CN103106442A - Single variable parameter transmutation multi-element encryption anti-fake information storage trademark - Google Patents

Single variable parameter transmutation multi-element encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106442A
CN103106442A CN2013100224474A CN201310022447A CN103106442A CN 103106442 A CN103106442 A CN 103106442A CN 2013100224474 A CN2013100224474 A CN 2013100224474A CN 201310022447 A CN201310022447 A CN 201310022447A CN 103106442 A CN103106442 A CN 103106442A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100224474A
Other languages
Chinese (zh)
Other versions
CN103106442B (en
Inventor
郭庆云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022447.4A priority Critical patent/CN103106442B/en
Publication of CN103106442A publication Critical patent/CN103106442A/en
Application granted granted Critical
Publication of CN103106442B publication Critical patent/CN103106442B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

Provided is a single variable parameter transmutation multi-element encryption anti-fake information storage trademark. The single variable parameter transmutation multi-element encryption anti-fake information storage trademark is capable of transforming binary system anti-fake information into a binary system modulating signal through multi-element encryption and channel coding, capable of embedding anti-fake information into the whole trademark page by changing conductivity of an amplitude modulation website in a circulation look-up table modulation method, capable of identifying the anti-fake information from any fragment when a trademark is identified and capable of being used in various anti-fake trademarks.

Description

Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of single variable parameter transmutation multi-element encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 412025DEST_PATH_IMAGE002
Figure 722921DEST_PATH_IMAGE003
Figure 649288DEST_PATH_IMAGE004
Figure 6538DEST_PATH_IMAGE005
Figure 360159DEST_PATH_IMAGE006
Figure 158351DEST_PATH_IMAGE007
Figure 888409DEST_PATH_IMAGE008
With, encryption parameter
Figure 612969DEST_PATH_IMAGE002
Figure 898456DEST_PATH_IMAGE003
Figure 166627DEST_PATH_IMAGE004
Figure 221170DEST_PATH_IMAGE005
Figure 182173DEST_PATH_IMAGE006
Figure 954957DEST_PATH_IMAGE007
Figure 761239DEST_PATH_IMAGE008
With
Figure 935868DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j and q, and encryption variables j and q are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, and binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 802193DEST_PATH_IMAGE010
Figure 672246DEST_PATH_IMAGE012
Figure 701382DEST_PATH_IMAGE013
Figure 4187DEST_PATH_IMAGE014
Figure 899648DEST_PATH_IMAGE016
Figure 783291DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 757249DEST_PATH_IMAGE011
Figure 357360DEST_PATH_IMAGE014
Figure 813749DEST_PATH_IMAGE015
Figure 569216DEST_PATH_IMAGE016
Figure 161871DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 480223DEST_PATH_IMAGE012
Figure 913795DEST_PATH_IMAGE014
Figure 344777DEST_PATH_IMAGE015
Figure 442046DEST_PATH_IMAGE016
Figure 274872DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 166605DEST_PATH_IMAGE010
Figure 84883DEST_PATH_IMAGE011
Figure 985842DEST_PATH_IMAGE012
Figure 407597DEST_PATH_IMAGE013
Figure 875804DEST_PATH_IMAGE015
Figure 580455DEST_PATH_IMAGE016
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 621409DEST_PATH_IMAGE010
Figure 22620DEST_PATH_IMAGE012
Figure 418967DEST_PATH_IMAGE013
Figure 88982DEST_PATH_IMAGE014
