CN103116797A - Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark - Google Patents

Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103116797A
CN103116797A CN2013100236077A CN201310023607A CN103116797A CN 103116797 A CN103116797 A CN 103116797A CN 2013100236077 A CN2013100236077 A CN 2013100236077A CN 201310023607 A CN201310023607 A CN 201310023607A CN 103116797 A CN103116797 A CN 103116797A
Authority
CN
China
Prior art keywords
binary system
binary
group
trade mark
variable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100236077A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100236077A priority Critical patent/CN103116797A/en
Publication of CN103116797A publication Critical patent/CN103116797A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

The invention discloses a multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark which enables binary anti-fake information to generate a binary modulating signal by means of multivariate variable circulation encryption and channel coding, and enables the anti-fake information to be embedded in the whole trademark page in a mode of ordered change of the conductivity of amplitude modulation outlets by means of a circulating look-up table modulation mode. By means of the multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark, the anti-fake information can be identified from any fragment when trademark identification is carried out, and the multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multivariable multi-parameter gradient multivariate variable circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariable multi-parameter gradient multivariate variable circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 229138DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 146278DEST_PATH_IMAGE002
Figure 695126DEST_PATH_IMAGE004
Figure 571815DEST_PATH_IMAGE005
Figure 474360DEST_PATH_IMAGE007
Figure 735577DEST_PATH_IMAGE008
With
Figure 716040DEST_PATH_IMAGE009
, encryption parameter
Figure 771721DEST_PATH_IMAGE002
Figure 401417DEST_PATH_IMAGE003
Figure 979258DEST_PATH_IMAGE005
Figure 471419DEST_PATH_IMAGE006
Figure 526094DEST_PATH_IMAGE007
Figure 863534DEST_PATH_IMAGE008
With
Figure 818589DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 216073DEST_PATH_IMAGE010
Figure 899175DEST_PATH_IMAGE012
Figure 480384DEST_PATH_IMAGE014
Figure 493339DEST_PATH_IMAGE015
Figure 188894DEST_PATH_IMAGE016
Figure 603695DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 546243DEST_PATH_IMAGE010
Figure 295762DEST_PATH_IMAGE011
Figure 778696DEST_PATH_IMAGE012
Figure 64315DEST_PATH_IMAGE013
Figure 240081DEST_PATH_IMAGE014
Figure 165312DEST_PATH_IMAGE015
Figure 819159DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 916559DEST_PATH_IMAGE010
Figure 329086DEST_PATH_IMAGE011
Figure 419401DEST_PATH_IMAGE012
Figure 912569DEST_PATH_IMAGE013
Figure 164558DEST_PATH_IMAGE014
Figure 877430DEST_PATH_IMAGE015
Figure 505858DEST_PATH_IMAGE016
Figure 119111DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 542002DEST_PATH_IMAGE010
Figure 742170DEST_PATH_IMAGE011
Figure 64884DEST_PATH_IMAGE013
Figure 173523DEST_PATH_IMAGE014
Figure 831218DEST_PATH_IMAGE016
Figure 904216DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 189616DEST_PATH_IMAGE010
Figure 348065DEST_PATH_IMAGE011
Figure 872718DEST_PATH_IMAGE012
Figure 939080DEST_PATH_IMAGE014
Figure 834093DEST_PATH_IMAGE015
Figure 146125DEST_PATH_IMAGE016
Figure 944448DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 254207DEST_PATH_IMAGE010
Figure 387248DEST_PATH_IMAGE011
Figure 752239DEST_PATH_IMAGE012
Figure 654336DEST_PATH_IMAGE013
Figure 948045DEST_PATH_IMAGE014
Figure 240486DEST_PATH_IMAGE015
Figure 159901DEST_PATH_IMAGE016
Figure 165772DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 133225DEST_PATH_IMAGE012
Figure 744335DEST_PATH_IMAGE013
Figure 974039DEST_PATH_IMAGE014
Figure 303389DEST_PATH_IMAGE015
Figure 315339DEST_PATH_IMAGE016
Figure 780955DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 351483DEST_PATH_IMAGE010
Figure 168129DEST_PATH_IMAGE011
Figure 718190DEST_PATH_IMAGE012
Figure 303892DEST_PATH_IMAGE013
Figure 733736DEST_PATH_IMAGE014
Figure 21367DEST_PATH_IMAGE015
Figure 624387DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 478390DEST_PATH_IMAGE010
Figure 518896DEST_PATH_IMAGE011
Figure 660028DEST_PATH_IMAGE012
Figure 477122DEST_PATH_IMAGE014
Figure 755657DEST_PATH_IMAGE015
Figure 955606DEST_PATH_IMAGE016
Figure 370407DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 563939DEST_PATH_IMAGE010
Figure 46873DEST_PATH_IMAGE019
Figure 831027DEST_PATH_IMAGE011
Figure 741214DEST_PATH_IMAGE020
Figure 666445DEST_PATH_IMAGE012
Figure 703802DEST_PATH_IMAGE019
Figure 93195DEST_PATH_IMAGE013
Figure 163974DEST_PATH_IMAGE014
Figure 739443DEST_PATH_IMAGE019
Figure 438595DEST_PATH_IMAGE022
Figure 278430DEST_PATH_IMAGE019
Figure 127568DEST_PATH_IMAGE017
Figure 816038DEST_PATH_IMAGE023
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 675421DEST_PATH_IMAGE010
 
