CN103106477A - Multi-parameter binary multivariant circulating encryption anti-fake information storage brand - Google Patents

Multi-parameter binary multivariant circulating encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103106477A
CN103106477A CN2013100235163A CN201310023516A CN103106477A CN 103106477 A CN103106477 A CN 103106477A CN 2013100235163 A CN2013100235163 A CN 2013100235163A CN 201310023516 A CN201310023516 A CN 201310023516A CN 103106477 A CN103106477 A CN 103106477A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100235163A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100235163A priority Critical patent/CN103106477A/en
Publication of CN103106477A publication Critical patent/CN103106477A/en
Pending legal-status Critical Current

Links

Images

Abstract

Provided is a multi-parameter binary multivariant circulating encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through binary multivariant circulating encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots in a mode of circulating look-up table modulation. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multiparameter binary multivariate circulation encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of multiparameter binary multivariate circulation encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 644009DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 623466DEST_PATH_IMAGE002
, ,
Figure 673779DEST_PATH_IMAGE004
,
Figure 799735DEST_PATH_IMAGE005
,
Figure 684515DEST_PATH_IMAGE006
,
Figure 764597DEST_PATH_IMAGE007
,
Figure 25815DEST_PATH_IMAGE008
With
Figure 12137DEST_PATH_IMAGE009
, encryption parameter
Figure 67818DEST_PATH_IMAGE002
,
Figure 635197DEST_PATH_IMAGE003
,
Figure 434525DEST_PATH_IMAGE004
,
Figure 269495DEST_PATH_IMAGE005
,
Figure 761656DEST_PATH_IMAGE006
,
Figure 816331DEST_PATH_IMAGE007
, With
Figure 108827DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 506310DEST_PATH_IMAGE010
Figure 189412DEST_PATH_IMAGE012
Figure 998974DEST_PATH_IMAGE013
Figure 832938DEST_PATH_IMAGE014
Figure 596626DEST_PATH_IMAGE015
Figure 541448DEST_PATH_IMAGE016
Figure 35595DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 40460DEST_PATH_IMAGE010
Figure 291444DEST_PATH_IMAGE011
Figure 85962DEST_PATH_IMAGE012
Figure 734298DEST_PATH_IMAGE014
Figure 472578DEST_PATH_IMAGE015
Figure 132284DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 478952DEST_PATH_IMAGE010
Figure 704528DEST_PATH_IMAGE011
Figure 794844DEST_PATH_IMAGE012
Figure 540001DEST_PATH_IMAGE014
Figure 252873DEST_PATH_IMAGE015
Figure 881300DEST_PATH_IMAGE016
Figure 500413DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 923304DEST_PATH_IMAGE010
Figure 123472DEST_PATH_IMAGE011
Figure 555590DEST_PATH_IMAGE012
Figure 757770DEST_PATH_IMAGE013
Figure 617142DEST_PATH_IMAGE014
Figure 39027DEST_PATH_IMAGE015
Figure 274837DEST_PATH_IMAGE016
Figure 597102DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 627375DEST_PATH_IMAGE010
Figure 310477DEST_PATH_IMAGE012
Figure 487250DEST_PATH_IMAGE013
Figure 688424DEST_PATH_IMAGE014
Figure 84901DEST_PATH_IMAGE015
Figure 396934DEST_PATH_IMAGE016
Figure 687933DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 60008DEST_PATH_IMAGE010
Figure 943782DEST_PATH_IMAGE011
Figure 59505DEST_PATH_IMAGE012
Figure 210870DEST_PATH_IMAGE013
Figure 778751DEST_PATH_IMAGE016
Figure 784622DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 498500DEST_PATH_IMAGE010
Figure 356866DEST_PATH_IMAGE011
Figure 381104DEST_PATH_IMAGE012
Figure 992214DEST_PATH_IMAGE013
Figure 893305DEST_PATH_IMAGE014
Figure 982407DEST_PATH_IMAGE016
Figure 448023DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 520016DEST_PATH_IMAGE010
Figure 336662DEST_PATH_IMAGE011
Figure 908644DEST_PATH_IMAGE013
Figure 189900DEST_PATH_IMAGE015
Figure 792920DEST_PATH_IMAGE016
Figure 765554DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 163037DEST_PATH_IMAGE010
Figure 705008DEST_PATH_IMAGE011
