CN103106502A - Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand - Google Patents

Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103106502A
CN103106502A CN2013100238000A CN201310023800A CN103106502A CN 103106502 A CN103106502 A CN 103106502A CN 2013100238000 A CN2013100238000 A CN 2013100238000A CN 201310023800 A CN201310023800 A CN 201310023800A CN 103106502 A CN103106502 A CN 103106502A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100238000A
Other languages
Chinese (zh)
Other versions
CN103106502B (en
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310023800.0A priority Critical patent/CN103106502B/en
Publication of CN103106502A publication Critical patent/CN103106502A/en
Application granted granted Critical
Publication of CN103106502B publication Critical patent/CN103106502B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Storage Device Security (AREA)

Abstract

Provided is a multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through ternary-variant encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots through a circulation look-up table modulation type. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multivariate parameter alternation ternary encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate parameter alternation ternary encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 659268DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 45250DEST_PATH_IMAGE002
,
Figure 418462DEST_PATH_IMAGE003
,
Figure 282513DEST_PATH_IMAGE004
,
Figure 690360DEST_PATH_IMAGE005
,
Figure 981665DEST_PATH_IMAGE006
,
Figure 842173DEST_PATH_IMAGE007
, With , encryption parameter
Figure 308510DEST_PATH_IMAGE002
,
Figure 656315DEST_PATH_IMAGE003
,
Figure 862168DEST_PATH_IMAGE004
,
Figure 447870DEST_PATH_IMAGE005
,
Figure 471190DEST_PATH_IMAGE006
,
Figure 181657DEST_PATH_IMAGE007
,
Figure 50256DEST_PATH_IMAGE008
With It is 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 288973DEST_PATH_IMAGE011
Figure 961263DEST_PATH_IMAGE012
Figure 293204DEST_PATH_IMAGE014
Figure 712684DEST_PATH_IMAGE015
Figure 657506DEST_PATH_IMAGE016
Figure 603466DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 14856DEST_PATH_IMAGE010
Figure 46265DEST_PATH_IMAGE011
Figure 935724DEST_PATH_IMAGE012
Figure 1769DEST_PATH_IMAGE013
Figure 584060DEST_PATH_IMAGE014
Figure 102766DEST_PATH_IMAGE015
Figure 795916DEST_PATH_IMAGE016
Figure 919729DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 797556DEST_PATH_IMAGE010
Figure 300398DEST_PATH_IMAGE012
Figure 950822DEST_PATH_IMAGE013
Figure 733971DEST_PATH_IMAGE014
Figure 262221DEST_PATH_IMAGE016
Figure 32731DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 986780DEST_PATH_IMAGE010
Figure 842741DEST_PATH_IMAGE011
Figure 806018DEST_PATH_IMAGE012
Figure 165455DEST_PATH_IMAGE013
Figure 555985DEST_PATH_IMAGE014
Figure 633662DEST_PATH_IMAGE015
Figure 400630DEST_PATH_IMAGE016
Figure 880153DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 441584DEST_PATH_IMAGE010
Figure 780479DEST_PATH_IMAGE012
Figure 846841DEST_PATH_IMAGE014
Figure 23744DEST_PATH_IMAGE015
Figure 335777DEST_PATH_IMAGE016
Figure 789892DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 693126DEST_PATH_IMAGE010
Figure 232692DEST_PATH_IMAGE011
Figure 879574DEST_PATH_IMAGE012
Figure 188195DEST_PATH_IMAGE013
Figure 474186DEST_PATH_IMAGE016
Figure 637314DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 894069DEST_PATH_IMAGE010
Figure 408227DEST_PATH_IMAGE011
Figure 396912DEST_PATH_IMAGE012
Figure 414546DEST_PATH_IMAGE013
Figure 96063DEST_PATH_IMAGE014
Figure 831938DEST_PATH_IMAGE015
Figure 93155DEST_PATH_IMAGE016
Figure 89930DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 817715DEST_PATH_IMAGE010
Figure 165520DEST_PATH_IMAGE011
Figure 964848DEST_PATH_IMAGE012
Figure 957075DEST_PATH_IMAGE013
Figure 425283DEST_PATH_IMAGE015
