CN106427279A - Multi-information encryption certificate anti-counterfeit printing method - Google Patents
Multi-information encryption certificate anti-counterfeit printing method Download PDFInfo
- Publication number
- CN106427279A CN106427279A CN201610849146.2A CN201610849146A CN106427279A CN 106427279 A CN106427279 A CN 106427279A CN 201610849146 A CN201610849146 A CN 201610849146A CN 106427279 A CN106427279 A CN 106427279A
- Authority
- CN
- China
- Prior art keywords
- binary
- group
- control variable
- counterfeiting information
- binary system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/305—Associated digital information
Abstract
The invention provides a multi-information encryption certificate anti-counterfeit printing method. According to the method, binary modulating signals can be generated by binary anti-counterfeit information through layering encryption and channel coding, the anti-counterfeit information is changed in order in an amplitude modulation net dot shape to be embedded in a whole certificate webpage in a circulating table look-up method modulation manner, the anti-counterfeit information can be recognized from any fragment during certificate recognition, and the method can be used in certificate anti-counterfeit printing.
Description
Technical field:
The present invention relates to a kind of certificate false proof printing technology, particularly a kind of multiple information encryption certificate false proof printing process, should
Certificate false proof printing technology can be used in the anti-counterfeit printing of the certificate of various face amounts.
Background technology:
Certificate serves to demonstrate how certificate and the file of identity, experience etc., as resident identification card, passport, employee's card, student's identity card, finishes
Industry card etc., the fraud of various forms of certificates brings serious threat to society and the people, and certificate false proof technology is main
There are digital encryption, digital watermarking, laser anti-false sign, cipher counterfeit-proof labeling, texture anti-fake, biological identification technology etc., with
The development of science and technology, certificate is forged means and is also improved continuous, and simple certificate false proof technology can not meet certificate
False proof needs, it is necessary to constantly lift certificate false proof technology, could be protected the legitimate interests of society and the people, maintain the steady of society
Determine and safety.
Content of the invention:
In order to improve reliability and the safety of certificate false proof, the present invention is directed to the deficiency of existing certificate false proof presence to existing card
Part anti-counterfeiting technology has carried out improving the certificate false proof technology it is proposed that a kind of binary system coded signal modulates amplitude shape,
The change by amplitude shape during certificate is printed for this certificate false proof technology, by anti-counterfeiting information with binary system coded signal shape
Formula is embedded in the whole certificate page, can identify anti-counterfeiting information when certificate identifies, therefore have very from any one fragment
Disguise and crush resistance by force.
The technical solution adopted for the present invention to solve the technical problems is:First line number is entered to image and character anti-counterfeiting information
Wordization is processed, and generates 8 one group of binary system anti-counterfeiting information table using image and character anti-counterfeiting information, for preventing in ciphering process
Produce information spillover, 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 16 one group of binary systems
Anti-counterfeiting information, generates the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, by 16 one group binary system anti-counterfeiting information table
In i-th group of 16 binary system anti-counterfeiting information be denoted as Ni, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as C, plus
Close parameter C is the bigit of 0 C 255, and binary operator control variable is denoted as k, and binary operator control variable k is 0
The bigit of k 7, operatorUsing+,-, ×, tetra- kinds of operators of ÷, binary operator control variable k=0
WhenBe defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, binary operator control become
During amount k=2Be respectively defined as-, ÷ ,+, during binary operator control variable k=3Point
Be not defined as+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, ×,
+, ÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+,
÷ ,-, ÷, during binary operator control variable k=6Be respectively defined as+, × ,+,
÷ ,-, ÷ ,+, during binary operator control variable k=7Be respectively defined as+
, × ,+, ÷ ,-, ÷ ,+, ×, by i-th group of 16 binary add tight defense in 16 one group binary system encryption anti-fake information table
Fake information is denoted as Ni, during binary operator control variable k=0, multicomponent layer-granulated cryptographic calculation formula is defined as, binary system
During operator control variable k=1, multicomponent layer-granulated cryptographic calculation formula is defined as, binary operator control variable k
When=2, multicomponent layer-granulated cryptographic calculation formula is defined as, polynary during binary operator control variable k=3
Layered encryption operational formula is defined as, polynary point during binary operator control variable k=4
Layer cryptographic calculation formula is defined as, polynary during binary operator control variable k=5
Layered encryption operational formula is defined as, binary operator control variable k
When=6, multicomponent layer-granulated cryptographic calculation formula is defined as, binary system
During operator control variable k=7, multicomponent layer-granulated cryptographic calculation formula is defined as, set the initial value of encryption parameter C, set binary system and calculate
The initial value of symbol control variable k is k=0, sets 16 binary system anti-counterfeiting information N in 16 one group binary system anti-counterfeiting information tableiPosition
