CN103106439A - Multiparameter multivariable binary encryption anti-fake information storage trademark - Google Patents

Multiparameter multivariable binary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106439A
CN103106439A CN2013100224116A CN201310022411A CN103106439A CN 103106439 A CN103106439 A CN 103106439A CN 2013100224116 A CN2013100224116 A CN 2013100224116A CN 201310022411 A CN201310022411 A CN 201310022411A CN 103106439 A CN103106439 A CN 103106439A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100224116A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100224116A priority Critical patent/CN103106439A/en
Publication of CN103106439A publication Critical patent/CN103106439A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a multiparameter multivariable binary encryption anti-fake information storage trademark. The multiparameter multivariable binary encryption anti-fake information storage trademark can process binary anti-fake information to generate binary modulation signals through binary encryption and channel coding. The anti-fake information is embedded in a whole trademark page through orderly change of amplitude-modulated dot conductivity with a circular table lookup modulation mode method. The anti-fake information can be identified from any fragment at the time of trademark identification and the multiparameter multivariable binary encryption anti-fake information storage trademark can be used for all kinds of anti-fake trademarks.

Description

Multiparameter multivariable binary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multiparameter multivariable binary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 208615DEST_PATH_IMAGE004
Figure 22987DEST_PATH_IMAGE005
Figure 907766DEST_PATH_IMAGE006
Figure 237116DEST_PATH_IMAGE007
Figure 498333DEST_PATH_IMAGE008
With
Figure 229529DEST_PATH_IMAGE009
, encryption parameter
Figure 222893DEST_PATH_IMAGE002
Figure 45399DEST_PATH_IMAGE003
Figure 430429DEST_PATH_IMAGE005
Figure 922591DEST_PATH_IMAGE006
Figure 226533DEST_PATH_IMAGE007
Figure 563973DEST_PATH_IMAGE008
WithFor 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 599614DEST_PATH_IMAGE012
Figure 159909DEST_PATH_IMAGE013
Figure 6828DEST_PATH_IMAGE015
Figure 951650DEST_PATH_IMAGE016
Figure 366451DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 371316DEST_PATH_IMAGE010
Figure 372080DEST_PATH_IMAGE012
Figure 844649DEST_PATH_IMAGE013
Figure 20416DEST_PATH_IMAGE014
Figure 7963DEST_PATH_IMAGE015
Figure 294588DEST_PATH_IMAGE016
Figure 418402DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 765070DEST_PATH_IMAGE010
Figure 177596DEST_PATH_IMAGE011
Figure 267912DEST_PATH_IMAGE012
Figure 511812DEST_PATH_IMAGE013
Figure 763801DEST_PATH_IMAGE014
Figure 725941DEST_PATH_IMAGE015
Figure 354369DEST_PATH_IMAGE016
Figure 656037DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 78928DEST_PATH_IMAGE010
Figure 528364DEST_PATH_IMAGE011
Figure 960482DEST_PATH_IMAGE012
Figure 778626DEST_PATH_IMAGE014
Figure 449779DEST_PATH_IMAGE015
Figure 685588DEST_PATH_IMAGE016
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 788859DEST_PATH_IMAGE010
Figure 884991DEST_PATH_IMAGE011
Figure 648734DEST_PATH_IMAGE013
Figure 849908DEST_PATH_IMAGE014
Figure 495653DEST_PATH_IMAGE015
Figure 807685DEST_PATH_IMAGE016