Figure 203569DEST_PATH_IMAGE015
Figure 984443DEST_PATH_IMAGE016
Figure 500875DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 474833DEST_PATH_IMAGE011
Figure 59398DEST_PATH_IMAGE012
Figure 430337DEST_PATH_IMAGE013
Figure 442155DEST_PATH_IMAGE014
Figure 265755DEST_PATH_IMAGE015
Figure 654011DEST_PATH_IMAGE016
Figure 879456DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 119211DEST_PATH_IMAGE011
Figure 45578DEST_PATH_IMAGE012
Figure 744730DEST_PATH_IMAGE014
Figure 542922DEST_PATH_IMAGE015
Figure 272980DEST_PATH_IMAGE016
Figure 207438DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 528698DEST_PATH_IMAGE010
Figure 814186DEST_PATH_IMAGE011
Figure 82356DEST_PATH_IMAGE012
Figure 136900DEST_PATH_IMAGE013
Figure 136266DEST_PATH_IMAGE015
Figure 208127DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 249081DEST_PATH_IMAGE010
Figure 509161DEST_PATH_IMAGE011
Figure 119134DEST_PATH_IMAGE012
Figure 148270DEST_PATH_IMAGE013
Figure 185496DEST_PATH_IMAGE014
Figure 932872DEST_PATH_IMAGE015
Figure 230179DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 703885DEST_PATH_IMAGE018
Figure 624754DEST_PATH_IMAGE019
Figure 7511DEST_PATH_IMAGE018
Figure 995058DEST_PATH_IMAGE012
Figure 750525DEST_PATH_IMAGE019
Figure 608759DEST_PATH_IMAGE013
Figure 424268DEST_PATH_IMAGE018
Figure 367954DEST_PATH_IMAGE014
Figure 661532DEST_PATH_IMAGE019
Figure 891842DEST_PATH_IMAGE018
Figure 322823DEST_PATH_IMAGE016
Figure 420092DEST_PATH_IMAGE019
Figure 987340DEST_PATH_IMAGE017
Figure 144652DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 62929DEST_PATH_IMAGE018
Figure 698310DEST_PATH_IMAGE010
Figure 2013100224474100002DEST_PATH_IMAGE020
Figure 916801DEST_PATH_IMAGE011
Figure 385009DEST_PATH_IMAGE012
Figure 89660DEST_PATH_IMAGE020
Figure 130614DEST_PATH_IMAGE018
Figure 757904DEST_PATH_IMAGE014
Figure 735088DEST_PATH_IMAGE020
Figure 397013DEST_PATH_IMAGE015
Figure 67029DEST_PATH_IMAGE018
Figure 181615DEST_PATH_IMAGE016
Figure 962490DEST_PATH_IMAGE020
Figure 319839DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 921721DEST_PATH_IMAGE018
Figure 506286DEST_PATH_IMAGE010
Figure 877225DEST_PATH_IMAGE021
Figure 431920DEST_PATH_IMAGE011
Figure 643776DEST_PATH_IMAGE012
Figure 869221DEST_PATH_IMAGE021
Figure 51941DEST_PATH_IMAGE013
Figure 628415DEST_PATH_IMAGE018
Figure 554783DEST_PATH_IMAGE014
Figure 253935DEST_PATH_IMAGE015
Figure 516606DEST_PATH_IMAGE016
Figure 716643DEST_PATH_IMAGE021
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 309670DEST_PATH_IMAGE018
Figure 364214DEST_PATH_IMAGE010
Figure 363580DEST_PATH_IMAGE011
Figure 435441DEST_PATH_IMAGE018
Figure 7554DEST_PATH_IMAGE022
Figure 2055DEST_PATH_IMAGE013
Figure 408765DEST_PATH_IMAGE018
Figure 222503DEST_PATH_IMAGE015
Figure 636167DEST_PATH_IMAGE018
Figure 519809DEST_PATH_IMAGE016
Figure 259095DEST_PATH_IMAGE022
Figure 228188DEST_PATH_IMAGE017
Figure 445543DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 183692DEST_PATH_IMAGE018
Figure 828300DEST_PATH_IMAGE010
Figure 2013100224474100002DEST_PATH_IMAGE023
Figure 815847DEST_PATH_IMAGE011
Figure 571314DEST_PATH_IMAGE018
Figure 429548DEST_PATH_IMAGE012
Figure 245058DEST_PATH_IMAGE023
Figure 923164DEST_PATH_IMAGE013
Figure 482321DEST_PATH_IMAGE018
Figure 612454DEST_PATH_IMAGE015
Figure 709723DEST_PATH_IMAGE018
Figure 808129DEST_PATH_IMAGE016
Figure 618139DEST_PATH_IMAGE017
Figure 519099DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 206432DEST_PATH_IMAGE018
Figure 534645DEST_PATH_IMAGE010
Figure 686359DEST_PATH_IMAGE024
Figure 125430DEST_PATH_IMAGE011
