CN103106496A - Multi-parameter unitary circulating encryption anti-fake information storage brand - Google Patents

Multi-parameter unitary circulating encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103106496A
CN103106496A CN201310023760XA CN201310023760A CN103106496A CN 103106496 A CN103106496 A CN 103106496A CN 201310023760X A CN201310023760X A CN 201310023760XA CN 201310023760 A CN201310023760 A CN 201310023760A CN 103106496 A CN103106496 A CN 103106496A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310023760XA
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310023760XA priority Critical patent/CN103106496A/en
Publication of CN103106496A publication Critical patent/CN103106496A/en
Pending legal-status Critical Current

Links

Images

Abstract

Provided is a multi-parameter unitary circulating encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through unitary circulating encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots in a mode of circulating look-up table modulation. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multiparameter monobasic circulation encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, a kind of multiparameter monobasic circulation encryption anti-counterfeiting information storage trade mark particularly, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 201310023760X100002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 201310023760X100002DEST_PATH_IMAGE002
,
Figure 201310023760X100002DEST_PATH_IMAGE003
,
Figure 201310023760X100002DEST_PATH_IMAGE004
,
Figure 201310023760X100002DEST_PATH_IMAGE005
,
Figure 201310023760X100002DEST_PATH_IMAGE006
,
Figure 201310023760X100002DEST_PATH_IMAGE007
,
Figure 201310023760X100002DEST_PATH_IMAGE008
With
Figure 201310023760X100002DEST_PATH_IMAGE009
, encryption parameter
Figure 800108DEST_PATH_IMAGE002
,
Figure 144502DEST_PATH_IMAGE003
, ,
Figure 273181DEST_PATH_IMAGE005
,
Figure 161502DEST_PATH_IMAGE006
,
Figure 729494DEST_PATH_IMAGE007
,
Figure 19661DEST_PATH_IMAGE008
With
Figure 962209DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as j, d, e, f, g, h, r and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 201310023760X100002DEST_PATH_IMAGE010
Figure 201310023760X100002DEST_PATH_IMAGE011
Figure 201310023760X100002DEST_PATH_IMAGE012
Figure 201310023760X100002DEST_PATH_IMAGE013
Figure 201310023760X100002DEST_PATH_IMAGE014
Figure 201310023760X100002DEST_PATH_IMAGE016
Figure 201310023760X100002DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 898679DEST_PATH_IMAGE010
Figure 771826DEST_PATH_IMAGE011
Figure 916499DEST_PATH_IMAGE012
Figure 718364DEST_PATH_IMAGE013
Figure 643595DEST_PATH_IMAGE014
Figure 805586DEST_PATH_IMAGE015
Figure 319613DEST_PATH_IMAGE016
Figure 276067DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 374080DEST_PATH_IMAGE010
Figure 339762DEST_PATH_IMAGE011
Figure 521345DEST_PATH_IMAGE012
Figure 735474DEST_PATH_IMAGE014
Figure 990000DEST_PATH_IMAGE015
Figure 229352DEST_PATH_IMAGE016
Figure 42456DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 101679DEST_PATH_IMAGE010
Figure 471480DEST_PATH_IMAGE011
Figure 313141DEST_PATH_IMAGE012
Figure 47879DEST_PATH_IMAGE013
Figure 843665DEST_PATH_IMAGE014
Figure 689261DEST_PATH_IMAGE015
Figure 293997DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 577080DEST_PATH_IMAGE010
Figure 226367DEST_PATH_IMAGE011
Figure 777041DEST_PATH_IMAGE012
Figure 853581DEST_PATH_IMAGE013
Figure 623960DEST_PATH_IMAGE014
Figure 76938DEST_PATH_IMAGE015
Figure 732490DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 990165DEST_PATH_IMAGE010
Figure 43571DEST_PATH_IMAGE011
Figure 821034DEST_PATH_IMAGE012
Figure 987180DEST_PATH_IMAGE013
Figure 482884DEST_PATH_IMAGE014
Figure 261353DEST_PATH_IMAGE015
Figure 893322DEST_PATH_IMAGE016
Figure 810463DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 278615DEST_PATH_IMAGE010
Figure 611508DEST_PATH_IMAGE011