Figure 157724DEST_PATH_IMAGE012
Figure 718018DEST_PATH_IMAGE013
Figure 37135DEST_PATH_IMAGE014
Figure 315670DEST_PATH_IMAGE015
Figure 509759DEST_PATH_IMAGE016
Figure 924560DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 180409DEST_PATH_IMAGE010
Figure 912611DEST_PATH_IMAGE019
Figure 447497DEST_PATH_IMAGE011
Figure 2013100235163100002DEST_PATH_IMAGE020
Figure 170734DEST_PATH_IMAGE012
Figure 351091DEST_PATH_IMAGE021
Figure 886984DEST_PATH_IMAGE013
Figure 2013100235163100002DEST_PATH_IMAGE022
Figure 151743DEST_PATH_IMAGE014
Figure 747678DEST_PATH_IMAGE023
Figure 2013100235163100002DEST_PATH_IMAGE024
Figure 171892DEST_PATH_IMAGE016
Figure 415792DEST_PATH_IMAGE025
Figure 684093DEST_PATH_IMAGE017
Figure 646233DEST_PATH_IMAGE026
, during binary operator control variables k=1, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 518069DEST_PATH_IMAGE019
Figure 429524DEST_PATH_IMAGE010
Figure 117994DEST_PATH_IMAGE020
Figure 983237DEST_PATH_IMAGE027
Figure 139412DEST_PATH_IMAGE012
Figure 811833DEST_PATH_IMAGE013
Figure 732253DEST_PATH_IMAGE022
Figure 968062DEST_PATH_IMAGE014
Figure 791793DEST_PATH_IMAGE023
Figure 822066DEST_PATH_IMAGE015
Figure 229782DEST_PATH_IMAGE024
Figure 738124DEST_PATH_IMAGE016
Figure 883115DEST_PATH_IMAGE017
Figure 783987DEST_PATH_IMAGE026
, during binary operator control variables k=2, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 96019DEST_PATH_IMAGE019
Figure 894342DEST_PATH_IMAGE010
Figure 266418DEST_PATH_IMAGE027
Figure 648726DEST_PATH_IMAGE011
Figure 764450DEST_PATH_IMAGE028
Figure 417279DEST_PATH_IMAGE012
Figure 960256DEST_PATH_IMAGE021
Figure 564282DEST_PATH_IMAGE013
Figure 483696DEST_PATH_IMAGE029
Figure 704910DEST_PATH_IMAGE023
Figure 61811DEST_PATH_IMAGE015
Figure 519337DEST_PATH_IMAGE024
Figure 881179DEST_PATH_IMAGE016
Figure 31538DEST_PATH_IMAGE025
Figure 627734DEST_PATH_IMAGE017
Figure 623372DEST_PATH_IMAGE026
, during binary operator control variables k=3, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 105300DEST_PATH_IMAGE019
Figure 426560DEST_PATH_IMAGE010
Figure 226894DEST_PATH_IMAGE027
Figure 291802DEST_PATH_IMAGE011
Figure 628237DEST_PATH_IMAGE021
Figure 854819DEST_PATH_IMAGE012
Figure 408029DEST_PATH_IMAGE029
Figure 11048DEST_PATH_IMAGE013
Figure 201989DEST_PATH_IMAGE022
Figure 865052DEST_PATH_IMAGE014
Figure 2013100235163100002DEST_PATH_IMAGE030
Figure 639979DEST_PATH_IMAGE015
Figure 46689DEST_PATH_IMAGE024
Figure 357716DEST_PATH_IMAGE016
Figure 926101DEST_PATH_IMAGE025
Figure 522079DEST_PATH_IMAGE017
Figure 217634DEST_PATH_IMAGE026
, during binary operator control variables k=4, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 632435DEST_PATH_IMAGE019
Figure 620988DEST_PATH_IMAGE010
Figure 121239DEST_PATH_IMAGE027
Figure 889792DEST_PATH_IMAGE021
Figure 314826DEST_PATH_IMAGE012
Figure 302374DEST_PATH_IMAGE022
Figure 339731DEST_PATH_IMAGE013
Figure 729124DEST_PATH_IMAGE030
Figure 325060DEST_PATH_IMAGE014
Figure 375372DEST_PATH_IMAGE015
Figure 619272DEST_PATH_IMAGE031
Figure 342389DEST_PATH_IMAGE025
Figure 721549DEST_PATH_IMAGE017
Figure 819955DEST_PATH_IMAGE026
, during binary operator control variables k=5, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 757692DEST_PATH_IMAGE019
Figure 941549DEST_PATH_IMAGE010
Figure 124400DEST_PATH_IMAGE027
Figure 342892DEST_PATH_IMAGE011
Figure 451531DEST_PATH_IMAGE021
Figure 122684DEST_PATH_IMAGE012
Figure 843646DEST_PATH_IMAGE022
Figure 916644DEST_PATH_IMAGE013
Figure 196185DEST_PATH_IMAGE023
Figure 108296DEST_PATH_IMAGE014
Figure 632949DEST_PATH_IMAGE031
Figure 826033DEST_PATH_IMAGE015
Figure 2013100235163100002DEST_PATH_IMAGE032
Figure 2013100235163100002DEST_PATH_IMAGE033
Figure 861169DEST_PATH_IMAGE017
, during binary operator control variables k=6, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 609180DEST_PATH_IMAGE010
Figure 725909DEST_PATH_IMAGE027
Figure 841633DEST_PATH_IMAGE011
Figure 556779DEST_PATH_IMAGE021
Figure 349023DEST_PATH_IMAGE012