Figure 559461DEST_PATH_IMAGE016
Figure 671773DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 600415DEST_PATH_IMAGE010
Figure 391653DEST_PATH_IMAGE011
Figure 939309DEST_PATH_IMAGE012
Figure 30762DEST_PATH_IMAGE013
Figure 5671DEST_PATH_IMAGE014
Figure 815364DEST_PATH_IMAGE015
Figure 760187DEST_PATH_IMAGE016
Figure 581512DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the ternary cryptographic calculation is defined as H i=
Figure 117536DEST_PATH_IMAGE018
Figure 38404DEST_PATH_IMAGE019
Figure 979815DEST_PATH_IMAGE011
Figure 421161DEST_PATH_IMAGE018
Figure 815233DEST_PATH_IMAGE012
Figure 633017DEST_PATH_IMAGE020
Figure 306760DEST_PATH_IMAGE018
Figure 188129DEST_PATH_IMAGE014
Figure 12865DEST_PATH_IMAGE021
Figure 787923DEST_PATH_IMAGE015
Figure 712017DEST_PATH_IMAGE022
Figure 205315DEST_PATH_IMAGE016
Figure 240267DEST_PATH_IMAGE023
Figure 338673DEST_PATH_IMAGE017
Figure 558302DEST_PATH_IMAGE024
, during binary operator control variables k=1, the ternary cryptographic calculation is defined as H i=
Figure 414263DEST_PATH_IMAGE025
Figure 111960DEST_PATH_IMAGE010
Figure 736977DEST_PATH_IMAGE018
Figure 127507DEST_PATH_IMAGE011
Figure 205184DEST_PATH_IMAGE026
Figure 13106DEST_PATH_IMAGE013
Figure 171555DEST_PATH_IMAGE027
Figure 86421DEST_PATH_IMAGE014
Figure 418362DEST_PATH_IMAGE015
Figure 595266DEST_PATH_IMAGE028
Figure 313823DEST_PATH_IMAGE016
Figure 892572DEST_PATH_IMAGE029
Figure 671172DEST_PATH_IMAGE017
, during binary operator control variables k=2, the ternary cryptographic calculation is defined as H i=
Figure 462814DEST_PATH_IMAGE031
Figure 771436DEST_PATH_IMAGE010
Figure 314412DEST_PATH_IMAGE032
Figure 200329DEST_PATH_IMAGE011
Figure 182060DEST_PATH_IMAGE018
Figure 781407DEST_PATH_IMAGE012
Figure 495285DEST_PATH_IMAGE033
Figure 134076DEST_PATH_IMAGE013
Figure 140396DEST_PATH_IMAGE014
Figure 697279DEST_PATH_IMAGE034
Figure 557787DEST_PATH_IMAGE015
Figure 691146DEST_PATH_IMAGE016
Figure 543564DEST_PATH_IMAGE035
Figure 97222DEST_PATH_IMAGE036
, during binary operator control variables k=3, the ternary cryptographic calculation is defined as H i=
Figure 89449DEST_PATH_IMAGE037
Figure 795106DEST_PATH_IMAGE012
Figure 727289DEST_PATH_IMAGE018
Figure 665159DEST_PATH_IMAGE013
Figure 631977DEST_PATH_IMAGE040
Figure 731521DEST_PATH_IMAGE014
Figure 416580DEST_PATH_IMAGE018
Figure 361402DEST_PATH_IMAGE015
Figure 453172DEST_PATH_IMAGE016
Figure 484582DEST_PATH_IMAGE018
Figure 639620DEST_PATH_IMAGE017
, during binary operator control variables k=4, the ternary cryptographic calculation is defined as H i=
Figure 9924DEST_PATH_IMAGE010
Figure 827707DEST_PATH_IMAGE044
Figure 623625DEST_PATH_IMAGE011
Figure 513170DEST_PATH_IMAGE045
Figure 128959DEST_PATH_IMAGE012
Figure 400857DEST_PATH_IMAGE013
Figure 230011DEST_PATH_IMAGE018
Figure 723309DEST_PATH_IMAGE014
Figure 351737DEST_PATH_IMAGE047
Figure 856667DEST_PATH_IMAGE015
Figure 666677DEST_PATH_IMAGE016
Figure 629954DEST_PATH_IMAGE048
Figure 848446DEST_PATH_IMAGE017
Figure 114342DEST_PATH_IMAGE018
, during binary operator control variables k=5, the ternary cryptographic calculation is defined as H i=
Figure 723178DEST_PATH_IMAGE018
Figure 704089DEST_PATH_IMAGE049
Figure 265521DEST_PATH_IMAGE011
Figure 830494DEST_PATH_IMAGE050
Figure 735182DEST_PATH_IMAGE051
Figure 467515DEST_PATH_IMAGE013
Figure 254205DEST_PATH_IMAGE052
Figure 831817DEST_PATH_IMAGE014
Figure 410566DEST_PATH_IMAGE018
Figure 189166DEST_PATH_IMAGE015
Figure 12132DEST_PATH_IMAGE018
Figure 86267DEST_PATH_IMAGE017
Figure 113129DEST_PATH_IMAGE054
, during binary operator control variables k=6, the ternary cryptographic calculation is defined as H i=
Figure 320305DEST_PATH_IMAGE010
Figure 440708DEST_PATH_IMAGE018
Figure 813920DEST_PATH_IMAGE011
Figure 677971DEST_PATH_IMAGE056
Figure 85819DEST_PATH_IMAGE012
Figure 377123DEST_PATH_IMAGE057