Figure 667270DEST_PATH_IMAGE018
Figure 166384DEST_PATH_IMAGE012
Figure 793675DEST_PATH_IMAGE024
Figure 36437DEST_PATH_IMAGE013
Figure 837220DEST_PATH_IMAGE014
Figure 217386DEST_PATH_IMAGE024
Figure 263839DEST_PATH_IMAGE015
Figure 780271DEST_PATH_IMAGE018
Figure 621188DEST_PATH_IMAGE016
Figure 957492DEST_PATH_IMAGE024
Figure 73215DEST_PATH_IMAGE017
Figure 975312DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 76309DEST_PATH_IMAGE010
Figure 183626DEST_PATH_IMAGE012
Figure 455524DEST_PATH_IMAGE013
Figure 809145DEST_PATH_IMAGE018
Figure 337395DEST_PATH_IMAGE025
Figure 537432DEST_PATH_IMAGE015
Figure 61955DEST_PATH_IMAGE018
Figure 347442DEST_PATH_IMAGE016
Figure 881192DEST_PATH_IMAGE025
Figure 935736DEST_PATH_IMAGE017
Figure 631159DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 403943DEST_PATH_IMAGE018
Figure 475804DEST_PATH_IMAGE010
Figure 2013100224474100002DEST_PATH_IMAGE026
Figure 916013DEST_PATH_IMAGE011
Figure 47917DEST_PATH_IMAGE018
Figure 42418DEST_PATH_IMAGE012
Figure 449128DEST_PATH_IMAGE026
Figure 515490DEST_PATH_IMAGE018
Figure 997287DEST_PATH_IMAGE014
Figure 410951DEST_PATH_IMAGE026
Figure 294594DEST_PATH_IMAGE015
Figure 768300DEST_PATH_IMAGE018
Figure 954748DEST_PATH_IMAGE026
Figure 692897DEST_PATH_IMAGE017
Figure 868663DEST_PATH_IMAGE018
, set encryption parameter
Figure 325052DEST_PATH_IMAGE002
Figure 488683DEST_PATH_IMAGE005
Figure 432369DEST_PATH_IMAGE006
Figure 991526DEST_PATH_IMAGE007
Figure 704267DEST_PATH_IMAGE008
WithInitial value, setting encryption variables j and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 856080DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 953349DEST_PATH_IMAGE027
Carry out H1=
Figure 329053DEST_PATH_IMAGE028
Figure 486364DEST_PATH_IMAGE010
Figure 40023DEST_PATH_IMAGE011
Figure 727356DEST_PATH_IMAGE028
Figure 195563DEST_PATH_IMAGE019
Figure 634635DEST_PATH_IMAGE013
Figure 176475DEST_PATH_IMAGE028
Figure 675589DEST_PATH_IMAGE014
Figure 302880DEST_PATH_IMAGE019
Figure 263751DEST_PATH_IMAGE015
Figure 722414DEST_PATH_IMAGE028
Figure 392430DEST_PATH_IMAGE016
Figure 989688DEST_PATH_IMAGE017
Figure 240541DEST_PATH_IMAGE028
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 81458DEST_PATH_IMAGE027
Carry out H1=
Figure 683341DEST_PATH_IMAGE028
Figure 799064DEST_PATH_IMAGE010
Figure 181821DEST_PATH_IMAGE011
Figure 271000DEST_PATH_IMAGE028
Figure 455994DEST_PATH_IMAGE012
Figure 681439DEST_PATH_IMAGE019
Figure 129737DEST_PATH_IMAGE013
Figure 440633DEST_PATH_IMAGE028
Figure 960476DEST_PATH_IMAGE014
Figure 306007DEST_PATH_IMAGE019
Figure 457820DEST_PATH_IMAGE028
Figure 719037DEST_PATH_IMAGE016
Figure 919074DEST_PATH_IMAGE019
Figure 443596DEST_PATH_IMAGE017
Figure 740803DEST_PATH_IMAGE028
I+1, q+1, j+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 2013100224474100002DEST_PATH_IMAGE029
Figure 71290DEST_PATH_IMAGE010
Figure 125833DEST_PATH_IMAGE020
Figure 86836DEST_PATH_IMAGE011
Figure 859620DEST_PATH_IMAGE029
Figure 665902DEST_PATH_IMAGE012
Figure 706856DEST_PATH_IMAGE013
Figure 966936DEST_PATH_IMAGE029
Figure 108068DEST_PATH_IMAGE014
Figure 137204DEST_PATH_IMAGE020
Figure 440009DEST_PATH_IMAGE015
Figure 108757DEST_PATH_IMAGE029
Figure 522420DEST_PATH_IMAGE016
Figure 406063DEST_PATH_IMAGE020
Figure 879769DEST_PATH_IMAGE017
Figure 380021DEST_PATH_IMAGE029
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 331796DEST_PATH_IMAGE030
Carry out H2=
Figure 335524DEST_PATH_IMAGE029
Figure 980132DEST_PATH_IMAGE010
Figure 967680DEST_PATH_IMAGE020
Figure 315802DEST_PATH_IMAGE029
Figure 131311DEST_PATH_IMAGE012
