE012
Figure 250716DEST_PATH_IMAGE024
Figure 753875DEST_PATH_IMAGE014
Figure 332624DEST_PATH_IMAGE018
Figure 111224DEST_PATH_IMAGE015
Figure 509845DEST_PATH_IMAGE024
Figure 32093DEST_PATH_IMAGE016
Figure 465348DEST_PATH_IMAGE024
Figure 566345DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 626705DEST_PATH_IMAGE025
Figure 180046DEST_PATH_IMAGE010
Figure 300449DEST_PATH_IMAGE025
Figure 267137DEST_PATH_IMAGE011
Figure 255821DEST_PATH_IMAGE025
Figure 539035DEST_PATH_IMAGE012
Figure 954973DEST_PATH_IMAGE025
Figure 690848DEST_PATH_IMAGE013
Figure 483223DEST_PATH_IMAGE025
Figure 620944DEST_PATH_IMAGE014
Figure 207783DEST_PATH_IMAGE025
Figure 430954DEST_PATH_IMAGE015
Figure 27020DEST_PATH_IMAGE018
Figure 19247DEST_PATH_IMAGE016
Figure 776987DEST_PATH_IMAGE025
Figure 487454DEST_PATH_IMAGE017
Figure 90474DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 73560DEST_PATH_IMAGE026
Figure 143147DEST_PATH_IMAGE010
Figure 199965DEST_PATH_IMAGE026
Figure 13200DEST_PATH_IMAGE011
Figure 79562DEST_PATH_IMAGE012
Figure 623676DEST_PATH_IMAGE026
Figure 975023DEST_PATH_IMAGE013
Figure 920982DEST_PATH_IMAGE026
Figure 332372DEST_PATH_IMAGE014
Figure 363782DEST_PATH_IMAGE026
Figure 518820DEST_PATH_IMAGE015
Figure 319285DEST_PATH_IMAGE026
Figure 901576DEST_PATH_IMAGE016
Figure 113432DEST_PATH_IMAGE017
, set encryption parameter
Figure 996440DEST_PATH_IMAGE003
Figure 617914DEST_PATH_IMAGE004
Figure 268339DEST_PATH_IMAGE005
Figure 317066DEST_PATH_IMAGE006
Figure 420151DEST_PATH_IMAGE007
With
Figure 943722DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 753733DEST_PATH_IMAGE027
Carry out H1=
Figure 248168DEST_PATH_IMAGE028
Figure 873184DEST_PATH_IMAGE010
Figure 732556DEST_PATH_IMAGE019
Figure 934867DEST_PATH_IMAGE011
Figure 905097DEST_PATH_IMAGE019
Figure 384620DEST_PATH_IMAGE012
Figure 511025DEST_PATH_IMAGE013
Figure 314639DEST_PATH_IMAGE019
Figure 648669DEST_PATH_IMAGE014
Figure 381001DEST_PATH_IMAGE019
Figure 433271DEST_PATH_IMAGE015
Figure 10883DEST_PATH_IMAGE019
Figure 335771DEST_PATH_IMAGE016
Figure 114371DEST_PATH_IMAGE019
Figure 778571DEST_PATH_IMAGE017
Figure 956611DEST_PATH_IMAGE028
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 265233DEST_PATH_IMAGE027
Carry out H1=
Figure 339368DEST_PATH_IMAGE028
Figure 366230DEST_PATH_IMAGE010
Figure 20065DEST_PATH_IMAGE019
Figure 307827DEST_PATH_IMAGE011
Figure 693809DEST_PATH_IMAGE019
Figure 586865DEST_PATH_IMAGE019
Figure 870079DEST_PATH_IMAGE013
Figure 286016DEST_PATH_IMAGE019
Figure 21891DEST_PATH_IMAGE014
Figure 814267DEST_PATH_IMAGE019
Figure 951987DEST_PATH_IMAGE015
Figure 761997DEST_PATH_IMAGE016
Figure 92484DEST_PATH_IMAGE019
Figure 84711DEST_PATH_IMAGE017
Figure 108031DEST_PATH_IMAGE028
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2=
Figure 818498DEST_PATH_IMAGE020
Figure 687097DEST_PATH_IMAGE010
Figure 799409DEST_PATH_IMAGE029
Figure 728051DEST_PATH_IMAGE011
Figure 925814DEST_PATH_IMAGE020
Figure 598104DEST_PATH_IMAGE012
Figure 930045DEST_PATH_IMAGE013
Figure 349525DEST_PATH_IMAGE020
Figure 646831DEST_PATH_IMAGE020
Figure 182855DEST_PATH_IMAGE015
Figure 89631DEST_PATH_IMAGE020
Figure 45134DEST_PATH_IMAGE020
Figure 752059DEST_PATH_IMAGE017
Figure 146132DEST_PATH_IMAGE029
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 26232DEST_PATH_IMAGE030
Carry out H2=
Figure 556570DEST_PATH_IMAGE020
Figure 434396DEST_PATH_IMAGE010
Figure 315765DEST_PATH_IMAGE029
Figure 937239DEST_PATH_IMAGE011
Figure 587663DEST_PATH_IMAGE020
Figure 739476DEST_PATH_IMAGE020
Figure 899062DEST_PATH_IMAGE013
Figure 669572DEST_PATH_IMAGE020
Figure 623621DEST_PATH_IMAGE014
Figure 479582DEST_PATH_IMAGE020
Figure 442858DEST_PATH_IMAGE015
Figure 802296DEST_PATH_IMAGE020
Figure 192826DEST_PATH_IMAGE016
Figure 49190DEST_PATH_IMAGE017
Figure 528712DEST_PATH_IMAGE029
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 90144DEST_PATH_IMAGE021
Figure 655117DEST_PATH_IMAGE010
Figure 887701DEST_PATH_IMAGE011
Figure 495400DEST_PATH_IMAGE031
Figure 672304DEST_PATH_IMAGE012
Figure 969610DEST_PATH_IMAGE013
Figure 367913DEST_PATH_IMAGE015
Figure 317415DEST_PATH_IMAGE021
Figure 203331DEST_PATH_IMAGE016
Figure 529270DEST_PATH_IMAGE021
Figure 285874DEST_PATH_IMAGE017
Figure 530910DEST_PATH_IMAGE031
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 576227DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022446XA 2013-01-22 2013-01-22 Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark Pending CN103106516A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022446XA CN103106516A (en) 2013-01-22 2013-01-22 Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022446XA CN103106516A (en) 2013-01-22 2013-01-22 Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106516A true CN103106516A (en) 2013-05-15

Family

ID=48314362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022446XA Pending CN103106516A (en) 2013-01-22 2013-01-22 Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106516A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515