Figure 612831DEST_PATH_IMAGE012
Figure 348933DEST_PATH_IMAGE014
Figure 485516DEST_PATH_IMAGE015
Figure 334709DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 26722DEST_PATH_IMAGE010
Figure 913217DEST_PATH_IMAGE012
Figure 530012DEST_PATH_IMAGE013
Figure 709321DEST_PATH_IMAGE014
Figure 984445DEST_PATH_IMAGE015
Figure 313401DEST_PATH_IMAGE016
Figure 586251DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 518621DEST_PATH_IMAGE011
Figure 705014DEST_PATH_IMAGE012
Figure 476661DEST_PATH_IMAGE013
Figure 434438DEST_PATH_IMAGE015
Figure 724605DEST_PATH_IMAGE016
Figure 352639DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, monobasic circulation cryptographic calculation is defined as H i=
Figure 728257DEST_PATH_IMAGE010
Figure 273508DEST_PATH_IMAGE002
Figure 434493DEST_PATH_IMAGE011
Figure 506781DEST_PATH_IMAGE013
Figure 728815DEST_PATH_IMAGE005
Figure 293974DEST_PATH_IMAGE006
Figure 163972DEST_PATH_IMAGE015
Figure 291328DEST_PATH_IMAGE007
Figure 378102DEST_PATH_IMAGE016
Figure 869050DEST_PATH_IMAGE017
Figure 229624DEST_PATH_IMAGE009
, during binary operator control variables k=1, monobasic circulation cryptographic calculation is defined as H i=
Figure 554426DEST_PATH_IMAGE002
Figure 111178DEST_PATH_IMAGE010
Figure 362610DEST_PATH_IMAGE003
Figure 280254DEST_PATH_IMAGE013
Figure 933695DEST_PATH_IMAGE005
Figure 967511DEST_PATH_IMAGE014
Figure 295035DEST_PATH_IMAGE015
Figure 141954DEST_PATH_IMAGE016
Figure 391670DEST_PATH_IMAGE008
Figure 434505DEST_PATH_IMAGE009
, during binary operator control variables k=2, monobasic circulation cryptographic calculation is defined as H i=
Figure 193644DEST_PATH_IMAGE002
Figure 247051DEST_PATH_IMAGE010
Figure 629808DEST_PATH_IMAGE011
Figure 545418DEST_PATH_IMAGE012
Figure 589466DEST_PATH_IMAGE004
Figure 221436DEST_PATH_IMAGE013
Figure 939621DEST_PATH_IMAGE006
Figure 675365DEST_PATH_IMAGE015
Figure 701090DEST_PATH_IMAGE007
Figure 677046DEST_PATH_IMAGE016
Figure 813630DEST_PATH_IMAGE008
Figure 216929DEST_PATH_IMAGE017
Figure 662823DEST_PATH_IMAGE009
, during binary operator control variables k=3, monobasic circulation cryptographic calculation is defined as H i=
Figure 354835DEST_PATH_IMAGE002
Figure 780263DEST_PATH_IMAGE010
Figure 241331DEST_PATH_IMAGE003
Figure 858126DEST_PATH_IMAGE011
Figure 998044DEST_PATH_IMAGE012
Figure 201310023760X100002DEST_PATH_IMAGE021
Figure 766149DEST_PATH_IMAGE013
Figure 38998DEST_PATH_IMAGE005
Figure 456335DEST_PATH_IMAGE014
Figure 970810DEST_PATH_IMAGE015
Figure 663829DEST_PATH_IMAGE007
Figure 385721DEST_PATH_IMAGE008
Figure 675888DEST_PATH_IMAGE017
Figure 805387DEST_PATH_IMAGE009
, during binary operator control variables k=4, monobasic circulation cryptographic calculation is defined as H i=
Figure 243321DEST_PATH_IMAGE002
Figure 261142DEST_PATH_IMAGE003
Figure 46695DEST_PATH_IMAGE011
Figure 158876DEST_PATH_IMAGE004
Figure 320868DEST_PATH_IMAGE012
Figure 617780DEST_PATH_IMAGE013
Figure 154941DEST_PATH_IMAGE014
Figure 855044DEST_PATH_IMAGE006
Figure 725042DEST_PATH_IMAGE015
Figure 17800DEST_PATH_IMAGE016
Figure 770861DEST_PATH_IMAGE008
Figure 744633DEST_PATH_IMAGE017
Figure 56273DEST_PATH_IMAGE009
, during binary operator control variables k=5, monobasic circulation cryptographic calculation is defined as H i=
Figure 381075DEST_PATH_IMAGE002
Figure 672248DEST_PATH_IMAGE010
Figure 828422DEST_PATH_IMAGE003
Figure 860412DEST_PATH_IMAGE004
Figure 971587DEST_PATH_IMAGE012
Figure 74858DEST_PATH_IMAGE013
Figure 856476DEST_PATH_IMAGE006
Figure 240184DEST_PATH_IMAGE014
Figure 201310023760X100002DEST_PATH_IMAGE023
Figure 495585DEST_PATH_IMAGE015
Figure 322858DEST_PATH_IMAGE007
Figure 843969DEST_PATH_IMAGE016
Figure 280635DEST_PATH_IMAGE008
Figure 203592DEST_PATH_IMAGE017
Figure 198836DEST_PATH_IMAGE009
, during binary operator control variables k=6, monobasic circulation cryptographic calculation is defined as H i=
Figure 287381DEST_PATH_IMAGE003
Figure 705724DEST_PATH_IMAGE011