Figure 831596DEST_PATH_IMAGE024
Figure 441700DEST_PATH_IMAGE011
 
Figure 112853DEST_PATH_IMAGE021
 
Figure 670928DEST_PATH_IMAGE024
Figure 451934DEST_PATH_IMAGE013
 
Figure 610382DEST_PATH_IMAGE022
Figure 56407DEST_PATH_IMAGE014
 
Figure 498759DEST_PATH_IMAGE024
Figure 699933DEST_PATH_IMAGE015
 
Figure 96410DEST_PATH_IMAGE023
Figure 408443DEST_PATH_IMAGE016
 
Figure 77376DEST_PATH_IMAGE017
 
Figure 961150DEST_PATH_IMAGE025
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 76874DEST_PATH_IMAGE021
Figure 234097DEST_PATH_IMAGE010
Figure 777074DEST_PATH_IMAGE026
Figure 69515DEST_PATH_IMAGE011
Figure 739662DEST_PATH_IMAGE022
Figure 496266DEST_PATH_IMAGE012
Figure 459411DEST_PATH_IMAGE026
Figure 270109DEST_PATH_IMAGE013
Figure 727635DEST_PATH_IMAGE023
Figure 89477DEST_PATH_IMAGE014
Figure 239836DEST_PATH_IMAGE026
Figure 482970DEST_PATH_IMAGE016
Figure 554962DEST_PATH_IMAGE026
Figure 106029DEST_PATH_IMAGE017
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 5907DEST_PATH_IMAGE022
Figure 170172DEST_PATH_IMAGE010
Figure 224847DEST_PATH_IMAGE028
Figure 180405DEST_PATH_IMAGE012
Figure 456797DEST_PATH_IMAGE028
Figure 863508DEST_PATH_IMAGE013
Figure 361485DEST_PATH_IMAGE025
Figure 184996DEST_PATH_IMAGE014
Figure 463531DEST_PATH_IMAGE028
Figure 159086DEST_PATH_IMAGE015
Figure 562440DEST_PATH_IMAGE016
Figure 62692DEST_PATH_IMAGE028
Figure 561937DEST_PATH_IMAGE017
Figure 831244DEST_PATH_IMAGE029
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 256278DEST_PATH_IMAGE023
Figure 243826DEST_PATH_IMAGE010
Figure 468134DEST_PATH_IMAGE030
Figure 954927DEST_PATH_IMAGE025
Figure 413459DEST_PATH_IMAGE012
Figure 503775DEST_PATH_IMAGE030
Figure 685358DEST_PATH_IMAGE013
Figure 953659DEST_PATH_IMAGE027
Figure 915799DEST_PATH_IMAGE014
Figure 886040DEST_PATH_IMAGE015
Figure 512194DEST_PATH_IMAGE029
Figure 446783DEST_PATH_IMAGE016
Figure 143715DEST_PATH_IMAGE031
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 535830DEST_PATH_IMAGE010
Figure 608829DEST_PATH_IMAGE032
Figure 888369DEST_PATH_IMAGE011
Figure 46818DEST_PATH_IMAGE027
Figure 571471DEST_PATH_IMAGE012
Figure 764555DEST_PATH_IMAGE032
Figure 532846DEST_PATH_IMAGE029
Figure 110458DEST_PATH_IMAGE014
Figure 908781DEST_PATH_IMAGE032
Figure 280856DEST_PATH_IMAGE015
Figure 403445DEST_PATH_IMAGE031
Figure 519169DEST_PATH_IMAGE016
Figure 171998DEST_PATH_IMAGE032
Figure 714975DEST_PATH_IMAGE017
Figure 709213DEST_PATH_IMAGE018
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 363049DEST_PATH_IMAGE027
Figure 634499DEST_PATH_IMAGE010
Figure 286060DEST_PATH_IMAGE033
Figure 941163DEST_PATH_IMAGE011
Figure 336373DEST_PATH_IMAGE029
Figure 213062DEST_PATH_IMAGE012