Figure 74996DEST_PATH_IMAGE020
Figure 346895DEST_PATH_IMAGE029
Figure 67726DEST_PATH_IMAGE014
Figure 498707DEST_PATH_IMAGE020
Figure 851694DEST_PATH_IMAGE016
Figure 769972DEST_PATH_IMAGE020
Figure 92686DEST_PATH_IMAGE031
I+1, q+1, j+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 2013100224474100002DEST_PATH_IMAGE032
Figure 952057DEST_PATH_IMAGE010
Figure 92052DEST_PATH_IMAGE021
Figure 338542DEST_PATH_IMAGE032
Figure 464947DEST_PATH_IMAGE021
Figure 104056DEST_PATH_IMAGE032
Figure 774072DEST_PATH_IMAGE014
Figure 888658DEST_PATH_IMAGE021
Figure 669532DEST_PATH_IMAGE015
Figure 185964DEST_PATH_IMAGE032
Figure 26881DEST_PATH_IMAGE016
Figure 628764DEST_PATH_IMAGE021
Figure 213329DEST_PATH_IMAGE017
Figure 584268DEST_PATH_IMAGE032
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 607805DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 431404DEST_PATH_IMAGE002
Figure 819660DEST_PATH_IMAGE003
Figure 45105DEST_PATH_IMAGE004
Figure 227825DEST_PATH_IMAGE005
Figure 804300DEST_PATH_IMAGE006
Figure 730667DEST_PATH_IMAGE007
Figure 810619DEST_PATH_IMAGE008
With
Figure 429819DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when set encryption variables j and q initial value for encryption, binary operator control variable k initial value design for k=0, by polynary ciphering process, and binary operator controls to decrypt computing during variable k=0 for Mi=
Figure 228011DEST_PATH_IMAGE018
Figure 892527DEST_PATH_IMAGE019
Figure 682629DEST_PATH_IMAGE011
Figure 236287DEST_PATH_IMAGE012
Figure 290831DEST_PATH_IMAGE019
Figure 251833DEST_PATH_IMAGE013
Figure 759038DEST_PATH_IMAGE018
Figure 830899DEST_PATH_IMAGE014
Figure 131934DEST_PATH_IMAGE018
Figure 741906DEST_PATH_IMAGE016
Figure 771042DEST_PATH_IMAGE019
Figure 808268DEST_PATH_IMAGE017
Figure 555645DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 969308DEST_PATH_IMAGE018
Figure 852951DEST_PATH_IMAGE010
Figure 295750DEST_PATH_IMAGE011
Figure 247526DEST_PATH_IMAGE018
Figure 251254DEST_PATH_IMAGE012
Figure 630283DEST_PATH_IMAGE020
Figure 86672DEST_PATH_IMAGE013
Figure 373297DEST_PATH_IMAGE018
Figure 231531DEST_PATH_IMAGE014
Figure 47041DEST_PATH_IMAGE020
Figure 990726DEST_PATH_IMAGE015
Figure 284304DEST_PATH_IMAGE018
Figure 997045DEST_PATH_IMAGE016
Figure 514614DEST_PATH_IMAGE020
Figure 42864DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 610112DEST_PATH_IMAGE018
Figure 685701DEST_PATH_IMAGE021
Figure 321082DEST_PATH_IMAGE011
Figure 8415DEST_PATH_IMAGE018
Figure 336628DEST_PATH_IMAGE012
Figure 476623DEST_PATH_IMAGE021
Figure 181273DEST_PATH_IMAGE013
Figure 191955DEST_PATH_IMAGE018
Figure 691069DEST_PATH_IMAGE014
Figure 318360DEST_PATH_IMAGE021
Figure 295543DEST_PATH_IMAGE015
Figure 957468DEST_PATH_IMAGE018
Figure 158643DEST_PATH_IMAGE016
Figure 273229DEST_PATH_IMAGE021
Figure 54103DEST_PATH_IMAGE017
Figure 570535DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 411452DEST_PATH_IMAGE018
Figure 609619DEST_PATH_IMAGE022
Figure 980557DEST_PATH_IMAGE011
Figure 992376DEST_PATH_IMAGE018
Figure 815975DEST_PATH_IMAGE012
Figure 204231DEST_PATH_IMAGE022
Figure 429676DEST_PATH_IMAGE013
Figure 612396DEST_PATH_IMAGE018
Figure 188871DEST_PATH_IMAGE014
Figure 195190DEST_PATH_IMAGE015
Figure 814390DEST_PATH_IMAGE018
Figure 612582DEST_PATH_IMAGE016
Figure 588683DEST_PATH_IMAGE017
Figure 378784DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 398693DEST_PATH_IMAGE018
Figure 932442DEST_PATH_IMAGE010
Figure 986986DEST_PATH_IMAGE023
Figure 682410DEST_PATH_IMAGE011
Figure 455194DEST_PATH_IMAGE018