Figure 969360DEST_PATH_IMAGE022
Figure 396111DEST_PATH_IMAGE023
Figure 201310DEST_PATH_IMAGE024
Figure 409569DEST_PATH_IMAGE015
Figure 915286DEST_PATH_IMAGE033
Figure 550798DEST_PATH_IMAGE016
Figure 880148DEST_PATH_IMAGE025
Figure 390633DEST_PATH_IMAGE017
Figure 2013100235163100002DEST_PATH_IMAGE034
, during binary operator control variables k=7, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 934878DEST_PATH_IMAGE035
Figure 990559DEST_PATH_IMAGE010
Figure 56473DEST_PATH_IMAGE027
Figure 177838DEST_PATH_IMAGE011
Figure 763540DEST_PATH_IMAGE021
Figure 239390DEST_PATH_IMAGE012
Figure 543332DEST_PATH_IMAGE022
Figure 897084DEST_PATH_IMAGE013
Figure 337293DEST_PATH_IMAGE023
Figure 249623DEST_PATH_IMAGE014
Figure 775282DEST_PATH_IMAGE024
Figure 184922DEST_PATH_IMAGE015
Figure 580447DEST_PATH_IMAGE016
Figure 36760DEST_PATH_IMAGE017
, set encryption parameter
Figure 711553DEST_PATH_IMAGE002
,
Figure 24854DEST_PATH_IMAGE003
,
Figure 84951DEST_PATH_IMAGE004
,
Figure 354258DEST_PATH_IMAGE005
,
Figure 280757DEST_PATH_IMAGE006
,
Figure 205988DEST_PATH_IMAGE007
,
Figure 115782DEST_PATH_IMAGE008
With
Figure 442858DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 274679DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100235163100002DEST_PATH_IMAGE036
Carry out H 1=
Figure 2013100235163100002DEST_PATH_IMAGE037
Figure 930614DEST_PATH_IMAGE010
Figure 202512DEST_PATH_IMAGE011
Figure 31666DEST_PATH_IMAGE038
Figure 665909DEST_PATH_IMAGE012
Figure 45069DEST_PATH_IMAGE021
Figure 409054DEST_PATH_IMAGE013
Figure 406015DEST_PATH_IMAGE014
Figure 87401DEST_PATH_IMAGE023
Figure 305893DEST_PATH_IMAGE015
Figure 495063DEST_PATH_IMAGE025
Figure 823188DEST_PATH_IMAGE017
Binary multivariable circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right Carry out H 1=
Figure 848148DEST_PATH_IMAGE037
Figure 713335DEST_PATH_IMAGE010
Figure 914510DEST_PATH_IMAGE019
Figure 310987DEST_PATH_IMAGE011
Figure 888599DEST_PATH_IMAGE038
Figure 919878DEST_PATH_IMAGE012
Figure 291953DEST_PATH_IMAGE021
Figure 362677DEST_PATH_IMAGE013
Figure 229133DEST_PATH_IMAGE022
Figure 131230DEST_PATH_IMAGE014
Figure 923475DEST_PATH_IMAGE023
Figure 543812DEST_PATH_IMAGE015
Figure 948380DEST_PATH_IMAGE024
Figure 951286DEST_PATH_IMAGE025
Figure 793340DEST_PATH_IMAGE017
Figure 188549DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of binary multivariable circulation cryptographic calculation, make next binary multivariable circulation cryptographic calculation point to H 2=
Figure 815971DEST_PATH_IMAGE019
Figure 700750DEST_PATH_IMAGE010
Figure 2013100235163100002DEST_PATH_IMAGE039
Figure 84830DEST_PATH_IMAGE012
Figure 78194DEST_PATH_IMAGE040
Figure 144108DEST_PATH_IMAGE013
Figure 279871DEST_PATH_IMAGE014
Figure 772032DEST_PATH_IMAGE023
Figure 325242DEST_PATH_IMAGE015
Figure 662683DEST_PATH_IMAGE024
Figure 454369DEST_PATH_IMAGE025
Figure 245608DEST_PATH_IMAGE017
Figure 641866DEST_PATH_IMAGE026
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right Carry out H 2=
Figure 15210DEST_PATH_IMAGE019
Figure 849173DEST_PATH_IMAGE010
Figure 408703DEST_PATH_IMAGE027
Figure 164300DEST_PATH_IMAGE012
Figure 664552DEST_PATH_IMAGE040
Figure 396753DEST_PATH_IMAGE013
Figure 931640DEST_PATH_IMAGE022
Figure 858138DEST_PATH_IMAGE014
Figure 783369DEST_PATH_IMAGE023
Figure 69994DEST_PATH_IMAGE015
Figure 443075DEST_PATH_IMAGE024
Figure 789743DEST_PATH_IMAGE016
Figure 15319DEST_PATH_IMAGE025
Figure 105635DEST_PATH_IMAGE017
Figure 592943DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of binary multivariable circulation cryptographic calculation, make next binary multivariable circulation cryptographic calculation point to H 3=
Figure 557805DEST_PATH_IMAGE010
Figure 123915DEST_PATH_IMAGE027
Figure 487900DEST_PATH_IMAGE011
Figure 2013100235163100002DEST_PATH_IMAGE042
Figure 422544DEST_PATH_IMAGE021
Figure 854663DEST_PATH_IMAGE013
Figure 2013100235163100002DEST_PATH_IMAGE043
Figure 56843DEST_PATH_IMAGE014
Figure 916214DEST_PATH_IMAGE023