Figure 364687DEST_PATH_IMAGE033
Figure 254889DEST_PATH_IMAGE013
Figure 516106DEST_PATH_IMAGE031
Figure 502429DEST_PATH_IMAGE014
Figure 558109DEST_PATH_IMAGE033
Figure 713781DEST_PATH_IMAGE016
Figure 189631DEST_PATH_IMAGE033
Figure 847325DEST_PATH_IMAGE020
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 199864DEST_PATH_IMAGE010
Figure 725523DEST_PATH_IMAGE034
Figure 882966DEST_PATH_IMAGE011
Figure 177681DEST_PATH_IMAGE031
Figure 260913DEST_PATH_IMAGE012
Figure 273868DEST_PATH_IMAGE034
Figure 156374DEST_PATH_IMAGE013
Figure 321907DEST_PATH_IMAGE018
Figure 70432DEST_PATH_IMAGE034
Figure 818945DEST_PATH_IMAGE015
Figure 838984DEST_PATH_IMAGE020
Figure 251566DEST_PATH_IMAGE034
Figure 538191DEST_PATH_IMAGE017
Figure 678316DEST_PATH_IMAGE021
, set encryption parameter
Figure 759405DEST_PATH_IMAGE002
Figure 171932DEST_PATH_IMAGE003
Figure 511515DEST_PATH_IMAGE004
Figure 23716DEST_PATH_IMAGE006
Figure 657960DEST_PATH_IMAGE007
Figure 286387DEST_PATH_IMAGE008
With
Figure 899640DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 588110DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 522699DEST_PATH_IMAGE035
Carry out H1=
Figure 892501DEST_PATH_IMAGE036
Figure 110992DEST_PATH_IMAGE010
Figure 225491DEST_PATH_IMAGE019
Figure 617606DEST_PATH_IMAGE037
Figure 658560DEST_PATH_IMAGE019
Figure 66277DEST_PATH_IMAGE013
Figure 2013100236077100002DEST_PATH_IMAGE038
Figure 653247DEST_PATH_IMAGE014
Figure 580752DEST_PATH_IMAGE019
Figure 719609DEST_PATH_IMAGE015
Figure 2013100236077100002DEST_PATH_IMAGE040
Figure 676939DEST_PATH_IMAGE016
Figure 5283DEST_PATH_IMAGE019
Figure 787294DEST_PATH_IMAGE017
Polytomy variable circulates cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 470954DEST_PATH_IMAGE035
Carry out H1=
Figure 470451DEST_PATH_IMAGE010
Figure 639394DEST_PATH_IMAGE019
Figure 740391DEST_PATH_IMAGE037
Figure 144958DEST_PATH_IMAGE012
Figure 901562DEST_PATH_IMAGE019
Figure 130287DEST_PATH_IMAGE013
Figure 910024DEST_PATH_IMAGE038
Figure 367550DEST_PATH_IMAGE014
Figure 994972DEST_PATH_IMAGE019
Figure 458369DEST_PATH_IMAGE040
Figure 657269DEST_PATH_IMAGE016
Figure 388465DEST_PATH_IMAGE019
Figure 194878DEST_PATH_IMAGE017
Figure 11524DEST_PATH_IMAGE042
Polytomy variable carries out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while circulating cryptographic calculation, next polytomy variable circulation cryptographic calculation is pointed to H2=
Figure 60120DEST_PATH_IMAGE010
Figure 2013100236077100002DEST_PATH_IMAGE044
Figure 847543DEST_PATH_IMAGE024
Figure 804369DEST_PATH_IMAGE014
Figure 696233DEST_PATH_IMAGE024
Figure 630429DEST_PATH_IMAGE015
Figure 2013100236077100002DEST_PATH_IMAGE047