Figure 855276DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 165034DEST_PATH_IMAGE010
Figure 298075DEST_PATH_IMAGE011
Figure 315896DEST_PATH_IMAGE013
Figure 858873DEST_PATH_IMAGE014
Figure 207771DEST_PATH_IMAGE015
Figure 64869DEST_PATH_IMAGE016
Figure 821472DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 535350DEST_PATH_IMAGE010
Figure 642984DEST_PATH_IMAGE011
Figure 100510DEST_PATH_IMAGE012
Figure 711620DEST_PATH_IMAGE013
Figure 861978DEST_PATH_IMAGE014
Figure 191329DEST_PATH_IMAGE015
Figure 390229DEST_PATH_IMAGE016
Figure 855845DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 993751DEST_PATH_IMAGE011
Figure 793080DEST_PATH_IMAGE012
Figure 378782DEST_PATH_IMAGE013
Figure 870943DEST_PATH_IMAGE014
Figure 351384DEST_PATH_IMAGE015
Figure 954404DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 995358DEST_PATH_IMAGE010
Figure 786597DEST_PATH_IMAGE011
Figure 488022DEST_PATH_IMAGE013
Figure 56407DEST_PATH_IMAGE014
Figure 334941DEST_PATH_IMAGE015
Figure 279764DEST_PATH_IMAGE016
Figure 694565DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 699430DEST_PATH_IMAGE018
Figure 137364DEST_PATH_IMAGE010
Figure 450376DEST_PATH_IMAGE019
Figure 985263DEST_PATH_IMAGE011
Figure 882998DEST_PATH_IMAGE012
Figure 2013100224116100002DEST_PATH_IMAGE020
Figure 231939DEST_PATH_IMAGE013
Figure 621332DEST_PATH_IMAGE021
Figure 968000DEST_PATH_IMAGE014
Figure 505161DEST_PATH_IMAGE015
Figure 329897DEST_PATH_IMAGE023
Figure 573797DEST_PATH_IMAGE016
Figure 2013100224116100002DEST_PATH_IMAGE024
Figure 91366DEST_PATH_IMAGE017
Figure 53505DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 937060DEST_PATH_IMAGE019
Figure 2013100224116100002DEST_PATH_IMAGE026
Figure 339911DEST_PATH_IMAGE012
Figure 558403DEST_PATH_IMAGE018
Figure 417775DEST_PATH_IMAGE013
Figure 88927DEST_PATH_IMAGE021
Figure 324737DEST_PATH_IMAGE014
Figure 397735DEST_PATH_IMAGE022
Figure 365691DEST_PATH_IMAGE015
Figure 225565DEST_PATH_IMAGE024
Figure 426740DEST_PATH_IMAGE017
Figure 66625DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 378658DEST_PATH_IMAGE019
Figure 426248DEST_PATH_IMAGE010
Figure 798324DEST_PATH_IMAGE026
Figure 931365DEST_PATH_IMAGE011
Figure 47088DEST_PATH_IMAGE018
Figure 949185DEST_PATH_IMAGE012
Figure 492162DEST_PATH_IMAGE020
Figure 766335DEST_PATH_IMAGE018
Figure 522938DEST_PATH_IMAGE014
Figure 174499DEST_PATH_IMAGE022
Figure 282132DEST_PATH_IMAGE015
Figure 739659DEST_PATH_IMAGE023
Figure 501127DEST_PATH_IMAGE024
Figure 23287DEST_PATH_IMAGE017
Figure 18925DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 687804DEST_PATH_IMAGE019
Figure 9064DEST_PATH_IMAGE010
Figure 747082DEST_PATH_IMAGE026
Figure 811990DEST_PATH_IMAGE011
Figure 624274DEST_PATH_IMAGE012
Figure 928216DEST_PATH_IMAGE018
Figure 909127DEST_PATH_IMAGE021
Figure 572190DEST_PATH_IMAGE014
Figure 97849DEST_PATH_IMAGE018
Figure 522138DEST_PATH_IMAGE015
Figure 82432DEST_PATH_IMAGE023
Figure 650817DEST_PATH_IMAGE016
Figure 991668DEST_PATH_IMAGE024
Figure 874174DEST_PATH_IMAGE017
Figure 288974DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 528512DEST_PATH_IMAGE010
Figure 277025DEST_PATH_IMAGE026
Figure 659782DEST_PATH_IMAGE020
Figure 709646DEST_PATH_IMAGE012
Figure 996271DEST_PATH_IMAGE021
Figure 732332DEST_PATH_IMAGE018
Figure 879279DEST_PATH_IMAGE014
