CN103106525A - Multiparameter multielement encryption anti-fake information storage trademark - Google Patents

Multiparameter multielement encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106525A
CN103106525A CN2013100237756A CN201310023775A CN103106525A CN 103106525 A CN103106525 A CN 103106525A CN 2013100237756 A CN2013100237756 A CN 2013100237756A CN 201310023775 A CN201310023775 A CN 201310023775A CN 103106525 A CN103106525 A CN 103106525A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100237756A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100237756A priority Critical patent/CN103106525A/en
Publication of CN103106525A publication Critical patent/CN103106525A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

The invention relates to a multiparameter multielement encryption anti-fake information storage trademark. The multiparameter multielement encryption anti-fake information storage trademark can process binary anti-fake information to generate binary modulation signals through multielement encryption and channel coding. The anti-fake information is embedded in a whole trademark page through orderly change of amplitude-modulated dot conductivity with a circular table lookup modulation mode method. The anti-fake information can be identified from any fragment at the time of trademark identification and the multiparameter multielement encryption anti-fake information storage trademark can be used for all kinds of anti-fake trademarks.

Description

The polynary encryption anti-counterfeiting information storage of multiparameter trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, the polynary encryption anti-counterfeiting information of a kind of multiparameter storage trade mark particularly, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100237756100002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100237756100002DEST_PATH_IMAGE002
,
Figure 2013100237756100002DEST_PATH_IMAGE003
,
Figure 2013100237756100002DEST_PATH_IMAGE004
,
Figure 2013100237756100002DEST_PATH_IMAGE005
,
Figure 2013100237756100002DEST_PATH_IMAGE006
,
Figure 2013100237756100002DEST_PATH_IMAGE007
,
Figure 2013100237756100002DEST_PATH_IMAGE008
With , encryption parameter ,
Figure 24498DEST_PATH_IMAGE003
,
Figure 178136DEST_PATH_IMAGE004
,
Figure 448712DEST_PATH_IMAGE005
,
Figure 639915DEST_PATH_IMAGE006
,
Figure 337744DEST_PATH_IMAGE007
, With Be 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as q, the binary system positive integer that encryption variables q is 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100237756100002DEST_PATH_IMAGE010
Figure 2013100237756100002DEST_PATH_IMAGE011
Figure 2013100237756100002DEST_PATH_IMAGE012
Figure 2013100237756100002DEST_PATH_IMAGE013
Figure 2013100237756100002DEST_PATH_IMAGE015
Figure 2013100237756100002DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 849387DEST_PATH_IMAGE010
Figure 718117DEST_PATH_IMAGE011
Figure 185215DEST_PATH_IMAGE012
Figure 694879DEST_PATH_IMAGE014
Figure 241715DEST_PATH_IMAGE016
Figure 893670DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 412507DEST_PATH_IMAGE010
Figure 747674DEST_PATH_IMAGE011
Figure 804677DEST_PATH_IMAGE013
Figure 679486DEST_PATH_IMAGE014
Figure 651039DEST_PATH_IMAGE016
Figure 408910DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 956140DEST_PATH_IMAGE011
Figure 767976DEST_PATH_IMAGE012
Figure 913360DEST_PATH_IMAGE014
Figure 902175DEST_PATH_IMAGE015
Figure 827406DEST_PATH_IMAGE016
Figure 425615DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 339552DEST_PATH_IMAGE013
Figure 895036DEST_PATH_IMAGE014
Figure 960075DEST_PATH_IMAGE015
Figure 236729DEST_PATH_IMAGE016
Figure 802840DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 353776DEST_PATH_IMAGE010
Figure 714350DEST_PATH_IMAGE011
Figure 976835DEST_PATH_IMAGE012
Figure 723468DEST_PATH_IMAGE013
Figure 489429DEST_PATH_IMAGE014