Figure 215125DEST_PATH_IMAGE016
Figure 228080DEST_PATH_IMAGE024
Figure 540945DEST_PATH_IMAGE017
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100236077100002DEST_PATH_IMAGE050
Carry out H2=
Figure 142696DEST_PATH_IMAGE043
Figure 147561DEST_PATH_IMAGE010
Figure 852584DEST_PATH_IMAGE044
Figure 841400DEST_PATH_IMAGE012
Figure 78215DEST_PATH_IMAGE024
Figure 364840DEST_PATH_IMAGE013
Figure 965814DEST_PATH_IMAGE014
Figure 191390DEST_PATH_IMAGE024
Figure 899507DEST_PATH_IMAGE047
Figure 103828DEST_PATH_IMAGE016
Figure 65968DEST_PATH_IMAGE024
Figure 943663DEST_PATH_IMAGE017
Polytomy variable carries out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while circulating cryptographic calculation, next polytomy variable circulation cryptographic calculation is pointed to H3=
Figure 2013100236077100002DEST_PATH_IMAGE051
Figure 310468DEST_PATH_IMAGE026
Figure 493319DEST_PATH_IMAGE011
Figure 820133DEST_PATH_IMAGE012
Figure 430237DEST_PATH_IMAGE026
Figure 101390DEST_PATH_IMAGE013
Figure 2013100236077100002DEST_PATH_IMAGE053
Figure 586467DEST_PATH_IMAGE014
Figure 659465DEST_PATH_IMAGE026
Figure 440470DEST_PATH_IMAGE015
Figure 2013100236077100002DEST_PATH_IMAGE055
Figure 910504DEST_PATH_IMAGE016
Figure 622108DEST_PATH_IMAGE026
Figure 549612DEST_PATH_IMAGE017
Figure 2013100236077100002DEST_PATH_IMAGE057
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polytomy variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 563836DEST_PATH_IMAGE001
Carry out polytomy variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polytomy variable circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 452989DEST_PATH_IMAGE002
Figure 765022DEST_PATH_IMAGE003
Figure 563345DEST_PATH_IMAGE004
Figure 935420DEST_PATH_IMAGE005
Figure 317729DEST_PATH_IMAGE006
Figure 433452DEST_PATH_IMAGE007
Figure 273232DEST_PATH_IMAGE008
With
Figure 566942DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, circulates ciphering process by polytomy variable, it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 921700DEST_PATH_IMAGE018
Figure 90382DEST_PATH_IMAGE010
Figure 846985DEST_PATH_IMAGE019
Figure 311596DEST_PATH_IMAGE011
Figure 419229DEST_PATH_IMAGE020
Figure 814438DEST_PATH_IMAGE012
Figure 674816DEST_PATH_IMAGE019
Figure 825174DEST_PATH_IMAGE013
Figure 905257DEST_PATH_IMAGE021
Figure 166474DEST_PATH_IMAGE014
Figure 569773DEST_PATH_IMAGE019
Figure 146160DEST_PATH_IMAGE015
Figure 962807DEST_PATH_IMAGE022
Figure 512868DEST_PATH_IMAGE016
Figure 528414DEST_PATH_IMAGE017
Figure 816045DEST_PATH_IMAGE023
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 419065DEST_PATH_IMAGE020
Figure 374120DEST_PATH_IMAGE010
 