Put control variable i=1, first group 16 binary system anti-counterfeiting information N from 16 one group binary system anti-counterfeiting information table1Start, circulation
Using above-mentioned eight kinds different cryptographic calculation formula to 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table
It is encrypted computing, and carries out i+1 and k+1 computing while cryptographic calculation each time, with the value change of i and k, lead to
Cross and each group of 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table are encrypted with computing, generate and 16
The corresponding 16 one group binary system encryption anti-fake information table of one group of position binary system anti-counterfeiting information table, to amplitude in certificate printing
Shape be digitized process, amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral 1, the binary system encryption anti-fake information using 16 group generating passes through circulation in document printing process
Look-up table modulates the amplitude on the certificate page, makes the amplitude on the certificate page regular according to above two amplitude modulation
The shape of site is changed, and on the certificate page after modulation, adjacent 16 amplitudes constitute the false proof letter of one group of 16 binary system
Breath is so that carry anti-counterfeiting information by the change of amplitude shape on the certificate page, and so that this anti-counterfeiting information is embedded in entirely
In certificate page site, realize certificate false proof.By in the certificate page non-obvious embed extractible anti-counterfeiting information, can
It is that true certificate provides valid certificates, there is stronger anti-forgery ability simultaneously, and do not increase extra anti-counterfeiting cost.
For solving above-mentioned technical problem, anti-counterfeiting information is digitized processing first, generates 8 one group of binary system
Anti-counterfeiting information table, anti-counterfeiting information can be image information and Word message information, by 8 one group in binary system anti-counterfeiting information table
Binary system anti-counterfeiting information expands to 16 one group of binary system anti-counterfeiting information, and 16 one group of binary systems that generation most-significant byte is all 0 are false proof
16 binary system anti-counterfeiting information of each of 16 one group binary system anti-counterfeiting information table are carried out layered encryption fortune by information table
Calculate, generate 16 one group of binary system encryption anti-fake information table, using 16 binary systems in binary system encryption anti-fake information table
Encryption anti-fake information, through chnnel coding, generates the binary modulated signal of 16 group with error detecting and error correcting function, letter
Road coding can be changed the line map certificate page original continuous as letter using loop coding, convolutional encoding or Turbo coding various ways
Number through rasterizing process(RIP)Export halftoning hybrid screening picture signal with hybrid screening, including amplitude and
FM screened image signal, using the 16 one group of binary modulated signals generating using circulation look-up table modulation system modulation half
The shape of amplitude in tone hybrid screening picture signal, make the shape of amplitude according toWithRegular generation
Change, make adjacent 16 amplitudes in halftoning hybrid screening picture signal carry 16 binary adds by the change of shape
Tight defense fake information, thus generating the halftoning hybrid screening picture signal of embedded anti-counterfeiting information in whole certificate page site,
Realize the anti-counterfeit printing of certificate.
When extracting anti-counterfeiting information, gather certificate page halftone dot image signal first, through the shape to amplitude
Fuzzy diagnosis, differentiates the shape of amplitude, extracts edge signal and the shape information of amplitude, demodulates certificate page amplitude modulation
The shape information of site, the binary modulated signal of 16 one group of output, the binary modulated to 16 group of demodulation output
Signal carries out channel decoding, recovers to generate binary system deciphering anti-counterfeiting information table after channel decoding.
Binary system is deciphered 16 binary informations in anti-counterfeiting information table and is denoted as Hi, by ciphering process, extensive
In the binary system deciphering anti-counterfeiting information table of repetitive generation, multicomponent layer-granulated deciphering computing during binary operator control variable k=0 is, during binary operator control variable k=1 multicomponent layer-granulated deciphering computing be, two enter
During operator control variable k=2 processed multicomponent layer-granulated deciphering computing be, binary operator control change
Measuring multicomponent layer-granulated deciphering computing during k=3 is, during binary operator control variable k=4
Multicomponent layer-granulated deciphering computing be, many during binary operator control variable k=5
Computing is deciphered in unit's layering, binary operator control variable k=6
When multicomponent layer-granulated deciphering computing be, binary operator control
During variable k=7 processed multicomponent layer-granulated deciphering computing be, the binary system solution generating after decoding, will be recovered
16 binary informations H in tight defense fake information tableiPosition control initial guess be set as i=1, binary operator control variable
Initial value design is k=0, first group of H from the binary system deciphering anti-counterfeiting information table recovering to generate1Start, recover to generate two are entered
Each group of 16 binary informations in system deciphering anti-counterfeiting information table carry out multicomponent layer-granulated deciphering computing accordingly, solve binary system
Anti-counterfeiting information Ni, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, remove most-significant byte, recover to generate 8 one group
Binary system anti-counterfeiting information table, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 loads anti-counterfeiting information flow chart.