Figure 286484DEST_PATH_IMAGE015
Figure 269221DEST_PATH_IMAGE016
Figure 318080DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 682155DEST_PATH_IMAGE010
Figure 707114DEST_PATH_IMAGE013
Figure 447668DEST_PATH_IMAGE014
Figure 422151DEST_PATH_IMAGE016
Figure 45768DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 539088DEST_PATH_IMAGE012
Figure 966396DEST_PATH_IMAGE013
Figure 806176DEST_PATH_IMAGE014
Figure 162202DEST_PATH_IMAGE015
Figure 563938DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 159053DEST_PATH_IMAGE011
Figure 204370DEST_PATH_IMAGE012
Figure 976410DEST_PATH_IMAGE013
Figure 400569DEST_PATH_IMAGE014
Figure 129546DEST_PATH_IMAGE016
Figure 203812DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, polynary cryptographic calculation is defined as H i=
Figure 859309DEST_PATH_IMAGE010
Figure 492153DEST_PATH_IMAGE002
Figure 121849DEST_PATH_IMAGE011
Figure 858861DEST_PATH_IMAGE018
Figure 759077DEST_PATH_IMAGE012
Figure 414235DEST_PATH_IMAGE013
Figure 850606DEST_PATH_IMAGE014
Figure 61139DEST_PATH_IMAGE006
Figure 767678DEST_PATH_IMAGE018
Figure 141022DEST_PATH_IMAGE016
Figure 23921DEST_PATH_IMAGE008
Figure 998010DEST_PATH_IMAGE018
, during binary operator control variables k=1, polynary cryptographic calculation is defined as H i=
Figure 724395DEST_PATH_IMAGE018
Figure 542310DEST_PATH_IMAGE010
Figure 125628DEST_PATH_IMAGE018
Figure 347400DEST_PATH_IMAGE012
Figure 147997DEST_PATH_IMAGE004
Figure 749136DEST_PATH_IMAGE013
Figure 22357DEST_PATH_IMAGE006
Figure 660143DEST_PATH_IMAGE015
Figure 218557DEST_PATH_IMAGE018
Figure 673809DEST_PATH_IMAGE016
Figure 448998DEST_PATH_IMAGE008
Figure 389010DEST_PATH_IMAGE017
Figure 300465DEST_PATH_IMAGE018
, during binary operator control variables k=2, polynary cryptographic calculation is defined as H i=
Figure 926619DEST_PATH_IMAGE018
Figure 670157DEST_PATH_IMAGE003
Figure 200233DEST_PATH_IMAGE011
Figure 872654DEST_PATH_IMAGE018
Figure 858321DEST_PATH_IMAGE012
Figure 907180DEST_PATH_IMAGE004
Figure 291763DEST_PATH_IMAGE013
Figure 135085DEST_PATH_IMAGE018
Figure 608048DEST_PATH_IMAGE014
Figure 929439DEST_PATH_IMAGE006
Figure 434107DEST_PATH_IMAGE015
Figure 572965DEST_PATH_IMAGE018
Figure 31759DEST_PATH_IMAGE016
Figure 510234DEST_PATH_IMAGE008
Figure 495508DEST_PATH_IMAGE017
, during binary operator control variables k=3, polynary cryptographic calculation is defined as H i=
Figure 125258DEST_PATH_IMAGE018
Figure 555496DEST_PATH_IMAGE010
Figure 751302DEST_PATH_IMAGE011
Figure 417645DEST_PATH_IMAGE018
Figure 150108DEST_PATH_IMAGE012
Figure 221226DEST_PATH_IMAGE005
Figure 872787DEST_PATH_IMAGE013
Figure 793470DEST_PATH_IMAGE018
Figure 562580DEST_PATH_IMAGE014
Figure 986740DEST_PATH_IMAGE006
Figure 74781DEST_PATH_IMAGE015
Figure 718646DEST_PATH_IMAGE018
Figure 901234DEST_PATH_IMAGE016
Figure 445479DEST_PATH_IMAGE008
Figure 81253DEST_PATH_IMAGE017
Figure 445370DEST_PATH_IMAGE018
, during binary operator control variables k=4, polynary cryptographic calculation is defined as H i=
Figure 447961DEST_PATH_IMAGE018
Figure 345247DEST_PATH_IMAGE010
Figure 384879DEST_PATH_IMAGE003
Figure 3335DEST_PATH_IMAGE011
Figure 419404DEST_PATH_IMAGE018
Figure 171197DEST_PATH_IMAGE012
Figure 647309DEST_PATH_IMAGE005
Figure 487482DEST_PATH_IMAGE013
Figure 707242DEST_PATH_IMAGE018
Figure 205220DEST_PATH_IMAGE014
Figure 85189DEST_PATH_IMAGE006
Figure 176773DEST_PATH_IMAGE015
Figure 842237DEST_PATH_IMAGE018
Figure 568622DEST_PATH_IMAGE016
Figure 624849DEST_PATH_IMAGE018
, during binary operator control variables k=5, polynary cryptographic calculation is defined as H i=
Figure 707206DEST_PATH_IMAGE018
Figure 194557DEST_PATH_IMAGE010
Figure 995153DEST_PATH_IMAGE003
Figure 572855DEST_PATH_IMAGE011
Figure 580497DEST_PATH_IMAGE005
Figure 42276DEST_PATH_IMAGE018
Figure 372894DEST_PATH_IMAGE014
Figure 272717DEST_PATH_IMAGE007
Figure 464926DEST_PATH_IMAGE015
Figure 501015DEST_PATH_IMAGE018