Figure 771603DEST_PATH_IMAGE024
Figure 829687DEST_PATH_IMAGE011
 
Figure 281846DEST_PATH_IMAGE012
 
Figure 850230DEST_PATH_IMAGE024
Figure 378032DEST_PATH_IMAGE013
 
Figure 322855DEST_PATH_IMAGE022
Figure 675338DEST_PATH_IMAGE014
 
Figure 430936DEST_PATH_IMAGE024
Figure 931187DEST_PATH_IMAGE015
 
Figure 663389DEST_PATH_IMAGE023
Figure 198276DEST_PATH_IMAGE016
 
Figure 859195DEST_PATH_IMAGE024
Figure 846743DEST_PATH_IMAGE017
 
Figure 382635DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 56379DEST_PATH_IMAGE010
Figure 281955DEST_PATH_IMAGE026
Figure 123287DEST_PATH_IMAGE012
Figure 23110DEST_PATH_IMAGE026
Figure 402270DEST_PATH_IMAGE013
Figure 500676DEST_PATH_IMAGE023
Figure 438414DEST_PATH_IMAGE014
Figure 887850DEST_PATH_IMAGE026
Figure 805121DEST_PATH_IMAGE015
Figure 132252DEST_PATH_IMAGE016
Figure 789947DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 830901DEST_PATH_IMAGE022
Figure 238617DEST_PATH_IMAGE010
Figure 746959DEST_PATH_IMAGE028
Figure 690775DEST_PATH_IMAGE011
Figure 891950DEST_PATH_IMAGE023
Figure 475378DEST_PATH_IMAGE012
Figure 30818DEST_PATH_IMAGE028
Figure 78409DEST_PATH_IMAGE013
Figure 201217DEST_PATH_IMAGE025
Figure 334258DEST_PATH_IMAGE014
Figure 387665DEST_PATH_IMAGE028
Figure 539029DEST_PATH_IMAGE015
Figure 187496DEST_PATH_IMAGE016
Figure 106911DEST_PATH_IMAGE028
Figure 801197DEST_PATH_IMAGE017
Figure 764343DEST_PATH_IMAGE029
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 871976DEST_PATH_IMAGE023
Figure 691345DEST_PATH_IMAGE030
Figure 90971DEST_PATH_IMAGE011
Figure 420321DEST_PATH_IMAGE025
Figure 166691DEST_PATH_IMAGE012
Figure 835570DEST_PATH_IMAGE030
Figure 156830DEST_PATH_IMAGE013
Figure 963024DEST_PATH_IMAGE027
Figure 27932DEST_PATH_IMAGE014
Figure 364366DEST_PATH_IMAGE030
Figure 590948DEST_PATH_IMAGE015
Figure 144158DEST_PATH_IMAGE029
Figure 747178DEST_PATH_IMAGE016
Figure 326669DEST_PATH_IMAGE030
Figure 989731DEST_PATH_IMAGE017
Figure 266123DEST_PATH_IMAGE031
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 672834DEST_PATH_IMAGE025
Figure 482396DEST_PATH_IMAGE010
Figure 50780DEST_PATH_IMAGE032
Figure 80047DEST_PATH_IMAGE011
Figure 24869DEST_PATH_IMAGE027
Figure 694797DEST_PATH_IMAGE012
Figure 371766DEST_PATH_IMAGE032
Figure 872018DEST_PATH_IMAGE013
Figure 371263DEST_PATH_IMAGE029
Figure 640571DEST_PATH_IMAGE014
Figure 65605DEST_PATH_IMAGE032
Figure 990835DEST_PATH_IMAGE015
Figure 277460DEST_PATH_IMAGE031
Figure 417586DEST_PATH_IMAGE016
Figure 222785DEST_PATH_IMAGE017
Figure 313101DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 494684DEST_PATH_IMAGE027
Figure 762985DEST_PATH_IMAGE010
Figure 725125DEST_PATH_IMAGE033
Figure 602820DEST_PATH_IMAGE011
Figure 701226DEST_PATH_IMAGE029
Figure 327379DEST_PATH_IMAGE012
Figure 261968DEST_PATH_IMAGE033
Figure 694087DEST_PATH_IMAGE013
Figure 155987DEST_PATH_IMAGE031
Figure 15358DEST_PATH_IMAGE014
Figure 437244DEST_PATH_IMAGE033
Figure 407474DEST_PATH_IMAGE015
Figure 729739DEST_PATH_IMAGE018
Figure 669194DEST_PATH_IMAGE033
Figure 443115DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 24323DEST_PATH_IMAGE029
Figure 404489DEST_PATH_IMAGE010
Figure 732833DEST_PATH_IMAGE034
Figure 780424DEST_PATH_IMAGE011
Figure 401767DEST_PATH_IMAGE031
Figure 269229DEST_PATH_IMAGE012
Figure 322635DEST_PATH_IMAGE034
Figure 975465DEST_PATH_IMAGE013
Figure 518442DEST_PATH_IMAGE018
Figure 47741DEST_PATH_IMAGE034
Figure 7607DEST_PATH_IMAGE015
Figure 220020DEST_PATH_IMAGE020
Figure 62074DEST_PATH_IMAGE016
Figure 786446DEST_PATH_IMAGE034
Figure 850086DEST_PATH_IMAGE017
Figure 734865DEST_PATH_IMAGE021
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 13848DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 745043DEST_PATH_IMAGE035
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 49992DEST_PATH_IMAGE001