Fig. 2 extracts anti-counterfeiting information flow chart.
Specific embodiment
In loading anti-counterfeiting information flow process Fig. 1, original anti-counterfeiting information(Image, word)Encrypted, generate the two of 8 one group
System anti-counterfeiting information table, 8 one group of binary informations in binary system anti-counterfeiting information table are expanded to 16 one group of binary system letters
Breath, generates the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, i-th group in 16 one group binary system anti-counterfeiting information table
16 binary informations are denoted as Ni, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as C, and encryption parameter C is 0 C
255 bigit, binary operator control variable is denoted as k, and binary operator control variable k is the two of 0 k 7 to enter
Integer processed, operatorUsing+,-, ×, tetra- kinds of operators of ÷, binary operator
During control variable k=0Be defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, binary system
During operator control variable k=2Be respectively defined as-, ÷ ,+, during binary operator control variable k=3Be respectively defined as+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+, ÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-, ÷, during binary operator control variable k=6Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, binary operator control variable k=7
WhenBe respectively defined as+, × ,+, ÷ ,-, ÷ ,+, ×, binary operator
During control variable k=0, multicomponent layer-granulated cryptographic calculation formula is defined as, polynary point during binary operator control variable k=1
Layer cryptographic calculation formula is defined as, during binary operator control variable k=2, multicomponent layer-granulated cryptographic calculation is public
Formula is defined as, during binary operator control variable k=3, multicomponent layer-granulated cryptographic calculation formula is defined as, during binary operator control variable k=4, multicomponent layer-granulated cryptographic calculation formula is defined as, multicomponent layer-granulated cryptographic calculation formula definition during binary operator control variable k=5
For, multicomponent layer-granulated cryptographic calculation during binary operator control variable k=6
Formula is defined as, polynary during binary operator control variable k=7
Layered encryption operational formula is defined as, set encryption ginseng
The initial value of number C, sets the initial value of binary operator control variable k as k=0,16 in 16 one group binary system anti-counterfeiting information table of setting
Position binary system anti-counterfeiting information NiPosition control variable i=1, first group 16 two from 16 one group binary system anti-counterfeiting information table
Binary information N1Start, circulation is using above-mentioned eight kinds different cryptographic calculation formula in 16 one group binary system anti-counterfeiting information table
16 binary system anti-counterfeiting information are encrypted computing, and carry out i+1 and k+1 computing while cryptographic calculation each time, with
The value change of i and k, by carrying out to each group of 16 binary informations in 16 one group binary system anti-counterfeiting information table adding
Close computing, generates 16 one group binary system encryption anti-fake information table corresponding with 16 one group binary system anti-counterfeiting information table, verifies
In part printing, the shape of amplitude is digitized processing, and amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral 1, using the binary system encryption of 16 group generating in document printing process
Anti-counterfeiting information passes through to circulate the amplitude that look-up table is modulated on the certificate page, makes the amplitude on the certificate page regular
Shape according to above two amplitude is changed, and on the certificate page after modulation, adjacent 16 amplitudes constitute one group 16
Position binary system anti-counterfeiting information is so that carry anti-counterfeiting information by the change of amplitude shape on the certificate page, and makes this false proof
Information is embedded in whole certificate page site, realizes certificate false proof printing.
In extracting anti-counterfeiting information flow process Fig. 2, when extracting anti-counterfeiting information, collection certificate page halftone dot image letter first
Number, through the fuzzy diagnosis to the shape of amplitude, differentiate the shape of amplitude, extract amplitude edge signal and
Shape information, the shape information of demodulation certificate page amplitude, the binary modulated signal of 16 one group of output, defeated to demodulating
The binary modulated signal of 16 group going out carries out channel decoding, recovers to generate the binary system false proof letter of deciphering after channel decoding
Breath table.