Figure 2535DEST_PATH_IMAGE016
Figure 497976DEST_PATH_IMAGE008
Figure 743144DEST_PATH_IMAGE017
Figure 276150DEST_PATH_IMAGE018
, during binary operator control variables k=6, polynary cryptographic calculation is defined as H i=
Figure 948571DEST_PATH_IMAGE018
Figure 714587DEST_PATH_IMAGE003
Figure 102100DEST_PATH_IMAGE011
Figure 70056DEST_PATH_IMAGE018
Figure 41554DEST_PATH_IMAGE012
Figure 127059DEST_PATH_IMAGE005
Figure 133192DEST_PATH_IMAGE013
Figure 648881DEST_PATH_IMAGE018
Figure 983490DEST_PATH_IMAGE007
Figure 844129DEST_PATH_IMAGE015
Figure 664905DEST_PATH_IMAGE008
Figure 380052DEST_PATH_IMAGE017
Figure 234613DEST_PATH_IMAGE018
, during binary operator control variables k=7, polynary cryptographic calculation is defined as H i=
Figure 667999DEST_PATH_IMAGE018
Figure 596214DEST_PATH_IMAGE003
Figure 276780DEST_PATH_IMAGE018
Figure 547356DEST_PATH_IMAGE012
Figure 361728DEST_PATH_IMAGE005
Figure 561022DEST_PATH_IMAGE013
Figure 703421DEST_PATH_IMAGE018
Figure 813831DEST_PATH_IMAGE015
Figure 944992DEST_PATH_IMAGE018
Figure 720236DEST_PATH_IMAGE009
Figure 884501DEST_PATH_IMAGE017
, set encryption parameter
Figure 919026DEST_PATH_IMAGE002
,
Figure 172284DEST_PATH_IMAGE003
,
Figure 146931DEST_PATH_IMAGE004
, ,
Figure 206865DEST_PATH_IMAGE006
,
Figure 314629DEST_PATH_IMAGE007
,
Figure 86276DEST_PATH_IMAGE008
With
Figure 410816DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 545518DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100237756100002DEST_PATH_IMAGE019
Carry out H 1=
Figure 147270DEST_PATH_IMAGE020
Figure 89818DEST_PATH_IMAGE010
Figure 403119DEST_PATH_IMAGE002
Figure 442709DEST_PATH_IMAGE011
Figure 525065DEST_PATH_IMAGE020
Figure 12416DEST_PATH_IMAGE012
Figure 813013DEST_PATH_IMAGE004
Figure 414152DEST_PATH_IMAGE013
Figure 741228DEST_PATH_IMAGE020
Figure 635366DEST_PATH_IMAGE014
Figure 421794DEST_PATH_IMAGE006
Figure 325159DEST_PATH_IMAGE015
Figure 883573DEST_PATH_IMAGE020
Figure 338825DEST_PATH_IMAGE016
Figure 222336DEST_PATH_IMAGE008
Figure 788447DEST_PATH_IMAGE017
Polynary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 968466DEST_PATH_IMAGE019
Carry out H 1=
Figure 709075DEST_PATH_IMAGE010
Figure 537670DEST_PATH_IMAGE011
Figure 523337DEST_PATH_IMAGE020
Figure 691199DEST_PATH_IMAGE004
Figure 659155DEST_PATH_IMAGE013
Figure 630654DEST_PATH_IMAGE020
Figure 719089DEST_PATH_IMAGE014
Figure 459643DEST_PATH_IMAGE006
Figure 972401DEST_PATH_IMAGE015
Figure 431196DEST_PATH_IMAGE020
Figure 323322DEST_PATH_IMAGE016
Figure 918382DEST_PATH_IMAGE008
Figure 602042DEST_PATH_IMAGE017
Carry out i+1, q+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 2=
Figure 2013100237756100002DEST_PATH_IMAGE021
Figure 853737DEST_PATH_IMAGE010
Figure 693517DEST_PATH_IMAGE003
Figure 571064DEST_PATH_IMAGE021
Figure 536484DEST_PATH_IMAGE012
Figure 106137DEST_PATH_IMAGE004
Figure 400108DEST_PATH_IMAGE013
Figure 179845DEST_PATH_IMAGE021
Figure 638694DEST_PATH_IMAGE006
Figure 965551DEST_PATH_IMAGE015
Figure 683682DEST_PATH_IMAGE016
Figure 352561DEST_PATH_IMAGE008
Figure 470558DEST_PATH_IMAGE017
Figure 601719DEST_PATH_IMAGE021
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 214097DEST_PATH_IMAGE022
Carry out H 2=
Figure 737482DEST_PATH_IMAGE021
Figure 416594DEST_PATH_IMAGE010
Figure 11613DEST_PATH_IMAGE003
Figure 179475DEST_PATH_IMAGE021
Figure 766839DEST_PATH_IMAGE012
Figure 371126DEST_PATH_IMAGE004
Figure 823842DEST_PATH_IMAGE013
Figure 321820DEST_PATH_IMAGE021
Figure 545570DEST_PATH_IMAGE006
Figure 303442DEST_PATH_IMAGE015
Figure 32757DEST_PATH_IMAGE021
Figure 224572DEST_PATH_IMAGE016
Figure 662507DEST_PATH_IMAGE008
Figure 958490DEST_PATH_IMAGE017
Figure 807891DEST_PATH_IMAGE021
Carry out i+1, q+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 3=
Figure 2013100237756100002DEST_PATH_IMAGE023
Figure 45974DEST_PATH_IMAGE010
Figure 971205DEST_PATH_IMAGE003
Figure 758475DEST_PATH_IMAGE023
Figure 419656DEST_PATH_IMAGE012