Carry out polytomy variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 866638DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the multivariable multi-parameter gradient multivariate variable being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100236077100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100236077100001DEST_PATH_IMAGE002
Figure 2013100236077100001DEST_PATH_IMAGE003
Figure 2013100236077100001DEST_PATH_IMAGE004
Figure 2013100236077100001DEST_PATH_IMAGE005
Figure 2013100236077100001DEST_PATH_IMAGE006
Figure 2013100236077100001DEST_PATH_IMAGE007
Figure 2013100236077100001DEST_PATH_IMAGE008
With
Figure 2013100236077100001DEST_PATH_IMAGE009
, encryption parameter
Figure 544278DEST_PATH_IMAGE002
Figure 880712DEST_PATH_IMAGE003
Figure 107294DEST_PATH_IMAGE004
Figure 666364DEST_PATH_IMAGE005
Figure 207067DEST_PATH_IMAGE006
Figure 647275DEST_PATH_IMAGE007
Figure 61070DEST_PATH_IMAGE008
With
Figure 586729DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100236077100001DEST_PATH_IMAGE010
Figure 2013100236077100001DEST_PATH_IMAGE011
Figure 2013100236077100001DEST_PATH_IMAGE012
Figure 2013100236077100001DEST_PATH_IMAGE015
Figure 2013100236077100001DEST_PATH_IMAGE016
Figure 2013100236077100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 367341DEST_PATH_IMAGE010
Figure 662056DEST_PATH_IMAGE011
Figure 745288DEST_PATH_IMAGE012
Figure 453798DEST_PATH_IMAGE014
Figure 868599DEST_PATH_IMAGE015
Figure 116872DEST_PATH_IMAGE016
Figure 554807DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 303320DEST_PATH_IMAGE010
Figure 323359DEST_PATH_IMAGE011
Figure 499126DEST_PATH_IMAGE012
Figure 22566DEST_PATH_IMAGE014
Figure 162691DEST_PATH_IMAGE015
Figure 181463DEST_PATH_IMAGE016
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 995890DEST_PATH_IMAGE010
Figure 508091DEST_PATH_IMAGE012
Figure 142335DEST_PATH_IMAGE013
Figure 770762DEST_PATH_IMAGE014
Figure 384015DEST_PATH_IMAGE015
Figure 72485DEST_PATH_IMAGE016
Figure 7074DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 376876DEST_PATH_IMAGE010
Figure 595367DEST_PATH_IMAGE011
Figure 709866DEST_PATH_IMAGE012
Figure 381019DEST_PATH_IMAGE013
Figure 101981DEST_PATH_IMAGE014
Figure 112662DEST_PATH_IMAGE015
Figure 142935DEST_PATH_IMAGE016
Figure 550652DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 199939DEST_PATH_IMAGE010
Figure 376711DEST_PATH_IMAGE011
Figure 974363DEST_PATH_IMAGE013
Figure 551975DEST_PATH_IMAGE014
Figure 583254DEST_PATH_IMAGE015
Figure 955329DEST_PATH_IMAGE016
Figure 839103DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 604429DEST_PATH_IMAGE012
Figure 224766DEST_PATH_IMAGE013
Figure 629333DEST_PATH_IMAGE014
Figure 385937DEST_PATH_IMAGE015
Figure 303077DEST_PATH_IMAGE016
Figure 394399DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 851925DEST_PATH_IMAGE010
Figure 364126DEST_PATH_IMAGE012
Figure 631159DEST_PATH_IMAGE013
Figure 141644DEST_PATH_IMAGE014
Figure 872840DEST_PATH_IMAGE015
Figure 679253DEST_PATH_IMAGE016
Figure 495899DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 67881DEST_PATH_IMAGE011
Figure 952157DEST_PATH_IMAGE014
Figure 913072DEST_PATH_IMAGE015
Figure 852526DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100236077100001DEST_PATH_IMAGE018
Figure 993657DEST_PATH_IMAGE010
Figure 2013100236077100001DEST_PATH_IMAGE019
Figure 865536DEST_PATH_IMAGE011
Figure 2013100236077100001DEST_PATH_IMAGE020
Figure 512549DEST_PATH_IMAGE012
Figure 774772DEST_PATH_IMAGE019
Figure 719594DEST_PATH_IMAGE013
Figure 2013100236077100001DEST_PATH_IMAGE021
Figure 885128DEST_PATH_IMAGE014
Figure 889993DEST_PATH_IMAGE019
Figure 639512DEST_PATH_IMAGE015
Figure 2013100236077100001DEST_PATH_IMAGE022
Figure 935495DEST_PATH_IMAGE016
Figure 408065DEST_PATH_IMAGE019
Figure 2013100236077100001DEST_PATH_IMAGE023
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 877104DEST_PATH_IMAGE020
Figure 914461DEST_PATH_IMAGE010
 