Figure 527055DEST_PATH_IMAGE012
Figure 436105DEST_PATH_IMAGE023
Figure 568009DEST_PATH_IMAGE013
Figure 562510DEST_PATH_IMAGE018
Figure 467198DEST_PATH_IMAGE023
Figure 504424DEST_PATH_IMAGE015
Figure 720642DEST_PATH_IMAGE018
Figure 665464DEST_PATH_IMAGE016
Figure 549106DEST_PATH_IMAGE023
Figure 195168DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 412523DEST_PATH_IMAGE018
Figure 150672DEST_PATH_IMAGE010
Figure 782827DEST_PATH_IMAGE011
Figure 538294DEST_PATH_IMAGE018
Figure 396528DEST_PATH_IMAGE012
Figure 212038DEST_PATH_IMAGE024
Figure 890144DEST_PATH_IMAGE013
Figure 162042DEST_PATH_IMAGE014
Figure 148453DEST_PATH_IMAGE024
Figure 579434DEST_PATH_IMAGE015
Figure 775109DEST_PATH_IMAGE016
Figure 932421DEST_PATH_IMAGE024
Figure 585119DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 970467DEST_PATH_IMAGE010
Figure 110461DEST_PATH_IMAGE025
Figure 91373DEST_PATH_IMAGE018
Figure 602206DEST_PATH_IMAGE012
Figure 229496DEST_PATH_IMAGE025
Figure 134184DEST_PATH_IMAGE018
Figure 335359DEST_PATH_IMAGE014
Figure 184366DEST_PATH_IMAGE025
Figure 230819DEST_PATH_IMAGE015
Figure 393313DEST_PATH_IMAGE025
Figure 977878DEST_PATH_IMAGE017
Figure 348817DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 16427DEST_PATH_IMAGE018
Figure 105606DEST_PATH_IMAGE010
Figure 228283DEST_PATH_IMAGE026
Figure 719307DEST_PATH_IMAGE011
Figure 902027DEST_PATH_IMAGE018
Figure 212922DEST_PATH_IMAGE012
Figure 139290DEST_PATH_IMAGE026
Figure 484821DEST_PATH_IMAGE013
Figure 636633DEST_PATH_IMAGE014
Figure 366692DEST_PATH_IMAGE026
Figure 566729DEST_PATH_IMAGE015
Figure 622410DEST_PATH_IMAGE018
Figure 907898DEST_PATH_IMAGE016
Figure 620825DEST_PATH_IMAGE017
Figure 316248DEST_PATH_IMAGE018
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 629735DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 69944DEST_PATH_IMAGE027
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 201848DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the single variable parameter transmutation multi-element encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 533856DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 982154DEST_PATH_IMAGE002
Figure 304769DEST_PATH_IMAGE003
Figure 231137DEST_PATH_IMAGE004
Figure 576667DEST_PATH_IMAGE005
Figure 930288DEST_PATH_IMAGE006
Figure 728480DEST_PATH_IMAGE007
With
Figure 658576DEST_PATH_IMAGE009
, encryption parameter
Figure 183098DEST_PATH_IMAGE002
Figure 468586DEST_PATH_IMAGE003
Figure 791300DEST_PATH_IMAGE005
Figure 525086DEST_PATH_IMAGE007
Figure 331368DEST_PATH_IMAGE008
With
Figure 505998DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j and q, and encryption variables j and q are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, and binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 372323DEST_PATH_IMAGE010
Figure 773534DEST_PATH_IMAGE012
Figure 802670DEST_PATH_IMAGE013
Figure 105475DEST_PATH_IMAGE014
Figure 532094DEST_PATH_IMAGE016
Figure 415737DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 889444DEST_PATH_IMAGE010
Figure 858537DEST_PATH_IMAGE011
Figure 810312DEST_PATH_IMAGE012
Figure 814040DEST_PATH_IMAGE013
Figure 915037DEST_PATH_IMAGE015
Figure 139345DEST_PATH_IMAGE016
Figure 263159DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 78668DEST_PATH_IMAGE010
Figure 491195DEST_PATH_IMAGE011
Figure 483925DEST_PATH_IMAGE014
Figure 914906DEST_PATH_IMAGE015
Figure 376160DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 267893DEST_PATH_IMAGE010
Figure 186170DEST_PATH_IMAGE011
Figure 87130DEST_PATH_IMAGE012
Figure 837098DEST_PATH_IMAGE014