Figure 333648DEST_PATH_IMAGE004
Figure 512648DEST_PATH_IMAGE013
Figure 320329DEST_PATH_IMAGE023
Figure 385368DEST_PATH_IMAGE014
Figure 285191DEST_PATH_IMAGE006
Figure 228133DEST_PATH_IMAGE015
Figure 280533DEST_PATH_IMAGE023
Figure 903593DEST_PATH_IMAGE008
Figure 650225DEST_PATH_IMAGE017
Figure 416187DEST_PATH_IMAGE023
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this polynary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table carry out polynary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to polynary cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 71345DEST_PATH_IMAGE002
, ,
Figure 632350DEST_PATH_IMAGE004
,
Figure 475672DEST_PATH_IMAGE005
,
Figure 945706DEST_PATH_IMAGE006
,
Figure 532676DEST_PATH_IMAGE007
, With The initial value of initial value when encrypting, the initial value of the initial value of setting encryption variables q when encrypting, the initial value design of binary operator control variables k is k=0, known by polynary ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 746248DEST_PATH_IMAGE018
Figure 995964DEST_PATH_IMAGE010
Figure 856603DEST_PATH_IMAGE002
Figure 465846DEST_PATH_IMAGE018
Figure 608300DEST_PATH_IMAGE004
Figure 465791DEST_PATH_IMAGE013
Figure 633598DEST_PATH_IMAGE018
Figure 490696DEST_PATH_IMAGE014
Figure 558884DEST_PATH_IMAGE006
Figure 85811DEST_PATH_IMAGE015
Figure 507959DEST_PATH_IMAGE018
Figure 778534DEST_PATH_IMAGE016
Figure 789270DEST_PATH_IMAGE017
Figure 931670DEST_PATH_IMAGE018
, during binary operator control variables k=1, decrypt operation is M i=
Figure 786067DEST_PATH_IMAGE010
Figure 173240DEST_PATH_IMAGE011
Figure 785619DEST_PATH_IMAGE018
Figure 685835DEST_PATH_IMAGE012
Figure 991045DEST_PATH_IMAGE004
Figure 340993DEST_PATH_IMAGE013
Figure 881696DEST_PATH_IMAGE018
Figure 400533DEST_PATH_IMAGE014
Figure 112530DEST_PATH_IMAGE006
Figure 716818DEST_PATH_IMAGE015
Figure 542878DEST_PATH_IMAGE016
Figure 425776DEST_PATH_IMAGE008
Figure 517360DEST_PATH_IMAGE017
Figure 773767DEST_PATH_IMAGE018
, during binary operator control variables k=2, decrypt operation is M i=
Figure 1617DEST_PATH_IMAGE018
Figure 320996DEST_PATH_IMAGE010
Figure 634297DEST_PATH_IMAGE003
Figure 54914DEST_PATH_IMAGE011
Figure 301654DEST_PATH_IMAGE018
Figure 526355DEST_PATH_IMAGE012
Figure 451586DEST_PATH_IMAGE004
Figure 252237DEST_PATH_IMAGE018
Figure 411955DEST_PATH_IMAGE014
Figure 201312DEST_PATH_IMAGE006
Figure 963732DEST_PATH_IMAGE015
Figure 20681DEST_PATH_IMAGE018
Figure 625023DEST_PATH_IMAGE008
Figure 604054DEST_PATH_IMAGE018
, during binary operator control variables k=3, decrypt operation is M i=
Figure 105574DEST_PATH_IMAGE018
Figure 846183DEST_PATH_IMAGE003
Figure 254555DEST_PATH_IMAGE011
Figure 425511DEST_PATH_IMAGE018
Figure 83205DEST_PATH_IMAGE005
Figure 784073DEST_PATH_IMAGE014
Figure 105464DEST_PATH_IMAGE006
Figure 613062DEST_PATH_IMAGE015
Figure 584615DEST_PATH_IMAGE016
Figure 709697DEST_PATH_IMAGE008
Figure 694971DEST_PATH_IMAGE017
, during binary operator control variables k=4, decrypt operation is M i=
Figure 327651DEST_PATH_IMAGE018
Figure 754959DEST_PATH_IMAGE010
Figure 470105DEST_PATH_IMAGE003
Figure 950765DEST_PATH_IMAGE011
Figure 596600DEST_PATH_IMAGE018
Figure 329063DEST_PATH_IMAGE012
Figure 397251DEST_PATH_IMAGE005
Figure 924179DEST_PATH_IMAGE013
Figure 969495DEST_PATH_IMAGE018
Figure 741535DEST_PATH_IMAGE014
Figure 165695DEST_PATH_IMAGE006
Figure 770037DEST_PATH_IMAGE018
Figure 80189DEST_PATH_IMAGE016
Figure 624434DEST_PATH_IMAGE008
Figure 257279DEST_PATH_IMAGE017
Figure 621395DEST_PATH_IMAGE018
, during binary operator control variables k=5, decrypt operation is M i=
Figure 817DEST_PATH_IMAGE018
Figure 524202DEST_PATH_IMAGE010
Figure 563834DEST_PATH_IMAGE003
Figure 179360DEST_PATH_IMAGE011
Figure 595429DEST_PATH_IMAGE018
Figure 350152DEST_PATH_IMAGE012
Figure 826264DEST_PATH_IMAGE005
Figure 289606DEST_PATH_IMAGE013
Figure 7901DEST_PATH_IMAGE018