Figure 2013100236077100001DEST_PATH_IMAGE024
Figure 38275DEST_PATH_IMAGE011
 
Figure 109054DEST_PATH_IMAGE012
 
Figure 950102DEST_PATH_IMAGE024
Figure 131685DEST_PATH_IMAGE013
 
Figure 383675DEST_PATH_IMAGE022
Figure 595082DEST_PATH_IMAGE014
 
Figure 223509DEST_PATH_IMAGE024
 
Figure 72703DEST_PATH_IMAGE023
 
Figure 891940DEST_PATH_IMAGE024
Figure 595585DEST_PATH_IMAGE017
 
Figure 2013100236077100001DEST_PATH_IMAGE025
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 772400DEST_PATH_IMAGE021
Figure 443553DEST_PATH_IMAGE010
Figure 2013100236077100001DEST_PATH_IMAGE026
Figure 492412DEST_PATH_IMAGE011
Figure 503093DEST_PATH_IMAGE022
Figure 782633DEST_PATH_IMAGE012
Figure 252667DEST_PATH_IMAGE026
Figure 964271DEST_PATH_IMAGE013
Figure 891776DEST_PATH_IMAGE023
Figure 172295DEST_PATH_IMAGE014
Figure 880805DEST_PATH_IMAGE015
Figure 928396DEST_PATH_IMAGE025
Figure 549739DEST_PATH_IMAGE016
Figure 620463DEST_PATH_IMAGE026
Figure 736187DEST_PATH_IMAGE017
Figure 2013100236077100001DEST_PATH_IMAGE027
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 451333DEST_PATH_IMAGE022
Figure 243577DEST_PATH_IMAGE010
Figure 2013100236077100001DEST_PATH_IMAGE028
Figure 411385DEST_PATH_IMAGE011
Figure 330799DEST_PATH_IMAGE023
Figure 988231DEST_PATH_IMAGE028
Figure 304123DEST_PATH_IMAGE025
Figure 915233DEST_PATH_IMAGE014
Figure 587752DEST_PATH_IMAGE015
Figure 848969DEST_PATH_IMAGE027
Figure 386578DEST_PATH_IMAGE028
Figure 452492DEST_PATH_IMAGE017
Figure 2013100236077100001DEST_PATH_IMAGE029
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 251820DEST_PATH_IMAGE023
Figure 588255DEST_PATH_IMAGE010
Figure 392001DEST_PATH_IMAGE011
Figure 971066DEST_PATH_IMAGE012
Figure 427587DEST_PATH_IMAGE030
Figure 825070DEST_PATH_IMAGE013
Figure 865576DEST_PATH_IMAGE027
Figure 6707DEST_PATH_IMAGE014
Figure 317734DEST_PATH_IMAGE030
Figure 886119DEST_PATH_IMAGE015
Figure 408062DEST_PATH_IMAGE029
Figure 290567DEST_PATH_IMAGE016
Figure 705368DEST_PATH_IMAGE030
Figure 460965DEST_PATH_IMAGE017
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 272801DEST_PATH_IMAGE025
Figure 755735DEST_PATH_IMAGE010
Figure 2013100236077100001DEST_PATH_IMAGE032
Figure 103671DEST_PATH_IMAGE011
Figure 951541DEST_PATH_IMAGE027
Figure 188356DEST_PATH_IMAGE012
Figure 474981DEST_PATH_IMAGE032
Figure 615107DEST_PATH_IMAGE013
Figure 961774DEST_PATH_IMAGE029
Figure 374301DEST_PATH_IMAGE014
Figure 448305DEST_PATH_IMAGE032
Figure 960506DEST_PATH_IMAGE031
Figure 922646DEST_PATH_IMAGE016
Figure 488757DEST_PATH_IMAGE032
Figure 842290DEST_PATH_IMAGE017
Figure 530760DEST_PATH_IMAGE018
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 730928DEST_PATH_IMAGE027
Figure 897467DEST_PATH_IMAGE010
Figure 2013100236077100001DEST_PATH_IMAGE033
Figure 629143DEST_PATH_IMAGE011
Figure 426197DEST_PATH_IMAGE029
Figure 97350DEST_PATH_IMAGE012
Figure 156890DEST_PATH_IMAGE013
Figure 436431DEST_PATH_IMAGE031
Figure 532563DEST_PATH_IMAGE014
Figure 40904DEST_PATH_IMAGE033
Figure 984721DEST_PATH_IMAGE015
Figure 185895DEST_PATH_IMAGE018
Figure 86767DEST_PATH_IMAGE016
Figure 398799DEST_PATH_IMAGE033
Figure 197122DEST_PATH_IMAGE017
Figure 569198DEST_PATH_IMAGE020
, polytomy variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 951506DEST_PATH_IMAGE029
Figure 2013100236077100001DEST_PATH_IMAGE034
Figure 720059DEST_PATH_IMAGE011
Figure 263036DEST_PATH_IMAGE031
Figure 867062DEST_PATH_IMAGE012
Figure 293812DEST_PATH_IMAGE013
Figure 7690DEST_PATH_IMAGE018
Figure 759800DEST_PATH_IMAGE034
Figure 370910DEST_PATH_IMAGE015
Figure 272001DEST_PATH_IMAGE020
Figure 601351DEST_PATH_IMAGE016
Figure 840397DEST_PATH_IMAGE034
Figure 571593DEST_PATH_IMAGE017
Figure 830536DEST_PATH_IMAGE021
, set encryption parameter
Figure 132335DEST_PATH_IMAGE002
Figure 32213DEST_PATH_IMAGE004
Figure 258795DEST_PATH_IMAGE005
Figure 294381DEST_PATH_IMAGE008
With
Figure 206711DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 732371DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100236077100001DEST_PATH_IMAGE035