Figure 573909DEST_PATH_IMAGE024
Figure 713925DEST_PATH_IMAGE017
Figure 487846DEST_PATH_IMAGE026
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this binary multivariable circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 353033DEST_PATH_IMAGE001
carry out binary multivariable circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to binary multivariate circulation cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 304940DEST_PATH_IMAGE002
,
Figure 950685DEST_PATH_IMAGE003
,
Figure 511985DEST_PATH_IMAGE004
,
Figure 559576DEST_PATH_IMAGE005
,
Figure 682384DEST_PATH_IMAGE006
,
Figure 815425DEST_PATH_IMAGE007
,
Figure 868831DEST_PATH_IMAGE008
With
Figure 37774DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value when initial value of setting encryption variables j, d, e, f, g, h, r, p and q is encryption, the initial value design of binary operator control variables k is k=0, and known by binary multivariable circulation ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 580751DEST_PATH_IMAGE018
Figure 686241DEST_PATH_IMAGE010
Figure 605656DEST_PATH_IMAGE019
Figure 611527DEST_PATH_IMAGE011
Figure 370721DEST_PATH_IMAGE012
Figure 578980DEST_PATH_IMAGE021
Figure 190090DEST_PATH_IMAGE013
Figure 652033DEST_PATH_IMAGE022
Figure 732115DEST_PATH_IMAGE014
Figure 967159DEST_PATH_IMAGE024
Figure 783806DEST_PATH_IMAGE016
Figure 333867DEST_PATH_IMAGE025
Figure 919569DEST_PATH_IMAGE017
Figure 666857DEST_PATH_IMAGE026
, during binary operator control variables k=1, decrypt operation is M i=
Figure 58972DEST_PATH_IMAGE010
Figure 764760DEST_PATH_IMAGE020
Figure 411511DEST_PATH_IMAGE011
Figure 281564DEST_PATH_IMAGE012
Figure 592591DEST_PATH_IMAGE028
Figure 160975DEST_PATH_IMAGE013
Figure 688778DEST_PATH_IMAGE022
Figure 633600DEST_PATH_IMAGE014
Figure 799133DEST_PATH_IMAGE023
Figure 241933DEST_PATH_IMAGE024
Figure 974134DEST_PATH_IMAGE016
Figure 509021DEST_PATH_IMAGE025
Figure 169940DEST_PATH_IMAGE017
Figure 157488DEST_PATH_IMAGE026
, during binary operator control variables k=2, decrypt operation is M i=
Figure 76914DEST_PATH_IMAGE010
Figure 174314DEST_PATH_IMAGE027
Figure 586841DEST_PATH_IMAGE011
Figure 411577DEST_PATH_IMAGE028
Figure 904745DEST_PATH_IMAGE012
Figure 422314DEST_PATH_IMAGE021
Figure 135186DEST_PATH_IMAGE013
Figure 763613DEST_PATH_IMAGE029
Figure 111287DEST_PATH_IMAGE014
Figure 186876DEST_PATH_IMAGE015
Figure 104148DEST_PATH_IMAGE024
Figure 322639DEST_PATH_IMAGE016
Figure 306645DEST_PATH_IMAGE025
Figure 915481DEST_PATH_IMAGE017
Figure 151290DEST_PATH_IMAGE026
, during binary operator control variables k=3, decrypt operation is M i=
Figure 479415DEST_PATH_IMAGE019
Figure 322737DEST_PATH_IMAGE010
Figure 481186DEST_PATH_IMAGE027
Figure 238796DEST_PATH_IMAGE011
Figure 570737DEST_PATH_IMAGE012
Figure 967214DEST_PATH_IMAGE029
Figure 279247DEST_PATH_IMAGE013
Figure 576105DEST_PATH_IMAGE022
Figure 948180DEST_PATH_IMAGE014
Figure 831954DEST_PATH_IMAGE030
Figure 885360DEST_PATH_IMAGE015
Figure 787457DEST_PATH_IMAGE024
Figure 579702DEST_PATH_IMAGE016
Figure 934460DEST_PATH_IMAGE025
Figure 604607DEST_PATH_IMAGE017
Figure 361210DEST_PATH_IMAGE026
, during binary operator control variables k=4, decrypt operation is M i=
Figure 341934DEST_PATH_IMAGE019
Figure 449567DEST_PATH_IMAGE010
Figure 268936DEST_PATH_IMAGE011
Figure 997912DEST_PATH_IMAGE012
Figure 931233DEST_PATH_IMAGE022
Figure 534756DEST_PATH_IMAGE014
Figure 599663DEST_PATH_IMAGE023
Figure 936098DEST_PATH_IMAGE015
Figure 162680DEST_PATH_IMAGE031
Figure 715890DEST_PATH_IMAGE016
Figure 318910DEST_PATH_IMAGE025
Figure 696801DEST_PATH_IMAGE017
Figure 110596DEST_PATH_IMAGE026
, during binary operator control variables k=5, decrypt operation is M i=
Figure 636256DEST_PATH_IMAGE019
Figure 298093DEST_PATH_IMAGE010
Figure 858387DEST_PATH_IMAGE027
Figure 177504DEST_PATH_IMAGE011
Figure 338544DEST_PATH_IMAGE012
Figure 2613DEST_PATH_IMAGE022
Figure 741899DEST_PATH_IMAGE013
Figure 992883DEST_PATH_IMAGE023