Figure 636569DEST_PATH_IMAGE014
Figure 446579DEST_PATH_IMAGE015
Figure 42645DEST_PATH_IMAGE018
Figure 34872DEST_PATH_IMAGE016
Figure 792612DEST_PATH_IMAGE060
Figure 503079DEST_PATH_IMAGE017
Figure 637258DEST_PATH_IMAGE018
, during binary operator control variables k=7, the ternary cryptographic calculation is defined as H i=
Figure 483991DEST_PATH_IMAGE018
Figure 689931DEST_PATH_IMAGE010
Figure 622114DEST_PATH_IMAGE061
Figure 559983DEST_PATH_IMAGE011
Figure 95187DEST_PATH_IMAGE012
Figure 639301DEST_PATH_IMAGE062
Figure 584123DEST_PATH_IMAGE013
Figure 998924DEST_PATH_IMAGE063
Figure 441724DEST_PATH_IMAGE064
Figure 596761DEST_PATH_IMAGE015
Figure 397227DEST_PATH_IMAGE065
Figure 979518DEST_PATH_IMAGE016
Figure 498224DEST_PATH_IMAGE018
Figure 191374DEST_PATH_IMAGE017
, set encryption parameter
Figure 599538DEST_PATH_IMAGE002
,
Figure 605541DEST_PATH_IMAGE003
,
Figure 102381DEST_PATH_IMAGE004
,
Figure 877439DEST_PATH_IMAGE005
,
Figure 801533DEST_PATH_IMAGE006
,
Figure 29252DEST_PATH_IMAGE007
,
Figure 782313DEST_PATH_IMAGE008
With
Figure 552823DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 956308DEST_PATH_IMAGE067
Carry out H 1=
Figure 513060DEST_PATH_IMAGE068
Figure 138077DEST_PATH_IMAGE010
Figure 528607DEST_PATH_IMAGE019
Figure 199760DEST_PATH_IMAGE011
Figure 638831DEST_PATH_IMAGE068
Figure 649512DEST_PATH_IMAGE012
Figure 210944DEST_PATH_IMAGE020
Figure 775917DEST_PATH_IMAGE013
Figure 549838DEST_PATH_IMAGE068
Figure 8501DEST_PATH_IMAGE014
Figure 616200DEST_PATH_IMAGE021
Figure 793104DEST_PATH_IMAGE015
Figure 370716DEST_PATH_IMAGE022
Figure 931327DEST_PATH_IMAGE023
Figure 595527DEST_PATH_IMAGE017
Figure 180092DEST_PATH_IMAGE024
Ternary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 625066DEST_PATH_IMAGE067
Carry out H 1=
Figure 574567DEST_PATH_IMAGE068
Figure 379898DEST_PATH_IMAGE019
Figure 543026DEST_PATH_IMAGE011
Figure 53642DEST_PATH_IMAGE068
Figure 302221DEST_PATH_IMAGE012
Figure 290905DEST_PATH_IMAGE020
Figure 770483DEST_PATH_IMAGE068
Figure 630992DEST_PATH_IMAGE014
Figure 485684DEST_PATH_IMAGE021
Figure 748038DEST_PATH_IMAGE015
Figure 558048DEST_PATH_IMAGE016
Figure 763901DEST_PATH_IMAGE023
Figure 880762DEST_PATH_IMAGE017
Figure 779448DEST_PATH_IMAGE024
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 2=
Figure 614549DEST_PATH_IMAGE025
Figure 358514DEST_PATH_IMAGE010
Figure 595460DEST_PATH_IMAGE069
Figure 399468DEST_PATH_IMAGE011
Figure 721865DEST_PATH_IMAGE026
Figure 269521DEST_PATH_IMAGE012
Figure 360974DEST_PATH_IMAGE069
Figure 601462DEST_PATH_IMAGE013
Figure 145576DEST_PATH_IMAGE027
Figure 808507DEST_PATH_IMAGE014
Figure 754467DEST_PATH_IMAGE069
Figure 165856DEST_PATH_IMAGE015
Figure 197266DEST_PATH_IMAGE028
Figure 86725DEST_PATH_IMAGE016
Figure 253767DEST_PATH_IMAGE030
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 552111DEST_PATH_IMAGE070
Carry out H 2=
Figure 82449DEST_PATH_IMAGE025
Figure 960275DEST_PATH_IMAGE010
Figure 463118DEST_PATH_IMAGE011
Figure 83641DEST_PATH_IMAGE012
Figure 452305DEST_PATH_IMAGE069
Figure 80733DEST_PATH_IMAGE013
Figure 975877DEST_PATH_IMAGE027
Figure 805292DEST_PATH_IMAGE014
Figure 785887DEST_PATH_IMAGE069
Figure 108601DEST_PATH_IMAGE028
Figure 374497DEST_PATH_IMAGE016
Figure 576808DEST_PATH_IMAGE029
Figure 219142DEST_PATH_IMAGE017
Figure 823299DEST_PATH_IMAGE030
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 3=
Figure 260096DEST_PATH_IMAGE031
Figure 949704DEST_PATH_IMAGE010
Figure 130149DEST_PATH_IMAGE032
Figure 196511DEST_PATH_IMAGE071
Figure 373415DEST_PATH_IMAGE012
Figure 685447DEST_PATH_IMAGE033
Figure 139562DEST_PATH_IMAGE013
Figure 42796DEST_PATH_IMAGE071
Figure 582362DEST_PATH_IMAGE014
Figure 229244DEST_PATH_IMAGE034
Figure 537866DEST_PATH_IMAGE015
Figure 612001DEST_PATH_IMAGE071
Figure 823856DEST_PATH_IMAGE035
Figure 986984DEST_PATH_IMAGE017