Figure 508250DEST_PATH_IMAGE015
Figure 212901DEST_PATH_IMAGE016
Figure 754741DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 253855DEST_PATH_IMAGE010
Figure 881146DEST_PATH_IMAGE011
Figure 123908DEST_PATH_IMAGE012
Figure 520255DEST_PATH_IMAGE013
Figure 190270DEST_PATH_IMAGE014
Figure 616889DEST_PATH_IMAGE016
Figure 133321DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 974239DEST_PATH_IMAGE010
Figure 576121DEST_PATH_IMAGE011
Figure 160686DEST_PATH_IMAGE012
Figure 531625DEST_PATH_IMAGE013
Figure 543443DEST_PATH_IMAGE014
Figure 956841DEST_PATH_IMAGE015
Figure 345097DEST_PATH_IMAGE016
Figure 570542DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 753261DEST_PATH_IMAGE010
Figure 329736DEST_PATH_IMAGE011
Figure 787262DEST_PATH_IMAGE012
Figure 867214DEST_PATH_IMAGE013
Figure 486414DEST_PATH_IMAGE014
Figure 284606DEST_PATH_IMAGE015
Figure 14664DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 555870DEST_PATH_IMAGE011
Figure 878584DEST_PATH_IMAGE013
Figure 839587DEST_PATH_IMAGE014
Figure 887494DEST_PATH_IMAGE016
Figure 593282DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 459607DEST_PATH_IMAGE010
Figure 719687DEST_PATH_IMAGE011
Figure 329660DEST_PATH_IMAGE012
Figure 358796DEST_PATH_IMAGE013
Figure 396022DEST_PATH_IMAGE014
Figure 612239DEST_PATH_IMAGE015
Figure 557062DEST_PATH_IMAGE016
Figure 440704DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 914411DEST_PATH_IMAGE018
Figure 883504DEST_PATH_IMAGE010
Figure 366438DEST_PATH_IMAGE019
Figure 370166DEST_PATH_IMAGE011
Figure 749195DEST_PATH_IMAGE018
Figure 923693DEST_PATH_IMAGE012
Figure 679159DEST_PATH_IMAGE019
Figure 537394DEST_PATH_IMAGE013
Figure 352903DEST_PATH_IMAGE018
Figure 296588DEST_PATH_IMAGE014
Figure 590166DEST_PATH_IMAGE019
Figure 289318DEST_PATH_IMAGE018
Figure 720299DEST_PATH_IMAGE016
Figure 817568DEST_PATH_IMAGE019
Figure 384816DEST_PATH_IMAGE017
Figure 542128DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 460405DEST_PATH_IMAGE018
Figure 95786DEST_PATH_IMAGE010
Figure 783119DEST_PATH_IMAGE020
Figure 111332DEST_PATH_IMAGE011
Figure 251327DEST_PATH_IMAGE018
Figure 497817DEST_PATH_IMAGE020
Figure 155381DEST_PATH_IMAGE018
Figure 144283DEST_PATH_IMAGE014
Figure 806208DEST_PATH_IMAGE020
Figure 476224DEST_PATH_IMAGE015
Figure 590810DEST_PATH_IMAGE018
Figure 371685DEST_PATH_IMAGE016
Figure 888117DEST_PATH_IMAGE020
Figure 729034DEST_PATH_IMAGE017
Figure 330916DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 915481DEST_PATH_IMAGE018
Figure 286420DEST_PATH_IMAGE010
Figure 298238DEST_PATH_IMAGE021
Figure 510094DEST_PATH_IMAGE018
Figure 735539DEST_PATH_IMAGE012
Figure 387100DEST_PATH_IMAGE021
Figure 494733DEST_PATH_IMAGE013
Figure 421101DEST_PATH_IMAGE018
Figure 501052DEST_PATH_IMAGE014
Figure 120252DEST_PATH_IMAGE021
Figure 918444DEST_PATH_IMAGE015
Figure 382924DEST_PATH_IMAGE018
Figure 582961DEST_PATH_IMAGE016
Figure 373062DEST_PATH_IMAGE021
Figure 392971DEST_PATH_IMAGE017
Figure 926720DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 676688DEST_PATH_IMAGE010
Figure 449472DEST_PATH_IMAGE022
Figure 521333DEST_PATH_IMAGE011
Figure 430383DEST_PATH_IMAGE018
Figure 31129DEST_PATH_IMAGE012
Figure 25629DEST_PATH_IMAGE022
Figure 710743DEST_PATH_IMAGE018
Figure 747970DEST_PATH_IMAGE014
Figure 495346DEST_PATH_IMAGE022
Figure 969872DEST_PATH_IMAGE022
Figure 187227DEST_PATH_IMAGE017
Figure 925376DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 557531DEST_PATH_IMAGE010
Figure 312998DEST_PATH_IMAGE023
Figure 171232DEST_PATH_IMAGE011
Figure 986742DEST_PATH_IMAGE018