Figure 741396DEST_PATH_IMAGE014
Figure 435737DEST_PATH_IMAGE015
Figure 174017DEST_PATH_IMAGE032
Figure 460642DEST_PATH_IMAGE016
Figure 787718DEST_PATH_IMAGE033
Figure 383653DEST_PATH_IMAGE017
Figure 592918DEST_PATH_IMAGE026
, during binary operator control variables k=6, decrypt operation is M i=
Figure 433966DEST_PATH_IMAGE019
Figure 677865DEST_PATH_IMAGE010
Figure 438843DEST_PATH_IMAGE027
Figure 967093DEST_PATH_IMAGE021
Figure 816231DEST_PATH_IMAGE012
Figure 937826DEST_PATH_IMAGE013
Figure 369944DEST_PATH_IMAGE023
Figure 198540DEST_PATH_IMAGE024
Figure 26874DEST_PATH_IMAGE033
Figure 62515DEST_PATH_IMAGE034
, during binary operator control variables k=7, decrypt operation is M i=
Figure 255598DEST_PATH_IMAGE035
Figure 23484DEST_PATH_IMAGE010
Figure 341333DEST_PATH_IMAGE027
Figure 168212DEST_PATH_IMAGE011
Figure 215803DEST_PATH_IMAGE021
Figure 338611DEST_PATH_IMAGE012
Figure 206073DEST_PATH_IMAGE022
Figure 401142DEST_PATH_IMAGE013
Figure 303239DEST_PATH_IMAGE023
Figure 783899DEST_PATH_IMAGE014
Figure 154968DEST_PATH_IMAGE024
Figure 80254DEST_PATH_IMAGE025
Figure 794132DEST_PATH_IMAGE016
Figure 386918DEST_PATH_IMAGE034
Figure 844445DEST_PATH_IMAGE017
Figure 658817DEST_PATH_IMAGE026
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information , generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as , i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 196480DEST_PATH_IMAGE036
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 176943DEST_PATH_IMAGE001
carry out binary multivariate circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 232624DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multiparameter binary multivariate circulation encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as , 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 137397DEST_PATH_IMAGE002
,
Figure 854818DEST_PATH_IMAGE003
,
Figure 686245DEST_PATH_IMAGE004
,
Figure 438301DEST_PATH_IMAGE005
, ,
Figure 403163DEST_PATH_IMAGE007
, With
Figure 644843DEST_PATH_IMAGE009
, encryption parameter ,
Figure 267902DEST_PATH_IMAGE003
,
Figure 435273DEST_PATH_IMAGE004
,
Figure 896341DEST_PATH_IMAGE005
,
Figure 263869DEST_PATH_IMAGE006
,
Figure 505494DEST_PATH_IMAGE007
,
Figure 718301DEST_PATH_IMAGE008
With
Figure 797990DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 70840DEST_PATH_IMAGE010
Figure 737444DEST_PATH_IMAGE011
Figure 753942DEST_PATH_IMAGE012
Figure 251919DEST_PATH_IMAGE013
Figure 459784DEST_PATH_IMAGE014
Figure 348106DEST_PATH_IMAGE015
Figure 168294DEST_PATH_IMAGE016
Figure 894680DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 774911DEST_PATH_IMAGE010
Figure 150529DEST_PATH_IMAGE011
Figure 508829DEST_PATH_IMAGE012
Figure 423476DEST_PATH_IMAGE013
Figure 536926DEST_PATH_IMAGE014
Figure 399839DEST_PATH_IMAGE015
Figure 561831DEST_PATH_IMAGE016
Figure 561011DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 281580DEST_PATH_IMAGE010
Figure 535155DEST_PATH_IMAGE012
Figure 280311DEST_PATH_IMAGE014
Figure 117817DEST_PATH_IMAGE015
Figure 621611DEST_PATH_IMAGE016
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 44874DEST_PATH_IMAGE011
Figure 352359DEST_PATH_IMAGE012
Figure 431488DEST_PATH_IMAGE014
Figure 978007DEST_PATH_IMAGE015
Figure 89183DEST_PATH_IMAGE016
Figure 99864DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 475537DEST_PATH_IMAGE011
Figure 124824DEST_PATH_IMAGE012
Figure 927695DEST_PATH_IMAGE013
Figure 23881DEST_PATH_IMAGE015
Figure 211280DEST_PATH_IMAGE016
Figure 134237DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 880214DEST_PATH_IMAGE010
Figure 888621DEST_PATH_IMAGE011
Figure 657174DEST_PATH_IMAGE013
Figure 604816DEST_PATH_IMAGE016
Figure 299103DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 888347DEST_PATH_IMAGE010
Figure 369882DEST_PATH_IMAGE011
Figure 214975DEST_PATH_IMAGE014
Figure 482009DEST_PATH_IMAGE015
Figure 117127DEST_PATH_IMAGE016
Figure 395793DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 346748DEST_PATH_IMAGE011