Figure 969595DEST_PATH_IMAGE022
Figure 219354DEST_PATH_IMAGE015
Figure 736923DEST_PATH_IMAGE018
Figure 699063DEST_PATH_IMAGE016
Figure 114367DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 298223DEST_PATH_IMAGE019
Figure 730342DEST_PATH_IMAGE010
Figure 745888DEST_PATH_IMAGE011
Figure 449588DEST_PATH_IMAGE012
Figure 490542DEST_PATH_IMAGE013
Figure 422912DEST_PATH_IMAGE014
Figure 615996DEST_PATH_IMAGE018
Figure 811311DEST_PATH_IMAGE015
Figure 191476DEST_PATH_IMAGE027
Figure 769088DEST_PATH_IMAGE016
Figure 816679DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 171940DEST_PATH_IMAGE019
Figure 74037DEST_PATH_IMAGE010
Figure 617013DEST_PATH_IMAGE026
Figure 237351DEST_PATH_IMAGE011
Figure 913368DEST_PATH_IMAGE012
Figure 627246DEST_PATH_IMAGE021
Figure 175294DEST_PATH_IMAGE013
Figure 632820DEST_PATH_IMAGE022
Figure 509510DEST_PATH_IMAGE014
Figure 394289DEST_PATH_IMAGE023
Figure 723639DEST_PATH_IMAGE015
Figure 716052DEST_PATH_IMAGE016
Figure 771732DEST_PATH_IMAGE024
Figure 659146DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 713056DEST_PATH_IMAGE026
Figure 316075DEST_PATH_IMAGE011
Figure 756284DEST_PATH_IMAGE020
Figure 419346DEST_PATH_IMAGE012
Figure 945006DEST_PATH_IMAGE021
Figure 351716DEST_PATH_IMAGE013
Figure 646431DEST_PATH_IMAGE022
Figure 480395DEST_PATH_IMAGE014
Figure 493351DEST_PATH_IMAGE023
Figure 375856DEST_PATH_IMAGE015
Figure 790657DEST_PATH_IMAGE024
Figure 795522DEST_PATH_IMAGE016
Figure 295773DEST_PATH_IMAGE018
Figure 44286DEST_PATH_IMAGE017
Figure 307734DEST_PATH_IMAGE025
, set encryption parameter
Figure 757673DEST_PATH_IMAGE004
Figure 228155DEST_PATH_IMAGE006
Figure 702998DEST_PATH_IMAGE007
Figure 793314DEST_PATH_IMAGE008
With
Figure 37214DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 554783DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100224116100002DEST_PATH_IMAGE028
Carry out H1=
Figure 313660DEST_PATH_IMAGE029
Figure 879771DEST_PATH_IMAGE010
Figure 243756DEST_PATH_IMAGE019
Figure 932226DEST_PATH_IMAGE011
Figure 116083DEST_PATH_IMAGE029
Figure 548201DEST_PATH_IMAGE012
Figure 772552DEST_PATH_IMAGE020
Figure 631924DEST_PATH_IMAGE013
Figure 240760DEST_PATH_IMAGE021
Figure 283988DEST_PATH_IMAGE022
Figure 472710DEST_PATH_IMAGE023
Figure 21055DEST_PATH_IMAGE025
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 598667DEST_PATH_IMAGE028
Carry out H1=
Figure 380678DEST_PATH_IMAGE029
Figure 752753DEST_PATH_IMAGE010
Figure 885794DEST_PATH_IMAGE019
Figure 1518DEST_PATH_IMAGE011
Figure 588804DEST_PATH_IMAGE012
Figure 862976DEST_PATH_IMAGE013
Figure 619579DEST_PATH_IMAGE021
Figure 661354DEST_PATH_IMAGE014
Figure 441091DEST_PATH_IMAGE022
Figure 898617DEST_PATH_IMAGE015
Figure 775306DEST_PATH_IMAGE023
Figure 660086DEST_PATH_IMAGE016
Figure 989436DEST_PATH_IMAGE024
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2=
Figure 99846DEST_PATH_IMAGE019
Figure 854175DEST_PATH_IMAGE010
Figure 2013100224116100002DEST_PATH_IMAGE030
Figure 721680DEST_PATH_IMAGE011
Figure 432016DEST_PATH_IMAGE026
Figure 924178DEST_PATH_IMAGE012
Figure 565560DEST_PATH_IMAGE013
Figure 271348DEST_PATH_IMAGE021
Figure 668831DEST_PATH_IMAGE014
Figure 460070DEST_PATH_IMAGE022
Figure 601201DEST_PATH_IMAGE015
Figure 161496DEST_PATH_IMAGE023
Figure 995459DEST_PATH_IMAGE016
Figure 8415DEST_PATH_IMAGE024