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this ternary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table carry out the ternary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the ternary cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 734864DEST_PATH_IMAGE002
,
Figure 752498DEST_PATH_IMAGE003
,
Figure 434015DEST_PATH_IMAGE004
,
Figure 169890DEST_PATH_IMAGE005
,
Figure 962265DEST_PATH_IMAGE006
, , With
Figure 34630DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value when initial value of setting encryption variables j, d, e, f, g, h, r, p and q is encryption, the initial value design of binary operator control variables k is k=0, known by the ternary ciphering process, and during binary operator control variables k=0, decrypt operation is M i=
Figure 896275DEST_PATH_IMAGE018
Figure 13136DEST_PATH_IMAGE010
Figure 505297DEST_PATH_IMAGE019
Figure 801870DEST_PATH_IMAGE012
Figure 605878DEST_PATH_IMAGE020
Figure 928274DEST_PATH_IMAGE013
Figure 475930DEST_PATH_IMAGE018
Figure 542292DEST_PATH_IMAGE021
Figure 296808DEST_PATH_IMAGE022
Figure 118133DEST_PATH_IMAGE016
Figure 654157DEST_PATH_IMAGE023
Figure 560933DEST_PATH_IMAGE017
Figure 575025DEST_PATH_IMAGE024
, during binary operator control variables k=1, decrypt operation is M i=
Figure 516437DEST_PATH_IMAGE025
Figure 957782DEST_PATH_IMAGE010
Figure 351854DEST_PATH_IMAGE018
Figure 169638DEST_PATH_IMAGE011
Figure 965555DEST_PATH_IMAGE026
Figure 843382DEST_PATH_IMAGE012
Figure 724750DEST_PATH_IMAGE018
Figure 80645DEST_PATH_IMAGE013
Figure 731069DEST_PATH_IMAGE027
Figure 779796DEST_PATH_IMAGE014
Figure 148461DEST_PATH_IMAGE018
Figure 308047DEST_PATH_IMAGE015
Figure 32606DEST_PATH_IMAGE016
Figure 586264DEST_PATH_IMAGE017
Figure 211281DEST_PATH_IMAGE030
, during binary operator control variables k=2, decrypt operation is M i=
Figure 679488DEST_PATH_IMAGE010
Figure 446456DEST_PATH_IMAGE032
Figure 925979DEST_PATH_IMAGE011
Figure 487410DEST_PATH_IMAGE018
Figure 52384DEST_PATH_IMAGE012
Figure 91884DEST_PATH_IMAGE033
Figure 691492DEST_PATH_IMAGE013
Figure 423825DEST_PATH_IMAGE018
Figure 476095DEST_PATH_IMAGE014
Figure 319286DEST_PATH_IMAGE034
Figure 773401DEST_PATH_IMAGE015
Figure 216201DEST_PATH_IMAGE016
Figure 863083DEST_PATH_IMAGE035
Figure 171704DEST_PATH_IMAGE017
Figure 245839DEST_PATH_IMAGE036
, during binary operator control variables k=3, decrypt operation is M i=
Figure 457695DEST_PATH_IMAGE010
Figure 620823DEST_PATH_IMAGE038
Figure 865860DEST_PATH_IMAGE011
Figure 380018DEST_PATH_IMAGE039
Figure 368702DEST_PATH_IMAGE012
Figure 386337DEST_PATH_IMAGE018
Figure 67854DEST_PATH_IMAGE013
Figure 803729DEST_PATH_IMAGE040
Figure 330525DEST_PATH_IMAGE014
Figure 468245DEST_PATH_IMAGE018
Figure 320664DEST_PATH_IMAGE015
Figure 278255DEST_PATH_IMAGE041
Figure 874322DEST_PATH_IMAGE016
Figure 866548DEST_PATH_IMAGE018
Figure 346475DEST_PATH_IMAGE042
, during binary operator control variables k=4, decrypt operation is M i=
Figure 480653DEST_PATH_IMAGE043
Figure 327386DEST_PATH_IMAGE010
Figure 521607DEST_PATH_IMAGE044
Figure 358851DEST_PATH_IMAGE011
Figure 172086DEST_PATH_IMAGE045
Figure 263539DEST_PATH_IMAGE012
Figure 238448DEST_PATH_IMAGE046
Figure 48141DEST_PATH_IMAGE013
Figure 399488DEST_PATH_IMAGE018
Figure 345447DEST_PATH_IMAGE014
Figure 491258DEST_PATH_IMAGE047
Figure 522668DEST_PATH_IMAGE015
Figure 478171DEST_PATH_IMAGE016
Figure 60462DEST_PATH_IMAGE048
Figure 579168DEST_PATH_IMAGE017
Figure 272318DEST_PATH_IMAGE018
, during binary operator control variables k=5, decrypt operation is M i=
Figure 192869DEST_PATH_IMAGE018
Figure 946062DEST_PATH_IMAGE010
Figure 686485DEST_PATH_IMAGE049
Figure 183325DEST_PATH_IMAGE011
Figure 958383DEST_PATH_IMAGE050
Figure 4202DEST_PATH_IMAGE013
Figure 509133DEST_PATH_IMAGE052
Figure 728762DEST_PATH_IMAGE014
Figure 319143DEST_PATH_IMAGE018
Figure 282420DEST_PATH_IMAGE015