Figure 381245DEST_PATH_IMAGE014
Figure 264144DEST_PATH_IMAGE007
Figure 355728DEST_PATH_IMAGE015
Figure 964618DEST_PATH_IMAGE016
Figure 516954DEST_PATH_IMAGE008
Figure 331719DEST_PATH_IMAGE017
Figure 893282DEST_PATH_IMAGE018
, during binary operator control variables k=6, decrypt operation is M i=
Figure 474173DEST_PATH_IMAGE018
Figure 587623DEST_PATH_IMAGE010
Figure 388220DEST_PATH_IMAGE003
Figure 989359DEST_PATH_IMAGE011
Figure 719633DEST_PATH_IMAGE018
Figure 377885DEST_PATH_IMAGE012
Figure 400199DEST_PATH_IMAGE005
Figure 317230DEST_PATH_IMAGE014
Figure 32431DEST_PATH_IMAGE015
Figure 445351DEST_PATH_IMAGE018
Figure 71505DEST_PATH_IMAGE016
Figure 68411DEST_PATH_IMAGE008
Figure 812114DEST_PATH_IMAGE017
Figure 843655DEST_PATH_IMAGE018
, during binary operator control variables k=7, decrypt operation is M i=
Figure 640709DEST_PATH_IMAGE018
Figure 626376DEST_PATH_IMAGE010
Figure 409656DEST_PATH_IMAGE003
Figure 794238DEST_PATH_IMAGE011
Figure 762194DEST_PATH_IMAGE018
Figure 733692DEST_PATH_IMAGE012
Figure 822128DEST_PATH_IMAGE005
Figure 202162DEST_PATH_IMAGE013
Figure 216386DEST_PATH_IMAGE018
Figure 534235DEST_PATH_IMAGE014
Figure 426361DEST_PATH_IMAGE007
Figure 287000DEST_PATH_IMAGE015
Figure 970660DEST_PATH_IMAGE018
Figure 651172DEST_PATH_IMAGE016
Figure 57972DEST_PATH_IMAGE009
Figure 773118DEST_PATH_IMAGE017
Figure 627679DEST_PATH_IMAGE018
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 61066DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 652584DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 989281DEST_PATH_IMAGE019
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 516208DEST_PATH_IMAGE001
carry out polynary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 669847DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the polynary encryption anti-counterfeiting information storage of the multiparameter trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100237756100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100237756100001DEST_PATH_IMAGE002
,
Figure 2013100237756100001DEST_PATH_IMAGE003
,
Figure 2013100237756100001DEST_PATH_IMAGE004
,
Figure 2013100237756100001DEST_PATH_IMAGE005
,
Figure 2013100237756100001DEST_PATH_IMAGE006
,
Figure 2013100237756100001DEST_PATH_IMAGE007
,
Figure 2013100237756100001DEST_PATH_IMAGE008
With
Figure 2013100237756100001DEST_PATH_IMAGE009
, encryption parameter
Figure 72033DEST_PATH_IMAGE002
,
Figure 989174DEST_PATH_IMAGE003
,
Figure 644277DEST_PATH_IMAGE004
,
Figure 416317DEST_PATH_IMAGE005
, ,
Figure 928518DEST_PATH_IMAGE007
, With
Figure 643719DEST_PATH_IMAGE009
Be 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as q, the binary system positive integer that encryption variables q is 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100237756100001DEST_PATH_IMAGE010
Figure 2013100237756100001DEST_PATH_IMAGE011
Figure 2013100237756100001DEST_PATH_IMAGE012
Figure 2013100237756100001DEST_PATH_IMAGE013
Figure 2013100237756100001DEST_PATH_IMAGE014
Figure 2013100237756100001DEST_PATH_IMAGE015
Figure 2013100237756100001DEST_PATH_IMAGE016
Figure 2013100237756100001DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 315528DEST_PATH_IMAGE010
Figure 685722DEST_PATH_IMAGE011
Figure 426331DEST_PATH_IMAGE013
Figure 825083DEST_PATH_IMAGE014
Figure 631758DEST_PATH_IMAGE015
Figure 873384DEST_PATH_IMAGE016
Figure 23873DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 251778DEST_PATH_IMAGE011
Figure 980700DEST_PATH_IMAGE012
Figure 459783DEST_PATH_IMAGE013
Figure 833126DEST_PATH_IMAGE014
Figure 978675DEST_PATH_IMAGE015
Figure 804679DEST_PATH_IMAGE016
Figure 687185DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 416500DEST_PATH_IMAGE010
Figure 234414DEST_PATH_IMAGE011
Figure 46250DEST_PATH_IMAGE012
Figure 342233DEST_PATH_IMAGE013
Figure 814803DEST_PATH_IMAGE014
Figure 305084DEST_PATH_IMAGE015
Figure 105681DEST_PATH_IMAGE016