Figure 953237DEST_PATH_IMAGE017
Figure 362179DEST_PATH_IMAGE025
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 367044DEST_PATH_IMAGE031
Carry out H2=
Figure 804978DEST_PATH_IMAGE019
Figure 287912DEST_PATH_IMAGE010
Figure 947432DEST_PATH_IMAGE030
Figure 123199DEST_PATH_IMAGE011
Figure 110746DEST_PATH_IMAGE026
Figure 805536DEST_PATH_IMAGE013
Figure 280380DEST_PATH_IMAGE021
Figure 932039DEST_PATH_IMAGE022
Figure 146168DEST_PATH_IMAGE023
Figure 774596DEST_PATH_IMAGE016
Figure 748423DEST_PATH_IMAGE017
Figure 197859DEST_PATH_IMAGE025
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 582889DEST_PATH_IMAGE010
Figure 442261DEST_PATH_IMAGE026
Figure 51097DEST_PATH_IMAGE011
Figure 349223DEST_PATH_IMAGE012
Figure 439799DEST_PATH_IMAGE020
Figure 470072DEST_PATH_IMAGE013
Figure 628521DEST_PATH_IMAGE032
Figure 340125DEST_PATH_IMAGE014
Figure 267630DEST_PATH_IMAGE022
Figure 468804DEST_PATH_IMAGE015
Figure 114549DEST_PATH_IMAGE023
Figure 426582DEST_PATH_IMAGE016
Figure 474172DEST_PATH_IMAGE024
Figure 846248DEST_PATH_IMAGE017
Figure 979289DEST_PATH_IMAGE025
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 95012DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, binary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 997109DEST_PATH_IMAGE002
Figure 540086DEST_PATH_IMAGE003
Figure 894844DEST_PATH_IMAGE004
Figure 814259DEST_PATH_IMAGE005
Figure 570862DEST_PATH_IMAGE006
Figure 290599DEST_PATH_IMAGE007
Figure 398233DEST_PATH_IMAGE008
With
Figure 855759DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by binary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 466869DEST_PATH_IMAGE018
Figure 617227DEST_PATH_IMAGE010
Figure 884261DEST_PATH_IMAGE019
Figure 145478DEST_PATH_IMAGE011
Figure 932354DEST_PATH_IMAGE012
Figure 749000DEST_PATH_IMAGE020
Figure 548329DEST_PATH_IMAGE013
Figure 134031DEST_PATH_IMAGE021
Figure 205258DEST_PATH_IMAGE015
Figure 911046DEST_PATH_IMAGE023
Figure 308529DEST_PATH_IMAGE016
Figure 99768DEST_PATH_IMAGE024
Figure 235040DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 579937DEST_PATH_IMAGE010
Figure 524759DEST_PATH_IMAGE018
Figure 939560DEST_PATH_IMAGE011
Figure 944425DEST_PATH_IMAGE026
Figure 444676DEST_PATH_IMAGE012
Figure 927610DEST_PATH_IMAGE018
Figure 372684DEST_PATH_IMAGE021
Figure 297915DEST_PATH_IMAGE014
Figure 584539DEST_PATH_IMAGE022
Figure 973932DEST_PATH_IMAGE015
Figure 320600DEST_PATH_IMAGE023
Figure 795444DEST_PATH_IMAGE016
Figure 249209DEST_PATH_IMAGE024
Figure 10677DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 910500DEST_PATH_IMAGE019
Figure 538928DEST_PATH_IMAGE010
Figure 637334DEST_PATH_IMAGE026
Figure 325804DEST_PATH_IMAGE011
Figure 775240DEST_PATH_IMAGE018
Figure 941779DEST_PATH_IMAGE012
Figure 177849DEST_PATH_IMAGE020
Figure 37220DEST_PATH_IMAGE013
Figure 269225DEST_PATH_IMAGE018
Figure 505034DEST_PATH_IMAGE014
Figure 515716DEST_PATH_IMAGE022
Figure 545989DEST_PATH_IMAGE015
Figure 766754DEST_PATH_IMAGE023
Figure 343272DEST_PATH_IMAGE016
Figure 536356DEST_PATH_IMAGE024
Figure 507909DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 819942DEST_PATH_IMAGE019
Figure 867532DEST_PATH_IMAGE010
Figure 177291DEST_PATH_IMAGE026
Figure 310332DEST_PATH_IMAGE011
Figure 328153DEST_PATH_IMAGE012
Figure 871129DEST_PATH_IMAGE018
Figure 225887DEST_PATH_IMAGE013
Figure 145302DEST_PATH_IMAGE021