Figure 907436DEST_PATH_IMAGE053
Figure 297966DEST_PATH_IMAGE016
Figure 375644DEST_PATH_IMAGE018
Figure 356555DEST_PATH_IMAGE054
, during binary operator control variables k=6, decrypt operation is M i=
Figure 917987DEST_PATH_IMAGE055
Figure 482960DEST_PATH_IMAGE010
Figure 788039DEST_PATH_IMAGE018
Figure 387648DEST_PATH_IMAGE011
Figure 500146DEST_PATH_IMAGE012
Figure 484283DEST_PATH_IMAGE057
Figure 63032DEST_PATH_IMAGE013
Figure 841632DEST_PATH_IMAGE058
Figure 240252DEST_PATH_IMAGE014
Figure 293659DEST_PATH_IMAGE059
Figure 602281DEST_PATH_IMAGE015
Figure 145257DEST_PATH_IMAGE018
Figure 296753DEST_PATH_IMAGE016
Figure 357113DEST_PATH_IMAGE060
Figure 734673DEST_PATH_IMAGE017
Figure 855075DEST_PATH_IMAGE018
, during binary operator control variables k=7, decrypt operation is M i=
Figure 228288DEST_PATH_IMAGE018
Figure 92339DEST_PATH_IMAGE010
Figure 500186DEST_PATH_IMAGE061
Figure 571916DEST_PATH_IMAGE011
Figure 901267DEST_PATH_IMAGE018
Figure 569008DEST_PATH_IMAGE012
Figure 831362DEST_PATH_IMAGE062
Figure 293568DEST_PATH_IMAGE013
Figure 641373DEST_PATH_IMAGE063
Figure 112805DEST_PATH_IMAGE014
Figure 862772DEST_PATH_IMAGE015
Figure 697873DEST_PATH_IMAGE065
Figure 707417DEST_PATH_IMAGE016
Figure 678785DEST_PATH_IMAGE018
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 618425DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 444298DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 684787DEST_PATH_IMAGE067
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 697742DEST_PATH_IMAGE001
carry out the ternary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information , generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multivariate parameter alternation ternary encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 709210DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively ,
Figure 468404DEST_PATH_IMAGE003
,
Figure 925930DEST_PATH_IMAGE004
,
Figure 333778DEST_PATH_IMAGE005
,
Figure 218557DEST_PATH_IMAGE006
,
Figure 547907DEST_PATH_IMAGE007
,
Figure 809124DEST_PATH_IMAGE008
With , encryption parameter
Figure 533684DEST_PATH_IMAGE002
, ,
Figure 87342DEST_PATH_IMAGE004
,
Figure 79569DEST_PATH_IMAGE005
,
Figure 102888DEST_PATH_IMAGE006
,
Figure 813356DEST_PATH_IMAGE007
,
Figure 681954DEST_PATH_IMAGE008
With
Figure 794267DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 191750DEST_PATH_IMAGE010
Figure 215573DEST_PATH_IMAGE013
Figure 456061DEST_PATH_IMAGE014
Figure 175DEST_PATH_IMAGE015
Figure 351522DEST_PATH_IMAGE016
Figure 297481DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 708871DEST_PATH_IMAGE010
Figure 209122DEST_PATH_IMAGE011
Figure 223215DEST_PATH_IMAGE012
Figure 164626DEST_PATH_IMAGE013
Figure 871551DEST_PATH_IMAGE014
Figure 265623DEST_PATH_IMAGE015
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 503290DEST_PATH_IMAGE010
Figure 384658DEST_PATH_IMAGE011
Figure 6132DEST_PATH_IMAGE012
Figure 656557DEST_PATH_IMAGE013
Figure 808369DEST_PATH_IMAGE015
Figure 967955DEST_PATH_IMAGE016
Figure 738465DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 692515DEST_PATH_IMAGE010
Figure 141950DEST_PATH_IMAGE011
Figure 980593DEST_PATH_IMAGE012
Figure 730561DEST_PATH_IMAGE014
Figure 932872DEST_PATH_IMAGE015
Figure 575206DEST_PATH_IMAGE016
Figure 179362DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 209635DEST_PATH_IMAGE010
Figure 774609DEST_PATH_IMAGE011
Figure 79688DEST_PATH_IMAGE012
Figure 413718DEST_PATH_IMAGE013
Figure 198320DEST_PATH_IMAGE015
Figure 41511DEST_PATH_IMAGE016
Figure 495626DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 938426DEST_PATH_IMAGE011
Figure 585308DEST_PATH_IMAGE012
Figure 893929DEST_PATH_IMAGE013
Figure 968065DEST_PATH_IMAGE014
Figure 729347DEST_PATH_IMAGE015
Figure 179920DEST_PATH_IMAGE016
Figure 343048DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 588085DEST_PATH_IMAGE010