Figure 519978DEST_PATH_IMAGE012
Figure 981047DEST_PATH_IMAGE013
Figure 348574DEST_PATH_IMAGE014
Figure 262303DEST_PATH_IMAGE015
Figure 233365DEST_PATH_IMAGE016
Figure 814519DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 87369DEST_PATH_IMAGE010
Figure 753973DEST_PATH_IMAGE011
Figure 269006DEST_PATH_IMAGE012
Figure 704667DEST_PATH_IMAGE013
Figure 621042DEST_PATH_IMAGE016
Figure 911209DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 791440DEST_PATH_IMAGE018
Figure 23893DEST_PATH_IMAGE019
Figure 496463DEST_PATH_IMAGE011
Figure 282016DEST_PATH_IMAGE020
Figure 306921DEST_PATH_IMAGE021
Figure 76075DEST_PATH_IMAGE013
Figure 298109DEST_PATH_IMAGE022
Figure 710635DEST_PATH_IMAGE014
Figure 410738DEST_PATH_IMAGE023
Figure 530004DEST_PATH_IMAGE015
Figure 2013100235163100001DEST_PATH_IMAGE024
Figure 359157DEST_PATH_IMAGE016
Figure 2013100235163100001DEST_PATH_IMAGE025
Figure 836861DEST_PATH_IMAGE017
Figure 2013100235163100001DEST_PATH_IMAGE026
, during binary operator control variables k=1, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 278338DEST_PATH_IMAGE019
Figure 750645DEST_PATH_IMAGE010
Figure 314482DEST_PATH_IMAGE020
Figure 701601DEST_PATH_IMAGE011
Figure 2013100235163100001DEST_PATH_IMAGE027
Figure 681189DEST_PATH_IMAGE012
Figure 2013100235163100001DEST_PATH_IMAGE028
Figure 211266DEST_PATH_IMAGE013
Figure 946003DEST_PATH_IMAGE022
Figure 554839DEST_PATH_IMAGE014
Figure 666015DEST_PATH_IMAGE023
Figure 112914DEST_PATH_IMAGE015
Figure 18553DEST_PATH_IMAGE024
Figure 52368DEST_PATH_IMAGE016
Figure 8921DEST_PATH_IMAGE017
Figure 147778DEST_PATH_IMAGE026
, during binary operator control variables k=2, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 668890DEST_PATH_IMAGE019
Figure 793972DEST_PATH_IMAGE010
Figure 533629DEST_PATH_IMAGE028
Figure 524719DEST_PATH_IMAGE012
Figure 302182DEST_PATH_IMAGE021
Figure 156743DEST_PATH_IMAGE013
Figure 2013100235163100001DEST_PATH_IMAGE029
Figure 760769DEST_PATH_IMAGE014
Figure 555550DEST_PATH_IMAGE023
Figure 187519DEST_PATH_IMAGE015
Figure 776764DEST_PATH_IMAGE024
Figure 252439DEST_PATH_IMAGE016
Figure 585331DEST_PATH_IMAGE025
Figure 71807DEST_PATH_IMAGE017
, during binary operator control variables k=3, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 364565DEST_PATH_IMAGE019
Figure 734105DEST_PATH_IMAGE010
Figure 340666DEST_PATH_IMAGE027
Figure 537293DEST_PATH_IMAGE011
Figure 963726DEST_PATH_IMAGE021
Figure 966317DEST_PATH_IMAGE012
Figure 925920DEST_PATH_IMAGE029
Figure 27869DEST_PATH_IMAGE013
Figure 207177DEST_PATH_IMAGE022
Figure 437356DEST_PATH_IMAGE015
Figure 913468DEST_PATH_IMAGE024
Figure 536625DEST_PATH_IMAGE017
Figure 980376DEST_PATH_IMAGE026
, during binary operator control variables k=4, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 632812DEST_PATH_IMAGE019
Figure 453001DEST_PATH_IMAGE010
Figure 743168DEST_PATH_IMAGE027
Figure 357820DEST_PATH_IMAGE011
Figure 231973DEST_PATH_IMAGE021
Figure 918169DEST_PATH_IMAGE012
Figure 62842DEST_PATH_IMAGE022
Figure 113975DEST_PATH_IMAGE013
Figure 976889DEST_PATH_IMAGE030
Figure 637415DEST_PATH_IMAGE014
Figure 902174DEST_PATH_IMAGE023
Figure 186525DEST_PATH_IMAGE015
Figure 2013100235163100001DEST_PATH_IMAGE031
Figure 809900DEST_PATH_IMAGE017
Figure 202835DEST_PATH_IMAGE026
, during binary operator control variables k=5, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 40341DEST_PATH_IMAGE019
Figure 606452DEST_PATH_IMAGE010
Figure 16442DEST_PATH_IMAGE027
Figure 580279DEST_PATH_IMAGE011
Figure 9303DEST_PATH_IMAGE012
Figure 601696DEST_PATH_IMAGE022
Figure 336434DEST_PATH_IMAGE013
Figure 882953DEST_PATH_IMAGE023
Figure 728549DEST_PATH_IMAGE014
Figure 175449DEST_PATH_IMAGE031
Figure 2013100235163100001DEST_PATH_IMAGE032
Figure 114903DEST_PATH_IMAGE016
Figure 2013100235163100001DEST_PATH_IMAGE033
Figure 206268DEST_PATH_IMAGE017
, during binary operator control variables k=6, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 351258DEST_PATH_IMAGE019