Figure 703890DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 640753DEST_PATH_IMAGE010
Figure 301935DEST_PATH_IMAGE011
Figure 589828DEST_PATH_IMAGE012
Figure 617827DEST_PATH_IMAGE013
Figure 173311DEST_PATH_IMAGE014
Figure 238350DEST_PATH_IMAGE015
Figure 515004DEST_PATH_IMAGE016
Figure 956481DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 867991DEST_PATH_IMAGE011
Figure 631941DEST_PATH_IMAGE012
Figure 877108DEST_PATH_IMAGE013
Figure 141605DEST_PATH_IMAGE014
Figure 814026DEST_PATH_IMAGE015
Figure 973186DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 859233DEST_PATH_IMAGE010
Figure 297222DEST_PATH_IMAGE012
Figure 884193DEST_PATH_IMAGE013
Figure 126212DEST_PATH_IMAGE014
Figure 140435DEST_PATH_IMAGE015
Figure 347480DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 208120DEST_PATH_IMAGE010
Figure 871272DEST_PATH_IMAGE011
Figure 870769DEST_PATH_IMAGE013
Figure 440477DEST_PATH_IMAGE015
Figure 109749DEST_PATH_IMAGE016
Figure 842213DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 910401DEST_PATH_IMAGE010
Figure 437328DEST_PATH_IMAGE011
Figure 859475DEST_PATH_IMAGE012
Figure 254685DEST_PATH_IMAGE013
Figure 678844DEST_PATH_IMAGE014
Figure 283186DEST_PATH_IMAGE016
Figure 858918DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, polynary cryptographic calculation is defined as H i=
Figure 511485DEST_PATH_IMAGE010
Figure 645794DEST_PATH_IMAGE002
Figure 513966DEST_PATH_IMAGE018
Figure 912718DEST_PATH_IMAGE012
Figure 716463DEST_PATH_IMAGE004
Figure 567876DEST_PATH_IMAGE013
Figure 108579DEST_PATH_IMAGE018
Figure 128881DEST_PATH_IMAGE014
Figure 339413DEST_PATH_IMAGE006
Figure 442236DEST_PATH_IMAGE015
Figure 396417DEST_PATH_IMAGE018
Figure 652659DEST_PATH_IMAGE008
Figure 868877DEST_PATH_IMAGE017
Figure 125284DEST_PATH_IMAGE018
, during binary operator control variables k=1, polynary cryptographic calculation is defined as H i=
Figure 672513DEST_PATH_IMAGE010
Figure 985814DEST_PATH_IMAGE003
Figure 780332DEST_PATH_IMAGE011
Figure 252902DEST_PATH_IMAGE018
Figure 976138DEST_PATH_IMAGE012
Figure 301638DEST_PATH_IMAGE004
Figure 401312DEST_PATH_IMAGE013
Figure 102289DEST_PATH_IMAGE018
Figure 386640DEST_PATH_IMAGE014
Figure 674533DEST_PATH_IMAGE006
Figure 813784DEST_PATH_IMAGE015
Figure 244634DEST_PATH_IMAGE018
Figure 575252DEST_PATH_IMAGE016
Figure 418017DEST_PATH_IMAGE017
Figure 329472DEST_PATH_IMAGE018
, during binary operator control variables k=2, polynary cryptographic calculation is defined as H i=
Figure 329527DEST_PATH_IMAGE018
Figure 592012DEST_PATH_IMAGE010
Figure 696234DEST_PATH_IMAGE003
Figure 229240DEST_PATH_IMAGE011
Figure 901661DEST_PATH_IMAGE018
Figure 884399DEST_PATH_IMAGE012
Figure 933257DEST_PATH_IMAGE004
Figure 552459DEST_PATH_IMAGE013
Figure 520415DEST_PATH_IMAGE018
Figure 491913DEST_PATH_IMAGE014
Figure 314769DEST_PATH_IMAGE006
Figure 320902DEST_PATH_IMAGE015
Figure 833661DEST_PATH_IMAGE018
Figure 542171DEST_PATH_IMAGE008
Figure 904276DEST_PATH_IMAGE017
Figure 89400DEST_PATH_IMAGE018
, during binary operator control variables k=3, polynary cryptographic calculation is defined as H i=
Figure 534026DEST_PATH_IMAGE018
Figure 160070DEST_PATH_IMAGE011
Figure 327877DEST_PATH_IMAGE018
Figure 184975DEST_PATH_IMAGE012
Figure 253163DEST_PATH_IMAGE005
Figure 780090DEST_PATH_IMAGE013
Figure 202237DEST_PATH_IMAGE018
Figure 472813DEST_PATH_IMAGE014
Figure 21606DEST_PATH_IMAGE006
Figure 483549DEST_PATH_IMAGE015
Figure 625948DEST_PATH_IMAGE018
Figure 936100DEST_PATH_IMAGE016
Figure 854247DEST_PATH_IMAGE008
Figure 988556DEST_PATH_IMAGE017
Figure 854137DEST_PATH_IMAGE018
, during binary operator control variables k=4, polynary cryptographic calculation is defined as H i=
Figure 856728DEST_PATH_IMAGE018
Figure 793646DEST_PATH_IMAGE003
Figure 910638DEST_PATH_IMAGE011
Figure 828172DEST_PATH_IMAGE018
Figure 81430DEST_PATH_IMAGE012
Figure 56077DEST_PATH_IMAGE005
Figure 519419DEST_PATH_IMAGE013
Figure 739179DEST_PATH_IMAGE018