Binary system is deciphered 16 binary informations in anti-counterfeiting information table and is denoted as Hi, by ciphering process, extensive
In the binary system deciphering anti-counterfeiting information table of repetitive generation, multicomponent layer-granulated deciphering computing during binary operator control variable k=0 is, during binary operator control variable k=1 multicomponent layer-granulated deciphering computing be, two enter
During operator control variable k=2 processed multicomponent layer-granulated deciphering computing be, binary operator control change
Measuring multicomponent layer-granulated deciphering computing during k=3 is, during binary operator control variable k=4
Multicomponent layer-granulated deciphering computing be, many during binary operator control variable k=5
Computing is deciphered in unit's layering, binary operator control variable k=6
When multicomponent layer-granulated deciphering computing be, binary operator control
During variable k=7 processed multicomponent layer-granulated deciphering computing be, the binary system solution generating after decoding, will be recovered
16 binary informations H in tight defense fake information tableiPosition control initial guess be set as i=1, binary operator control variable
Initial value design is k=0, first group of H from the binary system deciphering anti-counterfeiting information table recovering to generate1Start, recover to generate two are entered
16 binary informations of in processed group of anti-counterfeiting information table each group carry out multicomponent layer-granulated deciphering computing accordingly, solve binary system and prevent
Fake information Ni, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, remove most-significant byte, recover to generate 8 one group
Binary system anti-counterfeiting information table, recovers anti-counterfeiting signal and exports anti-counterfeiting information.
Claims (1)
1. anti-counterfeiting information is passed through cryptographic calculation and chnnel coding and generates binary modulated signal by one kind, and is tabled look-up tune by circulation
Anti-counterfeiting information is embedded in the multiple information encryption certificate false proof printing process in full page by mode processed, it is characterized in that:To anti-
Fake information is digitized, and generates 8 one group of binary system anti-counterfeiting information table, anti-counterfeiting information is image information and Word message,
For preventing from producing information spillover in ciphering process, by 8 one group of binary system anti-counterfeiting information extensions in binary system anti-counterfeiting information table
For 16 one group of binary system anti-counterfeiting information, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, by 16 one group
I-th group of 16 binary system anti-counterfeiting information in binary system anti-counterfeiting information table are denoted as Ni, i is the positive integer more than 0, eight-digit binary number
Encryption parameter is denoted as C, and encryption parameter C is the bigit of 0 C 255, and binary operator control variable is denoted as k, binary system
Operator control variable k is the bigit of 0 k 7, operatorUsing+,-, ×, tetra- kinds of operators of ÷, binary operator control variable k=0
WhenBe defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, binary operator control become
During amount k=2Be respectively defined as-, ÷ ,+, during binary operator control variable k=3Point
Be not defined as+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, ×,
+, ÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+,
÷ ,-, ÷, during binary operator control variable k=6Be respectively defined as+, × ,+,
÷ ,-, ÷ ,+, during binary operator control variable k=7Be respectively defined as+
, × ,+, ÷ ,-, ÷ ,+, ×, by i-th group of 16 binary add tight defense in 16 one group binary system encryption anti-fake information table
Fake information is denoted as Ni, during binary operator control variable k=0, multicomponent layer-granulated cryptographic calculation formula is defined as, binary system
During operator control variable k=1, multicomponent layer-granulated cryptographic calculation formula is defined as, binary operator control variable k
When=2, multicomponent layer-granulated cryptographic calculation formula is defined as, polynary during binary operator control variable k=3
Layered encryption operational formula is defined as, polynary point during binary operator control variable k=4
Layer cryptographic calculation formula is defined as, polynary during binary operator control variable k=5
Layered encryption operational formula is defined as, binary operator control variable k
When=6, multicomponent layer-granulated cryptographic calculation formula is defined as, binary system
During operator control variable k=7, multicomponent layer-granulated cryptographic calculation formula is defined as, set the initial value of encryption parameter C, set binary system and calculate
The initial value of symbol control variable k is k=0, sets 16 binary system anti-counterfeiting information N in 16 one group binary system anti-counterfeiting information tableiPosition
Put control variable i=1, first group 16 binary system anti-counterfeiting information N from 16 one group binary system anti-counterfeiting information table1Start, circulation
Using above-mentioned eight kinds different cryptographic calculation formula to 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table
It is encrypted computing, and carries out i+1 and k+1 computing while cryptographic calculation each time, with the value change of i and k, lead to
Cross and each group of 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table are encrypted with computing, generate and 16
The corresponding 16 one group binary system encryption anti-fake information table of one group of position binary system anti-counterfeiting information table, to amplitude in certificate printing
Shape be digitized process, amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral 1, the binary system encryption anti-fake information using 16 group generating passes through circulation in document printing process