Figure 102243DEST_PATH_IMAGE011
Figure 702037DEST_PATH_IMAGE013
Figure 119429DEST_PATH_IMAGE015
Figure 783946DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 105206DEST_PATH_IMAGE010
Figure 328377DEST_PATH_IMAGE011
Figure 127705DEST_PATH_IMAGE012
Figure 244566DEST_PATH_IMAGE013
Figure 243932DEST_PATH_IMAGE015
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 419064DEST_PATH_IMAGE010
Figure 616827DEST_PATH_IMAGE011
Figure 289117DEST_PATH_IMAGE012
Figure 255936DEST_PATH_IMAGE013
Figure 355479DEST_PATH_IMAGE014
Figure 40538DEST_PATH_IMAGE015
Figure 943039DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the ternary cryptographic calculation is defined as H i=
Figure 385838DEST_PATH_IMAGE010
Figure 275297DEST_PATH_IMAGE019
Figure 341342DEST_PATH_IMAGE011
Figure 658054DEST_PATH_IMAGE018
Figure 869909DEST_PATH_IMAGE020
Figure 790461DEST_PATH_IMAGE013
Figure 549655DEST_PATH_IMAGE014
Figure 374392DEST_PATH_IMAGE021
Figure 24816DEST_PATH_IMAGE015
Figure 601794DEST_PATH_IMAGE023
Figure 106724DEST_PATH_IMAGE017
, during binary operator control variables k=1, the ternary cryptographic calculation is defined as H i=
Figure 182314DEST_PATH_IMAGE025
Figure 348853DEST_PATH_IMAGE010
Figure 364399DEST_PATH_IMAGE011
Figure 566711DEST_PATH_IMAGE026
Figure 209044DEST_PATH_IMAGE012
Figure 249999DEST_PATH_IMAGE013
Figure 854472DEST_PATH_IMAGE014
Figure 578715DEST_PATH_IMAGE018
Figure 363317DEST_PATH_IMAGE028
Figure 81874DEST_PATH_IMAGE016
Figure 129465DEST_PATH_IMAGE029
Figure 32699DEST_PATH_IMAGE017
Figure 572264DEST_PATH_IMAGE030
, during binary operator control variables k=2, the ternary cryptographic calculation is defined as H i=
Figure 219146DEST_PATH_IMAGE031
Figure 527768DEST_PATH_IMAGE010
Figure 601903DEST_PATH_IMAGE032
Figure 363186DEST_PATH_IMAGE011
Figure 813759DEST_PATH_IMAGE018
Figure 976887DEST_PATH_IMAGE012
Figure 736081DEST_PATH_IMAGE013
Figure 255924DEST_PATH_IMAGE018
Figure 398193DEST_PATH_IMAGE014
Figure 955076DEST_PATH_IMAGE034
Figure 284426DEST_PATH_IMAGE015
Figure 948943DEST_PATH_IMAGE016
Figure 801361DEST_PATH_IMAGE035
Figure 758953DEST_PATH_IMAGE017
Figure 355019DEST_PATH_IMAGE036
, during binary operator control variables k=3, the ternary cryptographic calculation is defined as H i=
Figure 347246DEST_PATH_IMAGE037
Figure 104987DEST_PATH_IMAGE010
Figure 815454DEST_PATH_IMAGE038
Figure 961350DEST_PATH_IMAGE011
Figure 808084DEST_PATH_IMAGE039
Figure 2305DEST_PATH_IMAGE012
Figure 934489DEST_PATH_IMAGE018
Figure 872358DEST_PATH_IMAGE013
Figure 432652DEST_PATH_IMAGE040
Figure 407561DEST_PATH_IMAGE014
Figure 568601DEST_PATH_IMAGE015
Figure 514560DEST_PATH_IMAGE041
Figure 660371DEST_PATH_IMAGE016
Figure 691781DEST_PATH_IMAGE018
Figure 846819DEST_PATH_IMAGE017
Figure 647284DEST_PATH_IMAGE042
, during binary operator control variables k=4, the ternary cryptographic calculation is defined as H i=
Figure 229576DEST_PATH_IMAGE043
Figure 441431DEST_PATH_IMAGE044
Figure 361983DEST_PATH_IMAGE011
Figure 855598DEST_PATH_IMAGE012
Figure 664023DEST_PATH_IMAGE046
Figure 439081DEST_PATH_IMAGE013
Figure 363174DEST_PATH_IMAGE018
Figure 856473DEST_PATH_IMAGE014
Figure 891425DEST_PATH_IMAGE047
Figure 520989DEST_PATH_IMAGE015
Figure 330999DEST_PATH_IMAGE016
Figure 169642DEST_PATH_IMAGE048
Figure 919292DEST_PATH_IMAGE017
, during binary operator control variables k=5, the ternary cryptographic calculation is defined as H i=
Figure 856341DEST_PATH_IMAGE018
Figure 357730DEST_PATH_IMAGE010
Figure 430728DEST_PATH_IMAGE049
Figure 867526DEST_PATH_IMAGE011
Figure 557133DEST_PATH_IMAGE050
Figure 331054DEST_PATH_IMAGE012
Figure 662995DEST_PATH_IMAGE013
Figure 558456DEST_PATH_IMAGE014
Figure 12571DEST_PATH_IMAGE018
Figure 915805DEST_PATH_IMAGE015
Figure 189792DEST_PATH_IMAGE053
Figure 836673DEST_PATH_IMAGE016
Figure 219430DEST_PATH_IMAGE017