Figure 224005DEST_PATH_IMAGE023
Figure 923157DEST_PATH_IMAGE018
Figure 354138DEST_PATH_IMAGE014
Figure 982565DEST_PATH_IMAGE023
Figure 549813DEST_PATH_IMAGE015
Figure 718844DEST_PATH_IMAGE018
Figure 371542DEST_PATH_IMAGE016
Figure 959835DEST_PATH_IMAGE017
Figure 288048DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 428042DEST_PATH_IMAGE018
Figure 867114DEST_PATH_IMAGE010
Figure 408954DEST_PATH_IMAGE024
Figure 908068DEST_PATH_IMAGE011
Figure 535359DEST_PATH_IMAGE018
Figure 778121DEST_PATH_IMAGE012
Figure 110062DEST_PATH_IMAGE013
Figure 5523DEST_PATH_IMAGE014
Figure 362872DEST_PATH_IMAGE015
Figure 699176DEST_PATH_IMAGE018
Figure 283741DEST_PATH_IMAGE016
Figure 654679DEST_PATH_IMAGE024
Figure 755676DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 878353DEST_PATH_IMAGE018
Figure 552097DEST_PATH_IMAGE025
Figure 862993DEST_PATH_IMAGE011
Figure 789360DEST_PATH_IMAGE018
Figure 488512DEST_PATH_IMAGE025
Figure 286704DEST_PATH_IMAGE013
Figure 16762DEST_PATH_IMAGE018
Figure 89126DEST_PATH_IMAGE015
Figure 622876DEST_PATH_IMAGE018
Figure 677420DEST_PATH_IMAGE016
Figure 372843DEST_PATH_IMAGE025
Figure 145627DEST_PATH_IMAGE017
Figure 217488DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 126538DEST_PATH_IMAGE018
Figure 258443DEST_PATH_IMAGE010
Figure 252943DEST_PATH_IMAGE026
Figure 128495DEST_PATH_IMAGE011
Figure 892052DEST_PATH_IMAGE018
Figure 194857DEST_PATH_IMAGE012
Figure 676654DEST_PATH_IMAGE026
Figure 90318DEST_PATH_IMAGE013
Figure 973961DEST_PATH_IMAGE018
Figure 885602DEST_PATH_IMAGE026
Figure 634115DEST_PATH_IMAGE015
Figure 372264DEST_PATH_IMAGE018
Figure 16872DEST_PATH_IMAGE016
Figure 473261DEST_PATH_IMAGE026
Figure 228727DEST_PATH_IMAGE017
Figure 86962DEST_PATH_IMAGE018
, set encryption parameter
Figure 636892DEST_PATH_IMAGE002
Figure 139735DEST_PATH_IMAGE004
Figure 852476DEST_PATH_IMAGE005
Figure 838886DEST_PATH_IMAGE006
Figure 4288DEST_PATH_IMAGE007
Figure 113276DEST_PATH_IMAGE008
With
Figure 946103DEST_PATH_IMAGE009
Initial value, setting encryption variables j and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 103415DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 756113DEST_PATH_IMAGE027
Carry out H1=
Figure 188231DEST_PATH_IMAGE028
Figure 203778DEST_PATH_IMAGE019
Figure 343772DEST_PATH_IMAGE011
Figure 376319DEST_PATH_IMAGE028
Figure 918159DEST_PATH_IMAGE012
Figure 44564DEST_PATH_IMAGE013
Figure 943118DEST_PATH_IMAGE028
Figure 339465DEST_PATH_IMAGE014
Figure 9480DEST_PATH_IMAGE019
Figure 124067DEST_PATH_IMAGE015
Figure 701679DEST_PATH_IMAGE028
Figure 793449DEST_PATH_IMAGE019
Figure 395331DEST_PATH_IMAGE017
Figure 979896DEST_PATH_IMAGE028
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 350835DEST_PATH_IMAGE027
Carry out H1=
Figure 362653DEST_PATH_IMAGE028
Figure 451832DEST_PATH_IMAGE010
Figure 886093DEST_PATH_IMAGE019
Figure 111538DEST_PATH_IMAGE011
Figure 870733DEST_PATH_IMAGE012
Figure 859417DEST_PATH_IMAGE019
Figure 617978DEST_PATH_IMAGE019
Figure 818015DEST_PATH_IMAGE015
Figure 811379DEST_PATH_IMAGE028
Figure 96866DEST_PATH_IMAGE016
Figure 896195DEST_PATH_IMAGE019
Figure 911742DEST_PATH_IMAGE028
I+1, q+1, j+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 820878DEST_PATH_IMAGE029
Figure 158319DEST_PATH_IMAGE010
Figure 332948DEST_PATH_IMAGE020
Figure 199273DEST_PATH_IMAGE011
Figure 459353DEST_PATH_IMAGE029
Figure 600484DEST_PATH_IMAGE012
Figure 629620DEST_PATH_IMAGE020
Figure 401267DEST_PATH_IMAGE013
Figure 883064DEST_PATH_IMAGE029
Figure 827886DEST_PATH_IMAGE014
Figure 185235DEST_PATH_IMAGE015
Figure 109832DEST_PATH_IMAGE020
Figure 285598DEST_PATH_IMAGE017
Figure 741987DEST_PATH_IMAGE029
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 28612DEST_PATH_IMAGE030
Carry out H2=
Figure 621267DEST_PATH_IMAGE029
Figure 436777DEST_PATH_IMAGE010
Figure 380462DEST_PATH_IMAGE020
Figure 939619DEST_PATH_IMAGE011
Figure 652360DEST_PATH_IMAGE029
Figure 373192DEST_PATH_IMAGE012
Figure 901442DEST_PATH_IMAGE013
Figure 734269DEST_PATH_IMAGE029
Figure 626001DEST_PATH_IMAGE014
Figure 544279DEST_PATH_IMAGE020
Figure 445239DEST_PATH_IMAGE015
Figure 866993DEST_PATH_IMAGE029
Figure 195206DEST_PATH_IMAGE016
Figure 335200DEST_PATH_IMAGE020
Figure 39851DEST_PATH_IMAGE017
I+1, q+1, j+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 80805DEST_PATH_IMAGE032
Figure 708096DEST_PATH_IMAGE010
Figure 950858DEST_PATH_IMAGE021
Figure 17220DEST_PATH_IMAGE032
Figure 912681DEST_PATH_IMAGE021
Figure 270030DEST_PATH_IMAGE032
Figure 871913DEST_PATH_IMAGE014
Figure 456478DEST_PATH_IMAGE021
Figure 827416DEST_PATH_IMAGE015
Figure 662834DEST_PATH_IMAGE016
Figure 51090DEST_PATH_IMAGE021
Figure 276535DEST_PATH_IMAGE017
Figure 459255DEST_PATH_IMAGE032
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 35730DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022447.4A 2013-01-22 2013-01-22 Single variable parameter transmutation multi-element encryption anti-fake information storage trademark Expired - Fee Related CN103106442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022447.4A CN103106442B (en) 2013-01-22 2013-01-22 Single variable parameter transmutation multi-element encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022447.4A CN103106442B (en) 2013-01-22 2013-01-22 Single variable parameter transmutation multi-element encryption anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103106442A true CN103106442A (en) 2013-05-15
CN103106442B CN103106442B (en) 2015-07-15

Family

ID=48314288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022447.4A Expired - Fee Related CN103106442B (en) 2013-01-22 2013-01-22 Single variable parameter transmutation multi-element encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106442B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106183533A (en) * 2016-09-25 2016-12-07 北京印刷学院 Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106218263A (en) * 2016-09-25 2016-12-14 北京印刷学院 Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427283A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427282A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
WO2009036619A1 (en) * 2007-09-17 2009-03-26 Jianming Wu Credit mark random dermal ridge generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
WO2009036619A1 (en) * 2007-09-17 2009-03-26 Jianming Wu Credit mark random dermal ridge generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106183533A (en) * 2016-09-25 2016-12-07 北京印刷学院 Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106218263A (en) * 2016-09-25 2016-12-14 北京印刷学院 Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427283A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427282A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Also Published As

Publication number Publication date
CN103106442B (en) 2015-07-15

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106476B (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106464B (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106466B (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150715

Termination date: 20160122

EXPY Termination of patent right or utility model