Figure 481361DEST_PATH_IMAGE012
Figure 362599DEST_PATH_IMAGE005
Figure 951843DEST_PATH_IMAGE013
Figure 706083DEST_PATH_IMAGE006
Figure 101292DEST_PATH_IMAGE014
Figure 587768DEST_PATH_IMAGE007
Figure 862760DEST_PATH_IMAGE015
Figure 755892DEST_PATH_IMAGE016
Figure 626896DEST_PATH_IMAGE008
Figure 295775DEST_PATH_IMAGE017
Figure 741669DEST_PATH_IMAGE009
, during binary operator control variables k=7, monobasic circulation cryptographic calculation is defined as H i=
Figure 168102DEST_PATH_IMAGE002
Figure 856179DEST_PATH_IMAGE010
Figure 317247DEST_PATH_IMAGE003
Figure 668463DEST_PATH_IMAGE011
Figure 910089DEST_PATH_IMAGE004
Figure 388474DEST_PATH_IMAGE012
Figure 454782DEST_PATH_IMAGE005
Figure 993210DEST_PATH_IMAGE013
Figure 643503DEST_PATH_IMAGE006
Figure 925580DEST_PATH_IMAGE014
Figure 109044DEST_PATH_IMAGE007
Figure 615111DEST_PATH_IMAGE015
Figure 769012DEST_PATH_IMAGE008
Figure 838468DEST_PATH_IMAGE016
Figure 128635DEST_PATH_IMAGE025
Figure 869637DEST_PATH_IMAGE009
, set encryption parameter
Figure 742784DEST_PATH_IMAGE002
,
Figure 887458DEST_PATH_IMAGE003
,
Figure 907DEST_PATH_IMAGE004
,
Figure 611624DEST_PATH_IMAGE005
,
Figure 773615DEST_PATH_IMAGE006
,
Figure 287642DEST_PATH_IMAGE007
,
Figure 509676DEST_PATH_IMAGE008
With
Figure 345039DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 310721DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure 256210DEST_PATH_IMAGE010
Figure 156033DEST_PATH_IMAGE002
Figure 659827DEST_PATH_IMAGE011
Figure 882867DEST_PATH_IMAGE003
Figure 446703DEST_PATH_IMAGE012
Figure 564143DEST_PATH_IMAGE013
Figure 720318DEST_PATH_IMAGE005
Figure 704323DEST_PATH_IMAGE014
Figure 250842DEST_PATH_IMAGE006
Figure 844241DEST_PATH_IMAGE015
Figure 792606DEST_PATH_IMAGE007
Figure 947512DEST_PATH_IMAGE016
Figure 43644DEST_PATH_IMAGE008
Figure 692931DEST_PATH_IMAGE017
Figure 512114DEST_PATH_IMAGE009
Monobasic circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 588654DEST_PATH_IMAGE026
Carry out H 1=
Figure 93454DEST_PATH_IMAGE027
Figure 531706DEST_PATH_IMAGE002
Figure 510135DEST_PATH_IMAGE012
Figure 287599DEST_PATH_IMAGE004
Figure 14694DEST_PATH_IMAGE005
Figure 543896DEST_PATH_IMAGE014
Figure 690712DEST_PATH_IMAGE006
Figure 279956DEST_PATH_IMAGE015
Figure 768617DEST_PATH_IMAGE007
Figure 101509DEST_PATH_IMAGE016
Figure 102832DEST_PATH_IMAGE008
Figure 862978DEST_PATH_IMAGE017
Figure 130011DEST_PATH_IMAGE009
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, q+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 2=
Figure 17327DEST_PATH_IMAGE002
Figure 623889DEST_PATH_IMAGE010
Figure 741886DEST_PATH_IMAGE011
Figure 645361DEST_PATH_IMAGE004
Figure 996577DEST_PATH_IMAGE013
Figure 864301DEST_PATH_IMAGE005
Figure 405004DEST_PATH_IMAGE014
Figure 720578DEST_PATH_IMAGE006
Figure 508275DEST_PATH_IMAGE015
Figure 909300DEST_PATH_IMAGE007
Figure 939180DEST_PATH_IMAGE016
Figure 109261DEST_PATH_IMAGE008
Figure 67859DEST_PATH_IMAGE017
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 527101DEST_PATH_IMAGE029
Carry out H 2=
Figure 696286DEST_PATH_IMAGE028
Figure 569433DEST_PATH_IMAGE011
Figure 714107DEST_PATH_IMAGE003
Figure 513042DEST_PATH_IMAGE012
Figure 375956DEST_PATH_IMAGE004
Figure 787214DEST_PATH_IMAGE013
Figure 51974DEST_PATH_IMAGE005
Figure 759161DEST_PATH_IMAGE014
Figure 109371DEST_PATH_IMAGE006
Figure 324320DEST_PATH_IMAGE015
Figure 898838DEST_PATH_IMAGE016
Figure 218567DEST_PATH_IMAGE008
Figure 722361DEST_PATH_IMAGE017
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, q+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 3=
Figure 774817DEST_PATH_IMAGE002
Figure 892256DEST_PATH_IMAGE003
Figure 201310023760X100002DEST_PATH_IMAGE030
Figure 406338DEST_PATH_IMAGE012
Figure 952857DEST_PATH_IMAGE004
Figure 47721DEST_PATH_IMAGE013
Figure 996085DEST_PATH_IMAGE005
Figure 649527DEST_PATH_IMAGE014
Figure 683342DEST_PATH_IMAGE006
Figure 581897DEST_PATH_IMAGE015
Figure 447085DEST_PATH_IMAGE007
Figure 523625DEST_PATH_IMAGE016