Figure 449925DEST_PATH_IMAGE014
Figure 831359DEST_PATH_IMAGE006
Figure 421478DEST_PATH_IMAGE015
Figure 179349DEST_PATH_IMAGE018
Figure 531833DEST_PATH_IMAGE016
Figure 585633DEST_PATH_IMAGE008
Figure 898934DEST_PATH_IMAGE017
Figure 959032DEST_PATH_IMAGE018
, during binary operator control variables k=5, polynary cryptographic calculation is defined as H i=
Figure 41388DEST_PATH_IMAGE018
Figure 154838DEST_PATH_IMAGE010
Figure 556574DEST_PATH_IMAGE011
Figure 257551DEST_PATH_IMAGE018
Figure 844412DEST_PATH_IMAGE013
Figure 399896DEST_PATH_IMAGE018
Figure 730514DEST_PATH_IMAGE014
Figure 630337DEST_PATH_IMAGE007
Figure 573279DEST_PATH_IMAGE015
Figure 612298DEST_PATH_IMAGE018
Figure 113817DEST_PATH_IMAGE016
Figure 235357DEST_PATH_IMAGE008
Figure 979060DEST_PATH_IMAGE017
Figure 10601DEST_PATH_IMAGE018
, during binary operator control variables k=6, polynary cryptographic calculation is defined as H i=
Figure 184487DEST_PATH_IMAGE018
Figure 668689DEST_PATH_IMAGE010
Figure 576602DEST_PATH_IMAGE003
Figure 836551DEST_PATH_IMAGE011
Figure 129399DEST_PATH_IMAGE012
Figure 214904DEST_PATH_IMAGE005
Figure 345671DEST_PATH_IMAGE013
Figure 359895DEST_PATH_IMAGE018
Figure 54575DEST_PATH_IMAGE014
Figure 445236DEST_PATH_IMAGE007
Figure 804411DEST_PATH_IMAGE015
Figure 989535DEST_PATH_IMAGE018
Figure 171511DEST_PATH_IMAGE016
Figure 100284DEST_PATH_IMAGE008
Figure 940064DEST_PATH_IMAGE017
Figure 794626DEST_PATH_IMAGE018
, during binary operator control variables k=7, polynary cryptographic calculation is defined as H i=
Figure 228012DEST_PATH_IMAGE018
Figure 196362DEST_PATH_IMAGE010
Figure 156227DEST_PATH_IMAGE003
Figure 683155DEST_PATH_IMAGE011
Figure 836793DEST_PATH_IMAGE018
Figure 107369DEST_PATH_IMAGE012
Figure 121035DEST_PATH_IMAGE013
Figure 263434DEST_PATH_IMAGE018
Figure 836236DEST_PATH_IMAGE014
Figure 750675DEST_PATH_IMAGE015
Figure 380371DEST_PATH_IMAGE018
Figure 319880DEST_PATH_IMAGE017
Figure 938336DEST_PATH_IMAGE018
, set encryption parameter
Figure 479039DEST_PATH_IMAGE002
,
Figure 732297DEST_PATH_IMAGE003
,
Figure 706944DEST_PATH_IMAGE004
, ,
Figure 766877DEST_PATH_IMAGE006
,
Figure 874642DEST_PATH_IMAGE007
, With Initial value, set the initial value of encryption variables q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 728700DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure 2013100237756100001DEST_PATH_IMAGE020
Figure 356819DEST_PATH_IMAGE010
Figure 986569DEST_PATH_IMAGE011
Figure 256587DEST_PATH_IMAGE012
Figure 245403DEST_PATH_IMAGE004
Figure 544535DEST_PATH_IMAGE013
Figure 644209DEST_PATH_IMAGE020
Figure 348116DEST_PATH_IMAGE014
Figure 366888DEST_PATH_IMAGE006
Figure 56681DEST_PATH_IMAGE020
Figure 113630DEST_PATH_IMAGE016
Figure 455323DEST_PATH_IMAGE017
Figure 21433DEST_PATH_IMAGE020
Polynary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 697003DEST_PATH_IMAGE019
Carry out H 1=
Figure 572260DEST_PATH_IMAGE010
Figure 315963DEST_PATH_IMAGE002
Figure 347504DEST_PATH_IMAGE011
Figure 144558DEST_PATH_IMAGE020
Figure 133155DEST_PATH_IMAGE012
Figure 916434DEST_PATH_IMAGE004
Figure 927116DEST_PATH_IMAGE013
Figure 268973DEST_PATH_IMAGE020
Figure 593865DEST_PATH_IMAGE014
Figure 180835DEST_PATH_IMAGE006
Figure 46023DEST_PATH_IMAGE015
Figure 558782DEST_PATH_IMAGE020
Figure 17576DEST_PATH_IMAGE016
Figure 909702DEST_PATH_IMAGE008
Figure 629396DEST_PATH_IMAGE017
Figure 814521DEST_PATH_IMAGE020
Carry out i+1, q+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 2=
Figure 2013100237756100001DEST_PATH_IMAGE021
Figure 134513DEST_PATH_IMAGE010
Figure 760557DEST_PATH_IMAGE021
Figure 692478DEST_PATH_IMAGE012
Figure 159363DEST_PATH_IMAGE004
Figure 898353DEST_PATH_IMAGE021
Figure 553457DEST_PATH_IMAGE014
Figure 325497DEST_PATH_IMAGE006
Figure 15235DEST_PATH_IMAGE015
Figure 339163DEST_PATH_IMAGE021
Figure 980097DEST_PATH_IMAGE016
Figure 54364DEST_PATH_IMAGE008
Figure 100074DEST_PATH_IMAGE017
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 2013100237756100001DEST_PATH_IMAGE022