Figure 669107DEST_PATH_IMAGE010
Figure 122085DEST_PATH_IMAGE027
Figure 543577DEST_PATH_IMAGE011
Figure 791019DEST_PATH_IMAGE021
Figure 533847DEST_PATH_IMAGE012
Figure 524936DEST_PATH_IMAGE022
Figure 800935DEST_PATH_IMAGE013
Figure 714981DEST_PATH_IMAGE014
Figure 306499DEST_PATH_IMAGE024
Figure 204048DEST_PATH_IMAGE015
Figure 291828DEST_PATH_IMAGE033
Figure 9248DEST_PATH_IMAGE016
Figure 342140DEST_PATH_IMAGE025
Figure 94196DEST_PATH_IMAGE017
Figure 2013100235163100001DEST_PATH_IMAGE034
, during binary operator control variables k=7, binary multivariable circulation cryptographic calculation is defined as H i=
Figure 2013100235163100001DEST_PATH_IMAGE035
Figure 284700DEST_PATH_IMAGE010
Figure 489417DEST_PATH_IMAGE027
Figure 626000DEST_PATH_IMAGE011
Figure 731097DEST_PATH_IMAGE021
Figure 662144DEST_PATH_IMAGE012
Figure 416473DEST_PATH_IMAGE022
Figure 356747DEST_PATH_IMAGE013
Figure 817816DEST_PATH_IMAGE023
Figure 418299DEST_PATH_IMAGE014
Figure 597608DEST_PATH_IMAGE024
Figure 75994DEST_PATH_IMAGE015
Figure 391568DEST_PATH_IMAGE025
Figure 428532DEST_PATH_IMAGE016
Figure 891875DEST_PATH_IMAGE034
Figure 344033DEST_PATH_IMAGE026
, set encryption parameter
Figure 53363DEST_PATH_IMAGE002
,
Figure 446079DEST_PATH_IMAGE003
,
Figure 266267DEST_PATH_IMAGE004
,
Figure 618751DEST_PATH_IMAGE005
,
Figure 498983DEST_PATH_IMAGE006
,
Figure 874600DEST_PATH_IMAGE007
,
Figure 997015DEST_PATH_IMAGE008
With
Figure 141688DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 192821DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100235163100001DEST_PATH_IMAGE036
Carry out H 1=
Figure 2013100235163100001DEST_PATH_IMAGE037
Figure 529310DEST_PATH_IMAGE019
Figure 292605DEST_PATH_IMAGE011
Figure 2013100235163100001DEST_PATH_IMAGE038
Figure 578222DEST_PATH_IMAGE012
Figure 928432DEST_PATH_IMAGE021
Figure 956431DEST_PATH_IMAGE013
Figure 717899DEST_PATH_IMAGE014
Figure 788361DEST_PATH_IMAGE023
Figure 354472DEST_PATH_IMAGE015
Figure 593823DEST_PATH_IMAGE024
Figure 157660DEST_PATH_IMAGE016
Figure 216883DEST_PATH_IMAGE025
Figure 116760DEST_PATH_IMAGE026
Binary multivariable circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 913815DEST_PATH_IMAGE036
Carry out H 1=
Figure 305930DEST_PATH_IMAGE010
Figure 758689DEST_PATH_IMAGE019
Figure 664328DEST_PATH_IMAGE011
Figure 698143DEST_PATH_IMAGE038
Figure 409747DEST_PATH_IMAGE012
Figure 787694DEST_PATH_IMAGE013
Figure 761783DEST_PATH_IMAGE014
Figure 419161DEST_PATH_IMAGE023
Figure 165137DEST_PATH_IMAGE015
Figure 173545DEST_PATH_IMAGE024
Figure 4414DEST_PATH_IMAGE025
Figure 422758DEST_PATH_IMAGE017
Figure 416996DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of binary multivariable circulation cryptographic calculation, make next binary multivariable circulation cryptographic calculation point to H 2=
Figure 578167DEST_PATH_IMAGE010
Figure 2013100235163100001DEST_PATH_IMAGE039
Figure 432991DEST_PATH_IMAGE011
Figure 643087DEST_PATH_IMAGE027
Figure 728034DEST_PATH_IMAGE040
Figure 488180DEST_PATH_IMAGE013
Figure 390332DEST_PATH_IMAGE014
Figure 934577DEST_PATH_IMAGE023
Figure 865624DEST_PATH_IMAGE015
Figure 619953DEST_PATH_IMAGE024
Figure 793183DEST_PATH_IMAGE016
Figure 621779DEST_PATH_IMAGE017
Figure 801087DEST_PATH_IMAGE026
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 512429DEST_PATH_IMAGE041
Carry out H 2=
Figure 93583DEST_PATH_IMAGE019
Figure 428750DEST_PATH_IMAGE010
Figure 95354DEST_PATH_IMAGE039
Figure 111852DEST_PATH_IMAGE011
Figure 51907DEST_PATH_IMAGE027
Figure 649559DEST_PATH_IMAGE040
Figure 532064DEST_PATH_IMAGE013
Figure 258449DEST_PATH_IMAGE022
Figure 138681DEST_PATH_IMAGE014
Figure 576615DEST_PATH_IMAGE023
Figure 733718DEST_PATH_IMAGE024
Figure 784850DEST_PATH_IMAGE016
Figure 647764DEST_PATH_IMAGE025
Figure 308290DEST_PATH_IMAGE017
Figure 307471DEST_PATH_IMAGE026
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing in the time of binary multivariable circulation cryptographic calculation, make next binary multivariable circulation cryptographic calculation point to H 3=