, during binary operator control variables k=6, the ternary cryptographic calculation is defined as H i=
Figure 431286DEST_PATH_IMAGE055
Figure 859993DEST_PATH_IMAGE010
Figure 116748DEST_PATH_IMAGE018
Figure 365327DEST_PATH_IMAGE011
Figure 354012DEST_PATH_IMAGE056
Figure 53163DEST_PATH_IMAGE057
Figure 789038DEST_PATH_IMAGE013
Figure 581414DEST_PATH_IMAGE058
Figure 305973DEST_PATH_IMAGE059
Figure 529144DEST_PATH_IMAGE015
Figure 125211DEST_PATH_IMAGE018
Figure 117437DEST_PATH_IMAGE016
Figure 875178DEST_PATH_IMAGE060
Figure 585645DEST_PATH_IMAGE017
Figure 719823DEST_PATH_IMAGE018
, during binary operator control variables k=7, the ternary cryptographic calculation is defined as H i=
Figure 566556DEST_PATH_IMAGE018
Figure 760777DEST_PATH_IMAGE010
Figure 692961DEST_PATH_IMAGE061
Figure 630830DEST_PATH_IMAGE011
Figure 116672DEST_PATH_IMAGE062
Figure 592653DEST_PATH_IMAGE013
Figure 413978DEST_PATH_IMAGE063
Figure 950002DEST_PATH_IMAGE014
Figure 856778DEST_PATH_IMAGE064
Figure 136450DEST_PATH_IMAGE015
Figure 519206DEST_PATH_IMAGE016
Figure 526980DEST_PATH_IMAGE066
, set encryption parameter
Figure 139227DEST_PATH_IMAGE002
,
Figure 20595DEST_PATH_IMAGE003
,
Figure 110911DEST_PATH_IMAGE004
,
Figure 885969DEST_PATH_IMAGE005
,
Figure 810062DEST_PATH_IMAGE006
,
Figure 37781DEST_PATH_IMAGE007
,
Figure 72733DEST_PATH_IMAGE008
With
Figure 967877DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 62872DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 184412DEST_PATH_IMAGE067
Carry out H 1=
Figure 772705DEST_PATH_IMAGE010
Figure 163235DEST_PATH_IMAGE019
Figure 834388DEST_PATH_IMAGE011
Figure 929252DEST_PATH_IMAGE068
Figure 408775DEST_PATH_IMAGE012
Figure 970206DEST_PATH_IMAGE020
Figure 535179DEST_PATH_IMAGE013
Figure 840259DEST_PATH_IMAGE068
Figure 174288DEST_PATH_IMAGE014
Figure 906621DEST_PATH_IMAGE021
Figure 958890DEST_PATH_IMAGE015
Figure 256197DEST_PATH_IMAGE016
Figure 159431DEST_PATH_IMAGE023
Figure 698996DEST_PATH_IMAGE017
Ternary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 666219DEST_PATH_IMAGE067
Carry out H 1=
Figure 740354DEST_PATH_IMAGE068
Figure 767216DEST_PATH_IMAGE010
Figure 952209DEST_PATH_IMAGE019
Figure 115338DEST_PATH_IMAGE011
Figure 625953DEST_PATH_IMAGE068
Figure 874532DEST_PATH_IMAGE012
Figure 863217DEST_PATH_IMAGE020
Figure 146430DEST_PATH_IMAGE013
Figure 562368DEST_PATH_IMAGE068
Figure 298243DEST_PATH_IMAGE014
Figure 90619DEST_PATH_IMAGE021
Figure 228339DEST_PATH_IMAGE015
Figure 815178DEST_PATH_IMAGE022
Figure 38349DEST_PATH_IMAGE016
Figure 368836DEST_PATH_IMAGE023
Figure 361063DEST_PATH_IMAGE017
Figure 384383DEST_PATH_IMAGE024
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 2=
Figure 963449DEST_PATH_IMAGE010
Figure 4403DEST_PATH_IMAGE011
Figure 202166DEST_PATH_IMAGE026
Figure 874456DEST_PATH_IMAGE012
Figure 841275DEST_PATH_IMAGE069
Figure 625877DEST_PATH_IMAGE027
Figure 101858DEST_PATH_IMAGE014
Figure 923183DEST_PATH_IMAGE069
Figure 365983DEST_PATH_IMAGE028
Figure 380075DEST_PATH_IMAGE016
Figure 321486DEST_PATH_IMAGE029
Figure 422484DEST_PATH_IMAGE030
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 240267DEST_PATH_IMAGE070
Carry out H 2=
Figure 364081DEST_PATH_IMAGE025
Figure 117273DEST_PATH_IMAGE010
Figure 123275DEST_PATH_IMAGE069
Figure 395173DEST_PATH_IMAGE026
Figure 53688DEST_PATH_IMAGE012
Figure 546986DEST_PATH_IMAGE069
Figure 175414DEST_PATH_IMAGE013
Figure 945924DEST_PATH_IMAGE027
Figure 755934DEST_PATH_IMAGE069
Figure 719210DEST_PATH_IMAGE015
Figure 78648DEST_PATH_IMAGE028
Figure 313823DEST_PATH_IMAGE017
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the ternary cryptographic calculation, make next ternary cryptographic calculation point to H 3=
Figure 354777DEST_PATH_IMAGE031
Figure 224830DEST_PATH_IMAGE032
Figure 558859DEST_PATH_IMAGE011
Figure 291192DEST_PATH_IMAGE071
Figure 343462DEST_PATH_IMAGE012