Figure 248447DEST_PATH_IMAGE017
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table carry out monobasic circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to monobasic circulation cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 994681DEST_PATH_IMAGE002
, , , ,
Figure 677280DEST_PATH_IMAGE006
, , With
Figure 942543DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value when initial value of setting encryption variables j, d, e, f, g, h, r and q is encryption, the initial value design of binary operator control variables k is k=0, known by monobasic circulation ciphering process, and during binary operator control variables k=0, decrypt operation is M i=
Figure 722280DEST_PATH_IMAGE018
Figure 802975DEST_PATH_IMAGE010
Figure 555030DEST_PATH_IMAGE002
Figure 564443DEST_PATH_IMAGE011
Figure 769160DEST_PATH_IMAGE003
Figure 656476DEST_PATH_IMAGE012
Figure 263037DEST_PATH_IMAGE004
Figure 256401DEST_PATH_IMAGE013
Figure 197681DEST_PATH_IMAGE005
Figure 81247DEST_PATH_IMAGE006
Figure 448775DEST_PATH_IMAGE015
Figure 877351DEST_PATH_IMAGE007
Figure 152474DEST_PATH_IMAGE016
Figure 733628DEST_PATH_IMAGE008
Figure 128182DEST_PATH_IMAGE017
Figure 794787DEST_PATH_IMAGE009
, during binary operator control variables k=1, decrypt operation is M i=
Figure 562017DEST_PATH_IMAGE002
Figure 997677DEST_PATH_IMAGE010
Figure 956275DEST_PATH_IMAGE019
Figure 844596DEST_PATH_IMAGE011
Figure 412588DEST_PATH_IMAGE003
Figure 702755DEST_PATH_IMAGE012
Figure 832254DEST_PATH_IMAGE004
Figure 207871DEST_PATH_IMAGE013
Figure 316904DEST_PATH_IMAGE005
Figure 840606DEST_PATH_IMAGE006
Figure 952787DEST_PATH_IMAGE015
Figure 114779DEST_PATH_IMAGE007
Figure 83795DEST_PATH_IMAGE008
Figure 683273DEST_PATH_IMAGE017
Figure 648955DEST_PATH_IMAGE009
, during binary operator control variables k=2, decrypt operation is M i=
Figure 518953DEST_PATH_IMAGE002
Figure 646309DEST_PATH_IMAGE010
Figure 733082DEST_PATH_IMAGE003
Figure 299193DEST_PATH_IMAGE011
Figure 538544DEST_PATH_IMAGE020
Figure 584604DEST_PATH_IMAGE012
Figure 909406DEST_PATH_IMAGE004
Figure 466159DEST_PATH_IMAGE013
Figure 91492DEST_PATH_IMAGE014
Figure 499919DEST_PATH_IMAGE015
Figure 697551DEST_PATH_IMAGE007
Figure 603190DEST_PATH_IMAGE016
Figure 408245DEST_PATH_IMAGE008
Figure 922720DEST_PATH_IMAGE009
, during binary operator control variables k=3, decrypt operation is M i=
Figure 248528DEST_PATH_IMAGE002
Figure 769640DEST_PATH_IMAGE010
Figure 630727DEST_PATH_IMAGE011
Figure 189251DEST_PATH_IMAGE021
Figure 714517DEST_PATH_IMAGE013
Figure 612251DEST_PATH_IMAGE014
Figure 407032DEST_PATH_IMAGE006
Figure 789734DEST_PATH_IMAGE015
Figure 441295DEST_PATH_IMAGE007
Figure 424295DEST_PATH_IMAGE016
Figure 492931DEST_PATH_IMAGE017
Figure 266458DEST_PATH_IMAGE009
, during binary operator control variables k=4, decrypt operation is M i=
Figure 471175DEST_PATH_IMAGE002
Figure 857026DEST_PATH_IMAGE010
Figure 260325DEST_PATH_IMAGE003
Figure 899696DEST_PATH_IMAGE004
Figure 574391DEST_PATH_IMAGE012
Figure 655699DEST_PATH_IMAGE005
Figure 23226DEST_PATH_IMAGE013
Figure 186223DEST_PATH_IMAGE022
Figure 664609DEST_PATH_IMAGE014
Figure 993566DEST_PATH_IMAGE006
Figure 266415DEST_PATH_IMAGE015
Figure 995337DEST_PATH_IMAGE007
Figure 261102DEST_PATH_IMAGE016
Figure 891246DEST_PATH_IMAGE017
Figure 45147DEST_PATH_IMAGE009
, during binary operator control variables k=5, decrypt operation is M i=
Figure 114603DEST_PATH_IMAGE002
Figure 404770DEST_PATH_IMAGE010
Figure 347318DEST_PATH_IMAGE003
Figure 470738DEST_PATH_IMAGE011
Figure 829038DEST_PATH_IMAGE004
Figure 488559DEST_PATH_IMAGE012
Figure 274112DEST_PATH_IMAGE005
Figure 887758DEST_PATH_IMAGE013
Figure 848127DEST_PATH_IMAGE023
Figure 198337DEST_PATH_IMAGE015
Figure 669680DEST_PATH_IMAGE007
Figure 788946DEST_PATH_IMAGE016
Figure 431148DEST_PATH_IMAGE008
Figure 268654DEST_PATH_IMAGE017
Figure 523180DEST_PATH_IMAGE009
, during binary operator control variables k=6, decrypt operation is M i=