Figure 901905DEST_PATH_IMAGE014
Figure 609924DEST_PATH_IMAGE018
Figure 717557DEST_PATH_IMAGE015
Figure 175083DEST_PATH_IMAGE023
Figure 786193DEST_PATH_IMAGE016
Figure 936552DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 930419DEST_PATH_IMAGE019
Figure 251679DEST_PATH_IMAGE010
Figure 867654DEST_PATH_IMAGE011
Figure 453356DEST_PATH_IMAGE020
Figure 524583DEST_PATH_IMAGE013
Figure 157602DEST_PATH_IMAGE018
Figure 758347DEST_PATH_IMAGE014
Figure 284006DEST_PATH_IMAGE022
Figure 690717DEST_PATH_IMAGE015
Figure 375645DEST_PATH_IMAGE018
Figure 944030DEST_PATH_IMAGE016
Figure 222564DEST_PATH_IMAGE024
Figure 167387DEST_PATH_IMAGE017
Figure 582187DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 321473DEST_PATH_IMAGE019
Figure 821725DEST_PATH_IMAGE010
Figure 570238DEST_PATH_IMAGE026
Figure 952995DEST_PATH_IMAGE020
Figure 940542DEST_PATH_IMAGE012
Figure 227167DEST_PATH_IMAGE021
Figure 634138DEST_PATH_IMAGE013
Figure 980806DEST_PATH_IMAGE022
Figure 190070DEST_PATH_IMAGE014
Figure 218069DEST_PATH_IMAGE018
Figure 979538DEST_PATH_IMAGE027
Figure 570105DEST_PATH_IMAGE018
Figure 668511DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 540838DEST_PATH_IMAGE019
Figure 972956DEST_PATH_IMAGE010
Figure 191448DEST_PATH_IMAGE026
Figure 50820DEST_PATH_IMAGE011
Figure 659656DEST_PATH_IMAGE020
Figure 629886DEST_PATH_IMAGE012
Figure 702884DEST_PATH_IMAGE021
Figure 733157DEST_PATH_IMAGE013
Figure 609069DEST_PATH_IMAGE014
Figure 802153DEST_PATH_IMAGE023
Figure 3327DEST_PATH_IMAGE015
Figure 383493DEST_PATH_IMAGE018
Figure 8695DEST_PATH_IMAGE024
Figure 185916DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 301639DEST_PATH_IMAGE018
Figure 203736DEST_PATH_IMAGE010
Figure 746713DEST_PATH_IMAGE026
Figure 367050DEST_PATH_IMAGE011
Figure 20885DEST_PATH_IMAGE020
Figure 43068DEST_PATH_IMAGE012
Figure 870899DEST_PATH_IMAGE014
Figure 749819DEST_PATH_IMAGE023
Figure 79169DEST_PATH_IMAGE015
Figure 340386DEST_PATH_IMAGE024
Figure 9265DEST_PATH_IMAGE016
Figure 64945DEST_PATH_IMAGE018
Figure 881592DEST_PATH_IMAGE017
Figure 946500DEST_PATH_IMAGE025
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 532202DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 409DEST_PATH_IMAGE028
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 603429DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Multiparameter multivariable binary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 140637DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 120094DEST_PATH_IMAGE002
Figure 962148DEST_PATH_IMAGE003
Figure 419674DEST_PATH_IMAGE004
Figure 296363DEST_PATH_IMAGE005
Figure 181143DEST_PATH_IMAGE006
Figure 510493DEST_PATH_IMAGE007
Figure 771710DEST_PATH_IMAGE008
With
Figure 565222DEST_PATH_IMAGE009
, encryption parameter
Figure 620903DEST_PATH_IMAGE002
Figure 375233DEST_PATH_IMAGE003
Figure 174561DEST_PATH_IMAGE004
Figure 760263DEST_PATH_IMAGE005
Figure 252425DEST_PATH_IMAGE006
Figure 573945DEST_PATH_IMAGE007
Figure 911386DEST_PATH_IMAGE008
With
Figure 679490DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 14657DEST_PATH_IMAGE010
Figure 805895DEST_PATH_IMAGE011
Figure 507321DEST_PATH_IMAGE013
Figure 236745DEST_PATH_IMAGE016
Figure 651546DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 156663DEST_PATH_IMAGE011
Figure 639597DEST_PATH_IMAGE012