Figure 529504DEST_PATH_IMAGE019
Figure 942031DEST_PATH_IMAGE010
Figure 907713DEST_PATH_IMAGE027
Figure 531373DEST_PATH_IMAGE011
Figure 658729DEST_PATH_IMAGE042
Figure 29DEST_PATH_IMAGE021
Figure 301697DEST_PATH_IMAGE013
Figure 98490DEST_PATH_IMAGE043
Figure 730777DEST_PATH_IMAGE023
Figure 559055DEST_PATH_IMAGE015
Figure 792328DEST_PATH_IMAGE024
Figure 401164DEST_PATH_IMAGE016
Figure 398387DEST_PATH_IMAGE017
Figure 366343DEST_PATH_IMAGE026
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this binary multivariable circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 898693DEST_PATH_IMAGE001
Carry out binary multivariable circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100235163A 2013-01-22 2013-01-22 Multi-parameter binary multivariant circulating encryption anti-fake information storage brand Pending CN103106477A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100235163A CN103106477A (en) 2013-01-22 2013-01-22 Multi-parameter binary multivariant circulating encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100235163A CN103106477A (en) 2013-01-22 2013-01-22 Multi-parameter binary multivariant circulating encryption anti-fake information storage brand

Publications (1)

Publication Number Publication Date
CN103106477A true CN103106477A (en) 2013-05-15

Family

ID=48314323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100235163A Pending CN103106477A (en) 2013-01-22 2013-01-22 Multi-parameter binary multivariant circulating encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103106477A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100103471A1 (en) * 2008-02-01 2010-04-29 Barclays Bank Delaware Systems and Methods for Encrypted Bar Code Generation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103116800A (en) Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106430A (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103106428A (en) One-parameter unary circulating encryption anti-fake information storage brand
CN103106477A (en) Multi-parameter binary multivariant circulating encryption anti-fake information storage brand
CN103106480A (en) Multi-parameter ternary multivariant circulating encryption anti-fake information storage brand
CN103106514A (en) Multi-parameter binary encryption anti-fake information storage brand
CN103106510A (en) Multi-parameter multivariant circulating encryption anti-fake information storage brand
CN103106483A (en) Multi-parameter ternary encryption anti-fake information storage brand
CN103136564A (en) Multi-parameter variable-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106496A (en) Multi-parameter unitary circulating encryption anti-fake information storage brand
CN103116785A (en) Multi-parameter multivariable unitary circulation encryption anti-fake information storage trademark
CN103106502A (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103116799A (en) Multi-parameter multivariable multivariate circulation encryption anti-fake information storage trademark
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103106462A (en) One-parameter double-variant multi-variant circulating encryption anti-fake information storage brand
CN103106522A (en) Multi-variable-parameter gradient binary-variant circulating encryption anti-fake information storage brand
CN103136562A (en) Multi-variable parameter-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark
CN103116791A (en) Multi-parameter multivariate multivariable circulation encryption anti-fake information storage trademark
CN103136561A (en) One-parameter multi-variable binary circulating encryption anti-fake information storage brand
CN103116793A (en) Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark
CN103106494A (en) Multi-variable-parameter gradient multi-variant circulating encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515