Figure 496953DEST_PATH_IMAGE002
Figure 634859DEST_PATH_IMAGE003
Figure 518425DEST_PATH_IMAGE004
Figure 502430DEST_PATH_IMAGE012
Figure 910857DEST_PATH_IMAGE013
Figure 921539DEST_PATH_IMAGE006
Figure 110260DEST_PATH_IMAGE007
Figure 493968DEST_PATH_IMAGE015
Figure 310221DEST_PATH_IMAGE024
Figure 386762DEST_PATH_IMAGE016
Figure 157140DEST_PATH_IMAGE008
Figure 406856DEST_PATH_IMAGE017
Figure 18228DEST_PATH_IMAGE009
, during binary operator control variables k=7, decrypt operation is M i=
Figure 265670DEST_PATH_IMAGE002
Figure 336394DEST_PATH_IMAGE010
Figure 576751DEST_PATH_IMAGE003
Figure 354215DEST_PATH_IMAGE011
Figure 520360DEST_PATH_IMAGE004
Figure 750485DEST_PATH_IMAGE012
Figure 488819DEST_PATH_IMAGE013
Figure 78064DEST_PATH_IMAGE006
Figure 144688DEST_PATH_IMAGE007
Figure 880432DEST_PATH_IMAGE015
Figure 906156DEST_PATH_IMAGE008
Figure 858676DEST_PATH_IMAGE016
Figure 398558DEST_PATH_IMAGE017
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information , generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 961892DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 774176DEST_PATH_IMAGE001
carry out monobasic circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 953485DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multiparameter monobasic circulation encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 201310023760X100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively ,
Figure 201310023760X100001DEST_PATH_IMAGE003
, ,
Figure 201310023760X100001DEST_PATH_IMAGE005
,
Figure 201310023760X100001DEST_PATH_IMAGE006
,
Figure 201310023760X100001DEST_PATH_IMAGE007
,
Figure 201310023760X100001DEST_PATH_IMAGE008
With
Figure 201310023760X100001DEST_PATH_IMAGE009
, encryption parameter
Figure 73594DEST_PATH_IMAGE002
,
Figure 389169DEST_PATH_IMAGE003
, ,
Figure 76426DEST_PATH_IMAGE005
, ,
Figure 105748DEST_PATH_IMAGE007
,
Figure 549498DEST_PATH_IMAGE008
With
Figure 454132DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as j, d, e, f, g, h, r and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 201310023760X100001DEST_PATH_IMAGE010
Figure 201310023760X100001DEST_PATH_IMAGE011
Figure 201310023760X100001DEST_PATH_IMAGE012
Figure 201310023760X100001DEST_PATH_IMAGE013
Figure 201310023760X100001DEST_PATH_IMAGE016
Figure 201310023760X100001DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 835172DEST_PATH_IMAGE010
Figure 125339DEST_PATH_IMAGE011
Figure 364877DEST_PATH_IMAGE013
Figure 736559DEST_PATH_IMAGE014
Figure 881232DEST_PATH_IMAGE015
Figure 994682DEST_PATH_IMAGE016
Figure 106863DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 268854DEST_PATH_IMAGE010
Figure 284346DEST_PATH_IMAGE011
Figure 506380DEST_PATH_IMAGE012
Figure 840278DEST_PATH_IMAGE013
Figure 868277DEST_PATH_IMAGE014
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 718848DEST_PATH_IMAGE010
Figure 692620DEST_PATH_IMAGE011
Figure 7189DEST_PATH_IMAGE012
Figure 66412DEST_PATH_IMAGE013
Figure 514077DEST_PATH_IMAGE016
Figure 831836DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 677432DEST_PATH_IMAGE010
Figure 812747DEST_PATH_IMAGE011
Figure 469119DEST_PATH_IMAGE012
Figure 502934DEST_PATH_IMAGE013
Figure 469939DEST_PATH_IMAGE015
Figure 549814DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 65109DEST_PATH_IMAGE010
Figure 237333DEST_PATH_IMAGE011
Figure 484775DEST_PATH_IMAGE012
Figure 969425DEST_PATH_IMAGE014
Figure 996156DEST_PATH_IMAGE015
Figure 972519DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 249523DEST_PATH_IMAGE010
Figure 147072DEST_PATH_IMAGE011
Figure 985584DEST_PATH_IMAGE012
Figure 786629DEST_PATH_IMAGE014
Figure 601001DEST_PATH_IMAGE015
Figure 361147DEST_PATH_IMAGE016
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 951714DEST_PATH_IMAGE010
Figure 306079DEST_PATH_IMAGE011
Figure 237126DEST_PATH_IMAGE012
Figure 180997DEST_PATH_IMAGE014
Figure 494746DEST_PATH_IMAGE016