Figure 112166DEST_PATH_IMAGE013
Figure 287933DEST_PATH_IMAGE014
Figure 275480DEST_PATH_IMAGE015
Figure 562105DEST_PATH_IMAGE016
Figure 691778DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 38446DEST_PATH_IMAGE010
Figure 513290DEST_PATH_IMAGE011
Figure 603606DEST_PATH_IMAGE012
Figure 847505DEST_PATH_IMAGE013
Figure 99495DEST_PATH_IMAGE014
Figure 61635DEST_PATH_IMAGE015
Figure 690062DEST_PATH_IMAGE016
Figure 54047DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 726206DEST_PATH_IMAGE010
Figure 175642DEST_PATH_IMAGE011
Figure 607760DEST_PATH_IMAGE012
Figure 554813DEST_PATH_IMAGE013
Figure 351868DEST_PATH_IMAGE014
Figure 23021DEST_PATH_IMAGE015
Figure 258830DEST_PATH_IMAGE016
Figure 331828DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 362101DEST_PATH_IMAGE010
Figure 159659DEST_PATH_IMAGE013
Figure 360833DEST_PATH_IMAGE014
Figure 318611DEST_PATH_IMAGE016
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 871318DEST_PATH_IMAGE011
Figure 987041DEST_PATH_IMAGE012
Figure 889138DEST_PATH_IMAGE013
Figure 369798DEST_PATH_IMAGE014
Figure 724556DEST_PATH_IMAGE015
Figure 468750DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 120311DEST_PATH_IMAGE010
Figure 227945DEST_PATH_IMAGE011
Figure 446939DEST_PATH_IMAGE014
Figure 776290DEST_PATH_IMAGE015
Figure 37507DEST_PATH_IMAGE016
Figure 503123DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 762066DEST_PATH_IMAGE010
Figure 578712DEST_PATH_IMAGE011
Figure 378041DEST_PATH_IMAGE012
Figure 963743DEST_PATH_IMAGE013
Figure 455904DEST_PATH_IMAGE014
Figure 494268DEST_PATH_IMAGE015
Figure 34970DEST_PATH_IMAGE016
Figure 740758DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 155820DEST_PATH_IMAGE010
Figure 947058DEST_PATH_IMAGE011
Figure 88189DEST_PATH_IMAGE012
Figure 648484DEST_PATH_IMAGE013
Figure 495403DEST_PATH_IMAGE015
Figure 440225DEST_PATH_IMAGE016
Figure 855026DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 797574DEST_PATH_IMAGE018
Figure 297826DEST_PATH_IMAGE010
Figure 780760DEST_PATH_IMAGE019
Figure 315646DEST_PATH_IMAGE011
Figure 225833DEST_PATH_IMAGE018
Figure 213381DEST_PATH_IMAGE012
Figure 500006DEST_PATH_IMAGE020
Figure 889399DEST_PATH_IMAGE013
Figure 236066DEST_PATH_IMAGE021
Figure 716770DEST_PATH_IMAGE014
Figure 785406DEST_PATH_IMAGE015
Figure 302975DEST_PATH_IMAGE023
Figure 265114DEST_PATH_IMAGE016
Figure 893542DEST_PATH_IMAGE017
Figure 2013100224116100001DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 54265DEST_PATH_IMAGE019
Figure 742735DEST_PATH_IMAGE010
Figure 192171DEST_PATH_IMAGE018
Figure 296393DEST_PATH_IMAGE011
Figure 2013100224116100001DEST_PATH_IMAGE026
Figure 577202DEST_PATH_IMAGE012
Figure 170043DEST_PATH_IMAGE013
Figure 472991DEST_PATH_IMAGE014
Figure 503264DEST_PATH_IMAGE022
Figure 599396DEST_PATH_IMAGE015
Figure 107738DEST_PATH_IMAGE023
Figure 501996DEST_PATH_IMAGE024
Figure 147741DEST_PATH_IMAGE017
Figure 459774DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 507364DEST_PATH_IMAGE019
Figure 879439DEST_PATH_IMAGE010
Figure 12481DEST_PATH_IMAGE026
Figure 128204DEST_PATH_IMAGE011
Figure 30301DEST_PATH_IMAGE018
Figure 573278DEST_PATH_IMAGE012
Figure 928036DEST_PATH_IMAGE020
Figure 847450DEST_PATH_IMAGE013
Figure 604054DEST_PATH_IMAGE018
Figure 323791DEST_PATH_IMAGE014
Figure 369108DEST_PATH_IMAGE022