Figure 640768DEST_PATH_IMAGE013
Figure 555720DEST_PATH_IMAGE071
Figure 95286DEST_PATH_IMAGE014
Figure 742168DEST_PATH_IMAGE034
Figure 50790DEST_PATH_IMAGE015
Figure 124925DEST_PATH_IMAGE071
Figure 886208DEST_PATH_IMAGE016
Figure 336781DEST_PATH_IMAGE035
Figure 499909DEST_PATH_IMAGE017
Figure 744945DEST_PATH_IMAGE036
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this ternary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 259103DEST_PATH_IMAGE001
carry out the ternary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310023800.0A 2013-01-22 2013-01-22 Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand Expired - Fee Related CN103106502B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310023800.0A CN103106502B (en) 2013-01-22 2013-01-22 Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310023800.0A CN103106502B (en) 2013-01-22 2013-01-22 Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand

Publications (2)

Publication Number Publication Date
CN103106502A true CN103106502A (en) 2013-05-15
CN103106502B CN103106502B (en) 2015-06-03

Family

ID=48314348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310023800.0A Expired - Fee Related CN103106502B (en) 2013-01-22 2013-01-22 Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103106502B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Also Published As

Publication number Publication date
CN103106502B (en) 2015-06-03

Similar Documents

Publication Publication Date Title
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106430A (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103106428A (en) One-parameter unary circulating encryption anti-fake information storage brand
CN103106502A (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103106522A (en) Multi-variable-parameter gradient binary-variant circulating encryption anti-fake information storage brand
CN103136564A (en) Multi-parameter variable-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106505A (en) One-parameter double-variant ternary encryption anti-fake information storage brand
CN103106494A (en) Multi-variable-parameter gradient multi-variant circulating encryption anti-fake information storage brand
CN103106473A (en) One-parameter double-variant binary encryption anti-fake information storage brand
CN103136562A (en) Multi-variable parameter-gradient multi-variant circulating encryption anti-fake information storage brand
CN103106488A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106462A (en) One-parameter double-variant multi-variant circulating encryption anti-fake information storage brand
CN103106480A (en) Multi-parameter ternary multivariant circulating encryption anti-fake information storage brand
CN103106483A (en) Multi-parameter ternary encryption anti-fake information storage brand
CN103106481A (en) One-parameter double-variant binary circulating encryption anti-fake information storage brand
CN103106477A (en) Multi-parameter binary multivariant circulating encryption anti-fake information storage brand
CN103136561A (en) One-parameter multi-variable binary circulating encryption anti-fake information storage brand
CN103106514A (en) Multi-parameter binary encryption anti-fake information storage brand
CN103136563A (en) One-parameter multi-variable multi-variant circulating encryption anti-fake information storage brand
CN103106496A (en) Multi-parameter unitary circulating encryption anti-fake information storage brand
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106510A (en) Multi-parameter multivariant circulating encryption anti-fake information storage brand
CN103106485A (en) One-parameter double-variant unary circulating encryption anti-fake information storage brand
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150603

Termination date: 20190122