Figure 674054DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 401708DEST_PATH_IMAGE010
Figure 779599DEST_PATH_IMAGE011
Figure 318028DEST_PATH_IMAGE012
Figure 466856DEST_PATH_IMAGE013
Figure 748933DEST_PATH_IMAGE014
Figure 168282DEST_PATH_IMAGE015
Figure 877612DEST_PATH_IMAGE016
Figure 516666DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, monobasic circulation cryptographic calculation is defined as H i=
Figure 201310023760X100001DEST_PATH_IMAGE018
Figure 336854DEST_PATH_IMAGE010
Figure 876289DEST_PATH_IMAGE002
Figure 756520DEST_PATH_IMAGE011
Figure 879941DEST_PATH_IMAGE003
Figure 503820DEST_PATH_IMAGE012
Figure 897761DEST_PATH_IMAGE004
Figure 948894DEST_PATH_IMAGE013
Figure 786848DEST_PATH_IMAGE014
Figure 51607DEST_PATH_IMAGE006
Figure 607539DEST_PATH_IMAGE007
Figure 321024DEST_PATH_IMAGE016
Figure 440290DEST_PATH_IMAGE008
Figure 82493DEST_PATH_IMAGE017
Figure 654419DEST_PATH_IMAGE009
, during binary operator control variables k=1, monobasic circulation cryptographic calculation is defined as H i=
Figure 908946DEST_PATH_IMAGE002
Figure 148297DEST_PATH_IMAGE010
Figure 201310023760X100001DEST_PATH_IMAGE019
Figure 899084DEST_PATH_IMAGE011
Figure 20624DEST_PATH_IMAGE003
Figure 75911DEST_PATH_IMAGE012
Figure 169769DEST_PATH_IMAGE004
Figure 153775DEST_PATH_IMAGE013
Figure 307304DEST_PATH_IMAGE006
Figure 496025DEST_PATH_IMAGE007
Figure 145313DEST_PATH_IMAGE016
Figure 531924DEST_PATH_IMAGE008
Figure 608464DEST_PATH_IMAGE017
Figure 378843DEST_PATH_IMAGE009
, during binary operator control variables k=2, monobasic circulation cryptographic calculation is defined as H i=
Figure 894138DEST_PATH_IMAGE002
Figure 294562DEST_PATH_IMAGE003
Figure 302970DEST_PATH_IMAGE011
Figure 201310023760X100001DEST_PATH_IMAGE020
Figure 481010DEST_PATH_IMAGE012
Figure 9206DEST_PATH_IMAGE004
Figure 427549DEST_PATH_IMAGE013
Figure 172520DEST_PATH_IMAGE005
Figure 81494DEST_PATH_IMAGE006
Figure 936317DEST_PATH_IMAGE015
Figure 903005DEST_PATH_IMAGE007
Figure 235897DEST_PATH_IMAGE016
Figure 738685DEST_PATH_IMAGE008
Figure 498831DEST_PATH_IMAGE017
Figure 765864DEST_PATH_IMAGE009
, during binary operator control variables k=3, monobasic circulation cryptographic calculation is defined as H i=
Figure 151715DEST_PATH_IMAGE002
Figure 758277DEST_PATH_IMAGE010
Figure 437126DEST_PATH_IMAGE003
Figure 129139DEST_PATH_IMAGE011
Figure 53101DEST_PATH_IMAGE004
Figure 576487DEST_PATH_IMAGE012
Figure 201310023760X100001DEST_PATH_IMAGE021
Figure 632429DEST_PATH_IMAGE013
Figure 811738DEST_PATH_IMAGE005
Figure 273812DEST_PATH_IMAGE014
Figure 190133DEST_PATH_IMAGE015
Figure 604540DEST_PATH_IMAGE007
Figure 305966DEST_PATH_IMAGE008
Figure 15296DEST_PATH_IMAGE017
Figure 654350DEST_PATH_IMAGE009
, during binary operator control variables k=4, monobasic circulation cryptographic calculation is defined as H i=
Figure 474538DEST_PATH_IMAGE002
Figure 827022DEST_PATH_IMAGE010
Figure 332139DEST_PATH_IMAGE011
Figure 438242DEST_PATH_IMAGE004
Figure 148895DEST_PATH_IMAGE005
Figure 11808DEST_PATH_IMAGE013
Figure 201310023760X100001DEST_PATH_IMAGE022
Figure 924532DEST_PATH_IMAGE014
Figure 923712DEST_PATH_IMAGE006
Figure 395013DEST_PATH_IMAGE015
Figure 745223DEST_PATH_IMAGE007
Figure 482146DEST_PATH_IMAGE016
Figure 102669DEST_PATH_IMAGE017
Figure 940175DEST_PATH_IMAGE009
, during binary operator control variables k=5, monobasic circulation cryptographic calculation is defined as H i=
Figure 693236DEST_PATH_IMAGE002
Figure 932587DEST_PATH_IMAGE010
Figure 978647DEST_PATH_IMAGE003
Figure 365766DEST_PATH_IMAGE011
Figure 673251DEST_PATH_IMAGE004
Figure 750797DEST_PATH_IMAGE012
Figure 485535DEST_PATH_IMAGE005
Figure 782786DEST_PATH_IMAGE013
Figure 893962DEST_PATH_IMAGE006
Figure 904643DEST_PATH_IMAGE014
Figure 201310023760X100001DEST_PATH_IMAGE023
Figure 778851DEST_PATH_IMAGE007
Figure 428138DEST_PATH_IMAGE016
Figure 480277DEST_PATH_IMAGE008
Figure 556817DEST_PATH_IMAGE017
, during binary operator control variables k=6, monobasic circulation cryptographic calculation is defined as H i=
Figure 78376DEST_PATH_IMAGE002
Figure 1333DEST_PATH_IMAGE010
Figure 498042DEST_PATH_IMAGE003
Figure 506450DEST_PATH_IMAGE011
Figure 245342DEST_PATH_IMAGE004
Figure 22805DEST_PATH_IMAGE012
Figure 503465DEST_PATH_IMAGE005
Figure 982857DEST_PATH_IMAGE013
Figure 777637DEST_PATH_IMAGE006
Figure 160340DEST_PATH_IMAGE014
Figure 981851DEST_PATH_IMAGE015
Figure 377060DEST_PATH_IMAGE024
Figure 863536DEST_PATH_IMAGE016
Figure 637064DEST_PATH_IMAGE008
Figure 227631DEST_PATH_IMAGE009
, during binary operator control variables k=7, monobasic circulation cryptographic calculation is defined as H i=
Figure 568614DEST_PATH_IMAGE002
Figure 270302DEST_PATH_IMAGE003
Figure 944997DEST_PATH_IMAGE011
Figure 655333DEST_PATH_IMAGE004
Figure 22860DEST_PATH_IMAGE012
Figure 684392DEST_PATH_IMAGE005
Figure 162778DEST_PATH_IMAGE013
Figure 993200DEST_PATH_IMAGE006
Figure 328366DEST_PATH_IMAGE014
Figure 994971DEST_PATH_IMAGE007
Figure 384812DEST_PATH_IMAGE008
Figure 828563DEST_PATH_IMAGE016
Figure 730266DEST_PATH_IMAGE025
Figure 550455DEST_PATH_IMAGE017
Figure 902939DEST_PATH_IMAGE009
, set encryption parameter
Figure 32437DEST_PATH_IMAGE002
, ,
Figure 517088DEST_PATH_IMAGE004
,
Figure 927340DEST_PATH_IMAGE005
,
Figure 962161DEST_PATH_IMAGE006
,
Figure 825075DEST_PATH_IMAGE007
, With Initial value, set the initial value of encryption variables j, d, e, f, g, h, r and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 432050DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 532993DEST_PATH_IMAGE026
Carry out H 1=
Figure 287115DEST_PATH_IMAGE010
Figure 430782DEST_PATH_IMAGE002
Figure 268288DEST_PATH_IMAGE011
Figure 21349DEST_PATH_IMAGE003
Figure 995122DEST_PATH_IMAGE012
Figure 631563DEST_PATH_IMAGE013
Figure 735785DEST_PATH_IMAGE005
Figure 78911DEST_PATH_IMAGE014
Figure 813649DEST_PATH_IMAGE006
Figure 110900DEST_PATH_IMAGE015
Figure 222075DEST_PATH_IMAGE007
Figure 419707DEST_PATH_IMAGE016
Figure 387663DEST_PATH_IMAGE008
Figure 421479DEST_PATH_IMAGE017
Figure 552989DEST_PATH_IMAGE009
Monobasic circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 621439DEST_PATH_IMAGE026
Carry out H 1=
Figure 468359DEST_PATH_IMAGE010
Figure 718074DEST_PATH_IMAGE002
Figure 391763DEST_PATH_IMAGE011
Figure 896880DEST_PATH_IMAGE012
Figure 413236DEST_PATH_IMAGE013
Figure 831579DEST_PATH_IMAGE005
Figure 124020DEST_PATH_IMAGE014
Figure 168068DEST_PATH_IMAGE006
Figure 800038DEST_PATH_IMAGE015
Figure 140014DEST_PATH_IMAGE007
Figure 123014DEST_PATH_IMAGE016
Figure 965177DEST_PATH_IMAGE009
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, q+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 2=
Figure 232211DEST_PATH_IMAGE002
Figure 103215DEST_PATH_IMAGE010
Figure 959044DEST_PATH_IMAGE028
Figure 155670DEST_PATH_IMAGE011
Figure 332836DEST_PATH_IMAGE003
Figure 273110DEST_PATH_IMAGE012
Figure 983446DEST_PATH_IMAGE004
Figure 147711DEST_PATH_IMAGE013
Figure 327020DEST_PATH_IMAGE005
Figure 553208DEST_PATH_IMAGE014
Figure 868783DEST_PATH_IMAGE006
Figure 656479DEST_PATH_IMAGE015
Figure 57505DEST_PATH_IMAGE007
Figure 588292DEST_PATH_IMAGE008
Figure 32042DEST_PATH_IMAGE017
Figure 435211DEST_PATH_IMAGE009
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 255399DEST_PATH_IMAGE029
Carry out H 2=
Figure 293369DEST_PATH_IMAGE002
Figure 908021DEST_PATH_IMAGE010
Figure 345956DEST_PATH_IMAGE028
Figure 219103DEST_PATH_IMAGE011
Figure 165641DEST_PATH_IMAGE012
Figure 28555DEST_PATH_IMAGE004
Figure 439814DEST_PATH_IMAGE013
Figure 766890DEST_PATH_IMAGE005
Figure 844795DEST_PATH_IMAGE006
Figure 810477DEST_PATH_IMAGE015
Figure 179010DEST_PATH_IMAGE007
Figure 160183DEST_PATH_IMAGE008
Figure 700066DEST_PATH_IMAGE009
Carry out i+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, q+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 3=
Figure 513170DEST_PATH_IMAGE002
Figure 572393DEST_PATH_IMAGE010
Figure 627681DEST_PATH_IMAGE003
Figure 721538DEST_PATH_IMAGE011