Figure 826634DEST_PATH_IMAGE015
Figure 437744DEST_PATH_IMAGE023
Figure 588102DEST_PATH_IMAGE016
Figure 917452DEST_PATH_IMAGE024
Figure 850773DEST_PATH_IMAGE017
Figure 581969DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 454296DEST_PATH_IMAGE010
Figure 519204DEST_PATH_IMAGE026
Figure 104906DEST_PATH_IMAGE011
Figure 331488DEST_PATH_IMAGE020
Figure 635430DEST_PATH_IMAGE012
Figure 238450DEST_PATH_IMAGE018
Figure 341721DEST_PATH_IMAGE021
Figure 104169DEST_PATH_IMAGE018
Figure 232848DEST_PATH_IMAGE023
Figure 511383DEST_PATH_IMAGE016
Figure 393888DEST_PATH_IMAGE024
Figure 808689DEST_PATH_IMAGE017
Figure 547975DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 48226DEST_PATH_IMAGE019
Figure 796739DEST_PATH_IMAGE010
Figure 66047DEST_PATH_IMAGE026
Figure 241813DEST_PATH_IMAGE011
Figure 229361DEST_PATH_IMAGE020
Figure 515985DEST_PATH_IMAGE012
Figure 843062DEST_PATH_IMAGE021
Figure 398994DEST_PATH_IMAGE018
Figure 489310DEST_PATH_IMAGE014
Figure 733209DEST_PATH_IMAGE022
Figure 256637DEST_PATH_IMAGE015
Figure 156460DEST_PATH_IMAGE018
Figure 847205DEST_PATH_IMAGE016
Figure 945611DEST_PATH_IMAGE024
Figure 755621DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 187739DEST_PATH_IMAGE019
Figure 406231DEST_PATH_IMAGE010
Figure 265602DEST_PATH_IMAGE026
Figure 936755DEST_PATH_IMAGE011
Figure 906985DEST_PATH_IMAGE020
Figure 979984DEST_PATH_IMAGE012
Figure 186034DEST_PATH_IMAGE022
Figure 379118DEST_PATH_IMAGE014
Figure 16511DEST_PATH_IMAGE018
Figure 396677DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE027
Figure 974288DEST_PATH_IMAGE016
Figure 21879DEST_PATH_IMAGE018
Figure 393954DEST_PATH_IMAGE017
Figure 261416DEST_PATH_IMAGE025
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 382999DEST_PATH_IMAGE019
Figure 222779DEST_PATH_IMAGE010
Figure 386093DEST_PATH_IMAGE011
Figure 62111DEST_PATH_IMAGE012
Figure 775989DEST_PATH_IMAGE021
Figure 555726DEST_PATH_IMAGE013
Figure 13252DEST_PATH_IMAGE022
Figure 837038DEST_PATH_IMAGE023
Figure 166388DEST_PATH_IMAGE015
Figure 427605DEST_PATH_IMAGE018
Figure 158801DEST_PATH_IMAGE016
Figure 214481DEST_PATH_IMAGE024
Figure 33719DEST_PATH_IMAGE018
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 925898DEST_PATH_IMAGE010
Figure 229840DEST_PATH_IMAGE026
Figure 832860DEST_PATH_IMAGE011
Figure 273069DEST_PATH_IMAGE020
Figure 936131DEST_PATH_IMAGE012
Figure 399473DEST_PATH_IMAGE021
Figure 806184DEST_PATH_IMAGE013
Figure 100899DEST_PATH_IMAGE022
Figure 934863DEST_PATH_IMAGE014
Figure 947818DEST_PATH_IMAGE023
Figure 892641DEST_PATH_IMAGE015
Figure 245125DEST_PATH_IMAGE024
Figure 249990DEST_PATH_IMAGE016
Figure 750241DEST_PATH_IMAGE018
Figure 498754DEST_PATH_IMAGE017
, set encryption parameter
Figure 943828DEST_PATH_IMAGE002
Figure 613253DEST_PATH_IMAGE005
Figure 632024DEST_PATH_IMAGE006
Figure 106868DEST_PATH_IMAGE007
Figure 197184DEST_PATH_IMAGE008
With
Figure 441083DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 958652DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100224116100001DEST_PATH_IMAGE028
Carry out H1=
Figure 2013100224116100001DEST_PATH_IMAGE029
Figure 779847DEST_PATH_IMAGE010
Figure 408274DEST_PATH_IMAGE019
Figure 523047DEST_PATH_IMAGE029
Figure 507064DEST_PATH_IMAGE020
Figure 725555DEST_PATH_IMAGE013
Figure 443030DEST_PATH_IMAGE014
Figure 350944DEST_PATH_IMAGE022