Carry out H 2=
Figure 234315DEST_PATH_IMAGE010
Figure 9897DEST_PATH_IMAGE003
Figure 813643DEST_PATH_IMAGE011
Figure 930635DEST_PATH_IMAGE021
Figure 205758DEST_PATH_IMAGE012
Figure 685860DEST_PATH_IMAGE013
Figure 791613DEST_PATH_IMAGE021
Figure 617672DEST_PATH_IMAGE006
Figure 592155DEST_PATH_IMAGE021
Figure 206905DEST_PATH_IMAGE008
Figure 523355DEST_PATH_IMAGE017
Figure 961289DEST_PATH_IMAGE021
Carry out i+1, q+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 3=
Figure 2013100237756100001DEST_PATH_IMAGE023
Figure 207869DEST_PATH_IMAGE003
Figure 698150DEST_PATH_IMAGE011
Figure 498747DEST_PATH_IMAGE023
Figure 972322DEST_PATH_IMAGE012
Figure 695001DEST_PATH_IMAGE013
Figure 982894DEST_PATH_IMAGE023
Figure 512358DEST_PATH_IMAGE014
Figure 67842DEST_PATH_IMAGE006
Figure 32704DEST_PATH_IMAGE023
Figure 975646DEST_PATH_IMAGE016
Figure 152680DEST_PATH_IMAGE008
Figure 887156DEST_PATH_IMAGE017
Figure 274275DEST_PATH_IMAGE023
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this polynary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 519442DEST_PATH_IMAGE001
carry out polynary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100237756A 2013-01-22 2013-01-22 Multiparameter multielement encryption anti-fake information storage trademark Pending CN103106525A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100237756A CN103106525A (en) 2013-01-22 2013-01-22 Multiparameter multielement encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100237756A CN103106525A (en) 2013-01-22 2013-01-22 Multiparameter multielement encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106525A true CN103106525A (en) 2013-05-15

Family

ID=48314371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100237756A Pending CN103106525A (en) 2013-01-22 2013-01-22 Multiparameter multielement encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106525A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103116800A (en) Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark
CN103106525A (en) Multiparameter multielement encryption anti-fake information storage trademark
CN103106521A (en) Multiparameter univariate ternary encryption anti-fake information storage trademark
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103106482A (en) Multiparameter univariate binary encryption anti-fake information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103106501A (en) Multiparameter transmutation multivariable multielement encryption anti-fake information storage trademark
CN103106507A (en) Multiparameter univariate unitary encryption anti-fake information storage trademark
CN103106523A (en) Multiparameter univariate multielement cycle encryption anti-fake information storage trademark
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106490A (en) Multiparameter polytomy variable cycle encryption anti-fake information storage trademark
CN103106497A (en) Multiparameter univariate binary variable cycle encryption anti-fake information storage trademark
CN103106455A (en) Multiparameter univariate binary cycle encryption anti-fake information storage trademark
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103106483A (en) Multi-parameter ternary encryption anti-fake information storage brand
CN103123693A (en) One-parameter binary-encryption anti-counterfeiting information storage trademark
CN103106436A (en) Multiparameter univariate unitary cycle encryption anti-fake information storage trademark
CN103136566A (en) Parametric variable gradient polynary encryption anti-fake information storage trademark
CN103106468A (en) Parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106514A (en) Multi-parameter binary encryption anti-fake information storage brand
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106437A (en) Single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515