Figure 252063DEST_PATH_IMAGE012
Figure 159976DEST_PATH_IMAGE004
Figure 859073DEST_PATH_IMAGE013
Figure 764712DEST_PATH_IMAGE005
Figure 47795DEST_PATH_IMAGE014
Figure 697082DEST_PATH_IMAGE006
Figure 513335DEST_PATH_IMAGE015
Figure 652192DEST_PATH_IMAGE007
Figure 907724DEST_PATH_IMAGE016
Figure 609970DEST_PATH_IMAGE008
Figure 532926DEST_PATH_IMAGE017
Figure 531100DEST_PATH_IMAGE009
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 273928DEST_PATH_IMAGE001
carry out monobasic circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310023760XA 2013-01-22 2013-01-22 Multi-parameter unitary circulating encryption anti-fake information storage brand Pending CN103106496A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310023760XA CN103106496A (en) 2013-01-22 2013-01-22 Multi-parameter unitary circulating encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310023760XA CN103106496A (en) 2013-01-22 2013-01-22 Multi-parameter unitary circulating encryption anti-fake information storage brand

Publications (1)

Publication Number Publication Date
CN103106496A true CN103106496A (en) 2013-05-15

Family

ID=48314342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310023760XA Pending CN103106496A (en) 2013-01-22 2013-01-22 Multi-parameter unitary circulating encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103106496A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国,裴定一: "《密码学导引》", 30 April 1999 *

Similar Documents

Publication Publication Date Title
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106428A (en) One-parameter unary circulating encryption anti-fake information storage brand
CN103106496A (en) Multi-parameter unitary circulating encryption anti-fake information storage brand
CN103106514A (en) Multi-parameter binary encryption anti-fake information storage brand
CN103106510A (en) Multi-parameter multivariant circulating encryption anti-fake information storage brand
CN103106483A (en) Multi-parameter ternary encryption anti-fake information storage brand
CN103136564A (en) Multi-parameter variable-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106477A (en) Multi-parameter binary multivariant circulating encryption anti-fake information storage brand
CN103106485A (en) One-parameter double-variant unary circulating encryption anti-fake information storage brand
CN103106522A (en) Multi-variable-parameter gradient binary-variant circulating encryption anti-fake information storage brand
CN103106480A (en) Multi-parameter ternary multivariant circulating encryption anti-fake information storage brand
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103106462A (en) One-parameter double-variant multi-variant circulating encryption anti-fake information storage brand
CN103106481A (en) One-parameter double-variant binary circulating encryption anti-fake information storage brand
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106492A (en) Parameter-gradient multivariable circulating-encryption anti-fake information storage trademark
CN103106488A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106502A (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103136561A (en) One-parameter multi-variable binary circulating encryption anti-fake information storage brand
CN103106436A (en) Multiparameter univariate unitary cycle encryption anti-fake information storage trademark
CN103106473A (en) One-parameter double-variant binary encryption anti-fake information storage brand
CN103106507A (en) Multiparameter univariate unitary encryption anti-fake information storage trademark
CN103136562A (en) Multi-variable parameter-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106490A (en) Multiparameter polytomy variable cycle encryption anti-fake information storage trademark
CN103106497A (en) Multiparameter univariate binary variable cycle encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515