Figure 423942DEST_PATH_IMAGE015
Figure 454215DEST_PATH_IMAGE023
Figure 674980DEST_PATH_IMAGE016
Figure 704028DEST_PATH_IMAGE024
Figure 631533DEST_PATH_IMAGE017
Figure 832707DEST_PATH_IMAGE025
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 478452DEST_PATH_IMAGE028
Carry out H1=
Figure 56064DEST_PATH_IMAGE029
Figure 838075DEST_PATH_IMAGE010
Figure 147834DEST_PATH_IMAGE019
Figure 295523DEST_PATH_IMAGE011
Figure 411247DEST_PATH_IMAGE029
Figure 313344DEST_PATH_IMAGE012
Figure 856321DEST_PATH_IMAGE020
Figure 476658DEST_PATH_IMAGE013
Figure 130493DEST_PATH_IMAGE021
Figure 824780DEST_PATH_IMAGE014
Figure 810096DEST_PATH_IMAGE022
Figure 171993DEST_PATH_IMAGE023
Figure 48683DEST_PATH_IMAGE016
Figure 933462DEST_PATH_IMAGE024
Figure 325129DEST_PATH_IMAGE017
Figure 648663DEST_PATH_IMAGE025
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2=
Figure 379859DEST_PATH_IMAGE019
Figure 373222DEST_PATH_IMAGE010
Figure 994129DEST_PATH_IMAGE011
Figure 793458DEST_PATH_IMAGE026
Figure 379160DEST_PATH_IMAGE012
Figure 871321DEST_PATH_IMAGE030
Figure 175263DEST_PATH_IMAGE013
Figure 512704DEST_PATH_IMAGE021
Figure 475390DEST_PATH_IMAGE015
Figure 114499DEST_PATH_IMAGE016
Figure 197730DEST_PATH_IMAGE024
Figure 210685DEST_PATH_IMAGE017
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100224116100001DEST_PATH_IMAGE031
Carry out H2=
Figure 694942DEST_PATH_IMAGE019
Figure 699807DEST_PATH_IMAGE010
Figure 200059DEST_PATH_IMAGE030
Figure 682993DEST_PATH_IMAGE011
Figure 473541DEST_PATH_IMAGE012
Figure 461088DEST_PATH_IMAGE030
Figure 747713DEST_PATH_IMAGE013
Figure 871527DEST_PATH_IMAGE021
Figure 155878DEST_PATH_IMAGE014
Figure 630721DEST_PATH_IMAGE022
Figure 721037DEST_PATH_IMAGE015
Figure 964937DEST_PATH_IMAGE023
Figure 216926DEST_PATH_IMAGE016
Figure 179066DEST_PATH_IMAGE024
Figure 745177DEST_PATH_IMAGE017
Figure 171479DEST_PATH_IMAGE025
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 532053DEST_PATH_IMAGE019
Figure 981489DEST_PATH_IMAGE010
Figure 366520DEST_PATH_IMAGE011
Figure 2013100224116100001DEST_PATH_IMAGE032
Figure 902904DEST_PATH_IMAGE020
Figure 138713DEST_PATH_IMAGE013
Figure 211711DEST_PATH_IMAGE032
Figure 241984DEST_PATH_IMAGE014
Figure 400433DEST_PATH_IMAGE022
Figure 112037DEST_PATH_IMAGE015
Figure 240716DEST_PATH_IMAGE016
Figure 886461DEST_PATH_IMAGE024
Figure 198493DEST_PATH_IMAGE017
Figure 246084DEST_PATH_IMAGE025
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 618159DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100224116A 2013-01-22 2013-01-22 Multiparameter multivariable binary encryption anti-fake information storage trademark Pending CN103106439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100224116A CN103106439A (en) 2013-01-22 2013-01-22 Multiparameter multivariable binary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100224116A CN103106439A (en) 2013-01-22 2013-01-22 Multiparameter multivariable binary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106439A true CN103106439A (en) 2013-05-15

Family

ID=48314285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100224116A Pending CN103106439A (en) 2013-01-22 2013-01-22 Multiparameter multivariable binary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106439A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515