Carry out H1=
Figure 824009DEST_PATH_IMAGE019
Figure 330077DEST_PATH_IMAGE011
Figure 2013100236077100001DEST_PATH_IMAGE037
Figure 36411DEST_PATH_IMAGE013
Figure 588746DEST_PATH_IMAGE014
Figure 462899DEST_PATH_IMAGE019
Figure 398363DEST_PATH_IMAGE015
Figure 667670DEST_PATH_IMAGE016
Figure 97830DEST_PATH_IMAGE017
Figure 2013100236077100001DEST_PATH_IMAGE040
Polytomy variable circulates cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 197504DEST_PATH_IMAGE035
Carry out H1=
Figure 524580DEST_PATH_IMAGE036
Figure 120515DEST_PATH_IMAGE010
Figure 329780DEST_PATH_IMAGE019
Figure 170828DEST_PATH_IMAGE011
Figure 414728DEST_PATH_IMAGE037
Figure 181564DEST_PATH_IMAGE012
Figure 81387DEST_PATH_IMAGE019
Figure 709815DEST_PATH_IMAGE013
Figure 558953DEST_PATH_IMAGE038
Figure 247423DEST_PATH_IMAGE014
Figure 50349DEST_PATH_IMAGE015
Figure 268841DEST_PATH_IMAGE039
Figure 550098DEST_PATH_IMAGE019
Figure 775455DEST_PATH_IMAGE017
Figure 786136DEST_PATH_IMAGE040
Polytomy variable carries out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while circulating cryptographic calculation, next polytomy variable circulation cryptographic calculation is pointed to H2=
Figure 2013100236077100001DEST_PATH_IMAGE041
Figure 629458DEST_PATH_IMAGE010
Figure 811095DEST_PATH_IMAGE011
Figure 2013100236077100001DEST_PATH_IMAGE042
Figure 4179DEST_PATH_IMAGE012
Figure 956086DEST_PATH_IMAGE024
Figure 336252DEST_PATH_IMAGE013
Figure 163131DEST_PATH_IMAGE043
Figure 148405DEST_PATH_IMAGE014
Figure 520480DEST_PATH_IMAGE024
Figure 138675DEST_PATH_IMAGE015
Figure 628299DEST_PATH_IMAGE044
Figure 281129DEST_PATH_IMAGE016
Figure 341686DEST_PATH_IMAGE045
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100236077100001DEST_PATH_IMAGE046
Carry out H2=
Figure 176918DEST_PATH_IMAGE041
Figure 140064DEST_PATH_IMAGE010
Figure 982118DEST_PATH_IMAGE024
Figure 377327DEST_PATH_IMAGE011
Figure 4749DEST_PATH_IMAGE042
Figure 889528DEST_PATH_IMAGE012
Figure 916314DEST_PATH_IMAGE013
Figure 647509DEST_PATH_IMAGE043
Figure 590604DEST_PATH_IMAGE015
Figure 176306DEST_PATH_IMAGE044
Figure 215937DEST_PATH_IMAGE016
Figure 205365DEST_PATH_IMAGE024
Figure 137547DEST_PATH_IMAGE017
Figure 515439DEST_PATH_IMAGE045
Polytomy variable carries out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while circulating cryptographic calculation, next polytomy variable circulation cryptographic calculation is pointed to H3=
Figure 552403DEST_PATH_IMAGE010
Figure 78062DEST_PATH_IMAGE026
Figure 235505DEST_PATH_IMAGE011
Figure 2013100236077100001DEST_PATH_IMAGE048
Figure 717171DEST_PATH_IMAGE012
Figure 551135DEST_PATH_IMAGE026
Figure 881534DEST_PATH_IMAGE013
Figure 2013100236077100001DEST_PATH_IMAGE049
Figure 826356DEST_PATH_IMAGE014
Figure 241157DEST_PATH_IMAGE026
Figure 495290DEST_PATH_IMAGE015
Figure 995541DEST_PATH_IMAGE016
Figure 494787DEST_PATH_IMAGE026
Figure 764094DEST_PATH_IMAGE017
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polytomy variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 251445DEST_PATH_IMAGE001
Carry out polytomy variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100236077A 2013-01-22 2013-01-22 Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark Pending CN103116797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100236077A CN103116797A (en) 2013-01-22 2013-01-22 Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100236077A CN103116797A (en) 2013-01-22 2013-01-22 Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103116797A true CN103116797A (en) 2013-05-22

Family

ID=48415167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100236077A Pending CN103116797A (en) 2013-01-22 2013-01-22 Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103116797A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国 等: "《密码学导引》", 30 April 1999, article "密码学导引", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130522