Look-up table modulates the amplitude on the certificate page, makes the amplitude on the certificate page regular according to above two amplitude modulation
The shape of site is changed, and on the certificate page after modulation, adjacent 16 amplitudes constitute the false proof letter of one group of 16 binary system
Breath is so that carry anti-counterfeiting information by the change of amplitude shape on the certificate page, and so that this anti-counterfeiting information is embedded in entirely
In certificate page site, realize certificate false proof.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610849146.2A CN106427279A (en) | 2016-09-25 | 2016-09-25 | Multi-information encryption certificate anti-counterfeit printing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610849146.2A CN106427279A (en) | 2016-09-25 | 2016-09-25 | Multi-information encryption certificate anti-counterfeit printing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106427279A true CN106427279A (en) | 2017-02-22 |
Family
ID=58169367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610849146.2A Pending CN106427279A (en) | 2016-09-25 | 2016-09-25 | Multi-information encryption certificate anti-counterfeit printing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106427279A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1424690A (en) * | 2003-01-20 | 2003-06-18 | 天津市阿波罗信息技术有限公司 | Network screen encoded anti-fakery method |
CA2554674A1 (en) * | 2004-02-06 | 2005-08-25 | Signoptic Technologies | Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information |
CN101219614A (en) * | 2007-01-08 | 2008-07-16 | 郑阿奇 | Method for setting false proof making in printed matter |
CN101699845A (en) * | 2009-10-20 | 2010-04-28 | 北京印刷学院 | Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter |
CN101777134A (en) * | 2010-03-01 | 2010-07-14 | 北京印刷学院 | Presswork encryption security printing technology based on multi-system quadrature amplitude modulation |
CN102225671A (en) * | 2011-04-14 | 2011-10-26 | 北京印刷学院 | Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal |
CN102402696A (en) * | 2011-04-25 | 2012-04-04 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals |
-
2016
- 2016-09-25 CN CN201610849146.2A patent/CN106427279A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1424690A (en) * | 2003-01-20 | 2003-06-18 | 天津市阿波罗信息技术有限公司 | Network screen encoded anti-fakery method |
CA2554674A1 (en) * | 2004-02-06 | 2005-08-25 | Signoptic Technologies | Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information |
CN101219614A (en) * | 2007-01-08 | 2008-07-16 | 郑阿奇 | Method for setting false proof making in printed matter |
CN101699845A (en) * | 2009-10-20 | 2010-04-28 | 北京印刷学院 | Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter |
CN101777134A (en) * | 2010-03-01 | 2010-07-14 | 北京印刷学院 | Presswork encryption security printing technology based on multi-system quadrature amplitude modulation |
CN102225671A (en) * | 2011-04-14 | 2011-10-26 | 北京印刷学院 | Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal |
CN102402696A (en) * | 2011-04-25 | 2012-04-04 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals |
Non-Patent Citations (1)
Title |
---|
冯登国: "《密码学导引》", 30 April 1999 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103106427A (en) | Single parameter multiple-encryption anti-counterfeiting information storage trademark | |
CN106427280A (en) | Binary information encryption certificate anti-counterfeit printing method | |
CN106427279A (en) | Multi-information encryption certificate anti-counterfeit printing method | |
CN106427281A (en) | Single-parameter single-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method | |
CN106355622A (en) | Single parameter variable gradient unary layering encrypting binary RMB anti-counterfeiting printing method | |
CN106427286A (en) | Single-parameter single-variable unitary layered encryption type binary anti-counterfeit printing method for Ren Min Bi | |
CN106427282A (en) | Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method | |
CN106355623A (en) | Single-parameter multi-variable binary layering encrypting binary RMB anti-counterfeiting printing method | |
CN106626876A (en) | One-parameter variable transmutation binary layered encryption binary system Ren Min Bi anti-counterfeit printing method | |
CN106427284A (en) | Parametric layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi | |
CN106427283A (en) | Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method | |
CN106183533A (en) | Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process | |
CN106183530A (en) | One-parameter variation transmutation multivariable layered encryption binary system RMB anti-counterfeiting printing process | |
CN106626875A (en) | Single-parameter multi-variable unary layered encryption binary Renminbi anti-counterfeit printing method | |
CN106427285A (en) | Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi | |
CN102945403B (en) | Binary anti-counterfeit printing method based on transposition order-change | |
CN106274136A (en) | Parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process | |
CN106183534A (en) | Parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process | |
CN106218262A (en) | One-parameter univariable ternary layered encryption binary system RMB anti-counterfeiting printing process | |
CN106183532A (en) | One-parameter univariate binary layered encryption binary system RMB anti-counterfeiting printing process | |
CN106183531A (en) | Parameter layering gradient binary encrypted binary RMB anti-counterfeiting printing process | |
CN106183535A (en) | One-parameter multivariate ternary layered encryption binary system RMB anti-counterfeiting printing process | |
CN106218263A (en) | Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process | |
CN102945407B (en) | Single-parameter first-order encrypted binary anti-counterfeiting printing method | |
CN103942590A (en) | One-parameter multi-element circulation encryption anti-fake information storage trademark |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |