CN103106507A - Multiparameter univariate unitary encryption anti-fake information storage trademark - Google Patents

Multiparameter univariate unitary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106507A
CN103106507A CN2013100239681A CN201310023968A CN103106507A CN 103106507 A CN103106507 A CN 103106507A CN 2013100239681 A CN2013100239681 A CN 2013100239681A CN 201310023968 A CN201310023968 A CN 201310023968A CN 103106507 A CN103106507 A CN 103106507A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100239681A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100239681A priority Critical patent/CN103106507A/en
Publication of CN103106507A publication Critical patent/CN103106507A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to a multiparameter univariate unitary encryption anti-fake information storage trademark. The multiparameter univariate unitary encryption anti-fake information storage trademark can process binary anti-fake information to generate binary modulation signals through unitary encryption and channel coding. The anti-fake information is embedded in a whole trademark page through orderly change of amplitude-modulated dot conductivity with a circular table lookup modulation mode method. The anti-fake information can be identified from any fragment at the time of trademark identification and the multiparameter univariate unitary encryption anti-fake information storage trademark can be used for all kinds of anti-fake trademarks.

Description

Multiparameter single argument monobasic encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of multiparameter single argument monobasic encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100239681100002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively ,
Figure 2013100239681100002DEST_PATH_IMAGE003
,
Figure 2013100239681100002DEST_PATH_IMAGE004
,
Figure 2013100239681100002DEST_PATH_IMAGE005
,
Figure 2013100239681100002DEST_PATH_IMAGE006
,
Figure 2013100239681100002DEST_PATH_IMAGE007
,
Figure 2013100239681100002DEST_PATH_IMAGE008
With
Figure 2013100239681100002DEST_PATH_IMAGE009
, encryption parameter
Figure 29141DEST_PATH_IMAGE002
, ,
Figure 99920DEST_PATH_IMAGE004
, , ,
Figure 384161DEST_PATH_IMAGE007
, With It is 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as respectively j and q, the binary system positive integer that encryption variables j and q are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100239681100002DEST_PATH_IMAGE010
Figure 2013100239681100002DEST_PATH_IMAGE011
Figure 2013100239681100002DEST_PATH_IMAGE012
Figure 2013100239681100002DEST_PATH_IMAGE013
Figure 2013100239681100002DEST_PATH_IMAGE015
Figure 2013100239681100002DEST_PATH_IMAGE016
Figure 2013100239681100002DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 764534DEST_PATH_IMAGE011
Figure 394230DEST_PATH_IMAGE012
Figure 531510DEST_PATH_IMAGE013
Figure 930262DEST_PATH_IMAGE014
Figure 734007DEST_PATH_IMAGE015
Figure 850999DEST_PATH_IMAGE016
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 459780DEST_PATH_IMAGE012
Figure 413961DEST_PATH_IMAGE013
Figure 288769DEST_PATH_IMAGE014
Figure 935782DEST_PATH_IMAGE015
Figure 260322DEST_PATH_IMAGE016
Figure 142828DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 370678DEST_PATH_IMAGE010
Figure 690057DEST_PATH_IMAGE011
Figure 3358DEST_PATH_IMAGE012
Figure 270446DEST_PATH_IMAGE014
Figure 561323DEST_PATH_IMAGE016
Figure 660997DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 96396DEST_PATH_IMAGE010
Figure 380746DEST_PATH_IMAGE011
Figure 668639DEST_PATH_IMAGE012
Figure 73469DEST_PATH_IMAGE013
Figure 130418DEST_PATH_IMAGE014
Figure 693992DEST_PATH_IMAGE015
Figure 469182DEST_PATH_IMAGE016
Figure 412123DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 949732DEST_PATH_IMAGE011
Figure 710752DEST_PATH_IMAGE012
Figure 955920DEST_PATH_IMAGE013
Figure 223347DEST_PATH_IMAGE014
Figure 895768DEST_PATH_IMAGE015
Figure 878505DEST_PATH_IMAGE016
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 291438DEST_PATH_IMAGE010
Figure 259394DEST_PATH_IMAGE011
Figure 230892DEST_PATH_IMAGE012
Figure 316398DEST_PATH_IMAGE013
Figure 56952DEST_PATH_IMAGE014
Figure 572640DEST_PATH_IMAGE015
Figure 156068DEST_PATH_IMAGE016
Figure 281150DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 825450DEST_PATH_IMAGE011
Figure 896174DEST_PATH_IMAGE012
Figure 326412DEST_PATH_IMAGE013
Figure 41558DEST_PATH_IMAGE014
Figure 896119DEST_PATH_IMAGE015
Figure 297855DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 992142DEST_PATH_IMAGE010
Figure 519069DEST_PATH_IMAGE011
Figure 938287DEST_PATH_IMAGE012
Figure 134487DEST_PATH_IMAGE014
Figure 97895DEST_PATH_IMAGE015
Figure 364928DEST_PATH_IMAGE016
Figure 937729DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the monobasic cryptographic calculation is defined as H i=
Figure 2013100239681100002DEST_PATH_IMAGE018
Figure 593226DEST_PATH_IMAGE010
Figure 2013100239681100002DEST_PATH_IMAGE019
Figure 101437DEST_PATH_IMAGE011
Figure 2013100239681100002DEST_PATH_IMAGE020
Figure 2013100239681100002DEST_PATH_IMAGE021
Figure 94243DEST_PATH_IMAGE013
Figure 2013100239681100002DEST_PATH_IMAGE023
Figure 175036DEST_PATH_IMAGE015
Figure 2013100239681100002DEST_PATH_IMAGE024
Figure 524983DEST_PATH_IMAGE016
Figure 2013100239681100002DEST_PATH_IMAGE025
Figure 465955DEST_PATH_IMAGE017
Figure 2013100239681100002DEST_PATH_IMAGE026
, during binary operator control variables k=1, the monobasic cryptographic calculation is defined as H i=
Figure 2013100239681100002DEST_PATH_IMAGE027
Figure 361623DEST_PATH_IMAGE010
Figure 70691DEST_PATH_IMAGE018
Figure 2013100239681100002DEST_PATH_IMAGE028
Figure 5990DEST_PATH_IMAGE012
Figure 2013100239681100002DEST_PATH_IMAGE029
Figure 877869DEST_PATH_IMAGE013
Figure 259303DEST_PATH_IMAGE022
Figure 852352DEST_PATH_IMAGE014
Figure 336609DEST_PATH_IMAGE015
Figure 154523DEST_PATH_IMAGE024
Figure 969289DEST_PATH_IMAGE016
Figure 639173DEST_PATH_IMAGE025
Figure 987109DEST_PATH_IMAGE017
Figure 834979DEST_PATH_IMAGE026
, during binary operator control variables k=2, the monobasic cryptographic calculation is defined as H i=
Figure 137041DEST_PATH_IMAGE027
Figure 236715DEST_PATH_IMAGE010
Figure 937693DEST_PATH_IMAGE028
Figure 97410DEST_PATH_IMAGE011
Figure 886768DEST_PATH_IMAGE018
Figure 524554DEST_PATH_IMAGE012
Figure 410656DEST_PATH_IMAGE013
Figure 687310DEST_PATH_IMAGE022
Figure 128787DEST_PATH_IMAGE014
Figure 538777DEST_PATH_IMAGE023
Figure 164930DEST_PATH_IMAGE015
Figure 885031DEST_PATH_IMAGE016
Figure 916573DEST_PATH_IMAGE025
Figure 87529DEST_PATH_IMAGE017
Figure 571731DEST_PATH_IMAGE026
, during binary operator control variables k=3, the monobasic cryptographic calculation is defined as H i=
Figure 122054DEST_PATH_IMAGE027
Figure 8102DEST_PATH_IMAGE010
Figure 321457DEST_PATH_IMAGE011
Figure 19679DEST_PATH_IMAGE029
Figure 150446DEST_PATH_IMAGE012
Figure 663205DEST_PATH_IMAGE018
Figure 121999DEST_PATH_IMAGE013
Figure 748546DEST_PATH_IMAGE022
Figure 609186DEST_PATH_IMAGE014
Figure 292846DEST_PATH_IMAGE023
Figure 384320DEST_PATH_IMAGE016
Figure 864980DEST_PATH_IMAGE025
Figure 263786DEST_PATH_IMAGE026
, during binary operator control variables k=4, the monobasic cryptographic calculation is defined as H i=
Figure 334904DEST_PATH_IMAGE027
Figure 861831DEST_PATH_IMAGE010
Figure 281049DEST_PATH_IMAGE028
Figure 551625DEST_PATH_IMAGE011
Figure 440657DEST_PATH_IMAGE012
Figure 81591DEST_PATH_IMAGE022
Figure 890278DEST_PATH_IMAGE013
Figure 559157DEST_PATH_IMAGE018
Figure 194931DEST_PATH_IMAGE014
Figure 559048DEST_PATH_IMAGE023
Figure 935540DEST_PATH_IMAGE015
Figure 334291DEST_PATH_IMAGE024
Figure 711325DEST_PATH_IMAGE016
Figure 828317DEST_PATH_IMAGE025
Figure 123742DEST_PATH_IMAGE026
, during binary operator control variables k=5, the monobasic cryptographic calculation is defined as H i=
Figure 599854DEST_PATH_IMAGE027
Figure 440028DEST_PATH_IMAGE010
Figure 659787DEST_PATH_IMAGE028
Figure 913100DEST_PATH_IMAGE029
Figure 506149DEST_PATH_IMAGE012
Figure 264020DEST_PATH_IMAGE022
Figure 990406DEST_PATH_IMAGE013
Figure 542741DEST_PATH_IMAGE023
Figure 357507DEST_PATH_IMAGE014
Figure 919069DEST_PATH_IMAGE018
Figure 126059DEST_PATH_IMAGE015
Figure 613410DEST_PATH_IMAGE024
Figure 414007DEST_PATH_IMAGE016
Figure 15146DEST_PATH_IMAGE025
Figure 217589DEST_PATH_IMAGE017
Figure 875841DEST_PATH_IMAGE026
, during binary operator control variables k=6, the monobasic cryptographic calculation is defined as H i=
Figure 898155DEST_PATH_IMAGE027
Figure 302984DEST_PATH_IMAGE010
Figure 359933DEST_PATH_IMAGE028
Figure 189087DEST_PATH_IMAGE011
Figure 530386DEST_PATH_IMAGE012
Figure 919869DEST_PATH_IMAGE022
Figure 421389DEST_PATH_IMAGE013
Figure 916830DEST_PATH_IMAGE023
Figure 695003DEST_PATH_IMAGE024
Figure 367424DEST_PATH_IMAGE015
Figure 350162DEST_PATH_IMAGE018
Figure 258075DEST_PATH_IMAGE016
Figure 144122DEST_PATH_IMAGE025
Figure 488909DEST_PATH_IMAGE017
Figure 460408DEST_PATH_IMAGE026
, during binary operator control variables k=7, the monobasic cryptographic calculation is defined as H i=
Figure 545913DEST_PATH_IMAGE027
Figure 552046DEST_PATH_IMAGE010
Figure 67735DEST_PATH_IMAGE028
Figure 260950DEST_PATH_IMAGE011
Figure 10786DEST_PATH_IMAGE012
Figure 320544DEST_PATH_IMAGE022
Figure 502520DEST_PATH_IMAGE013
Figure 431293DEST_PATH_IMAGE023
Figure 644975DEST_PATH_IMAGE014
Figure 1001DEST_PATH_IMAGE024
Figure 935852DEST_PATH_IMAGE015
Figure 402737DEST_PATH_IMAGE025
Figure 736504DEST_PATH_IMAGE016
Figure 263431DEST_PATH_IMAGE018
Figure 43168DEST_PATH_IMAGE017
Figure 690575DEST_PATH_IMAGE026
, set encryption parameter
Figure 504947DEST_PATH_IMAGE002
,
Figure 701311DEST_PATH_IMAGE003
,
Figure 843710DEST_PATH_IMAGE004
,
Figure 419442DEST_PATH_IMAGE005
,
Figure 963687DEST_PATH_IMAGE006
,
Figure 330952DEST_PATH_IMAGE007
,
Figure 960647DEST_PATH_IMAGE008
With
Figure 488141DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100239681100002DEST_PATH_IMAGE030
Carry out H 1=
Figure 2013100239681100002DEST_PATH_IMAGE031
Figure 303355DEST_PATH_IMAGE010
Figure 420346DEST_PATH_IMAGE019
Figure 961049DEST_PATH_IMAGE011
Figure 715772DEST_PATH_IMAGE020
Figure 904494DEST_PATH_IMAGE021
Figure 625718DEST_PATH_IMAGE013
Figure 733483DEST_PATH_IMAGE022
Figure 754397DEST_PATH_IMAGE014
Figure 81867DEST_PATH_IMAGE023
Figure 839738DEST_PATH_IMAGE015
Figure 566124DEST_PATH_IMAGE024
Figure 384038DEST_PATH_IMAGE016
Figure 198804DEST_PATH_IMAGE025
Figure 760366DEST_PATH_IMAGE017
Figure 341258DEST_PATH_IMAGE026
Monobasic cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 330074DEST_PATH_IMAGE030
Carry out H 1=
Figure 632135DEST_PATH_IMAGE031
Figure 731810DEST_PATH_IMAGE010
Figure 432787DEST_PATH_IMAGE019
Figure 326925DEST_PATH_IMAGE011
Figure 739452DEST_PATH_IMAGE020
Figure 120844DEST_PATH_IMAGE012
Figure 6946DEST_PATH_IMAGE013
Figure 516556DEST_PATH_IMAGE022
Figure 82667DEST_PATH_IMAGE014
Figure 761166DEST_PATH_IMAGE023
Figure 262686DEST_PATH_IMAGE015
Figure 758127DEST_PATH_IMAGE024
Figure 127928DEST_PATH_IMAGE016
Figure 159470DEST_PATH_IMAGE025
Figure 333355DEST_PATH_IMAGE017
Figure 817557DEST_PATH_IMAGE026
Carry out i+1, j+1, q+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 2=
Figure 110053DEST_PATH_IMAGE010
Figure 2013100239681100002DEST_PATH_IMAGE032
Figure 330207DEST_PATH_IMAGE011
Figure 301705DEST_PATH_IMAGE028
Figure 387210DEST_PATH_IMAGE012
Figure 127764DEST_PATH_IMAGE029
Figure 643453DEST_PATH_IMAGE013
Figure 226881DEST_PATH_IMAGE022
Figure 617542DEST_PATH_IMAGE014
Figure 896262DEST_PATH_IMAGE015
Figure 343818DEST_PATH_IMAGE024
Figure 521858DEST_PATH_IMAGE016
Figure 738469DEST_PATH_IMAGE025
Figure 94495DEST_PATH_IMAGE017
Figure 26417DEST_PATH_IMAGE026
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 2013100239681100002DEST_PATH_IMAGE033
Carry out H 2=
Figure 870132DEST_PATH_IMAGE027
Figure 439785DEST_PATH_IMAGE010
Figure 730827DEST_PATH_IMAGE032
Figure 786199DEST_PATH_IMAGE011
Figure 56774DEST_PATH_IMAGE028
Figure 245048DEST_PATH_IMAGE012
Figure 942877DEST_PATH_IMAGE029
Figure 209910DEST_PATH_IMAGE013
Figure 579154DEST_PATH_IMAGE014
Figure 579044DEST_PATH_IMAGE015
Figure 820451DEST_PATH_IMAGE024
Figure 717737DEST_PATH_IMAGE016
Figure 22948DEST_PATH_IMAGE025
Carry out i+1, j+1, q+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 3=
Figure 936830DEST_PATH_IMAGE027
Figure 250185DEST_PATH_IMAGE028
Figure 2013100239681100002DEST_PATH_IMAGE034
Figure 429638DEST_PATH_IMAGE012
Figure 201285DEST_PATH_IMAGE029
Figure 404121DEST_PATH_IMAGE013
Figure 888378DEST_PATH_IMAGE014
Figure 830926DEST_PATH_IMAGE023
Figure 396424DEST_PATH_IMAGE015
Figure 652328DEST_PATH_IMAGE025
Figure 829756DEST_PATH_IMAGE017
Figure 427965DEST_PATH_IMAGE026
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 364828DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the monobasic cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter ,
Figure 313903DEST_PATH_IMAGE003
,
Figure 341902DEST_PATH_IMAGE004
,
Figure 897386DEST_PATH_IMAGE005
,
Figure 962425DEST_PATH_IMAGE006
,
Figure 488347DEST_PATH_IMAGE007
,
Figure 929823DEST_PATH_IMAGE008
With
Figure 231492DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value of the initial value of setting encryption variables j and q when encrypting, the initial value design of binary operator control variables k is k=0, known by the monobasic ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 968897DEST_PATH_IMAGE018
Figure 975085DEST_PATH_IMAGE019
Figure 741047DEST_PATH_IMAGE011
Figure 914933DEST_PATH_IMAGE020
Figure 399135DEST_PATH_IMAGE012
Figure 832576DEST_PATH_IMAGE013
Figure 510001DEST_PATH_IMAGE023
Figure 250555DEST_PATH_IMAGE015
Figure 222108DEST_PATH_IMAGE016
Figure 471824DEST_PATH_IMAGE025
Figure 833929DEST_PATH_IMAGE017
Figure 19054DEST_PATH_IMAGE026
, during binary operator control variables k=1, decrypt operation is M i=
Figure 594172DEST_PATH_IMAGE027
Figure 21480DEST_PATH_IMAGE010
Figure 736627DEST_PATH_IMAGE018
Figure 594118DEST_PATH_IMAGE011
Figure 761925DEST_PATH_IMAGE028
Figure 619022DEST_PATH_IMAGE012
Figure 687210DEST_PATH_IMAGE029
Figure 214138DEST_PATH_IMAGE013
Figure 636285DEST_PATH_IMAGE022
Figure 31494DEST_PATH_IMAGE014
Figure 455654DEST_PATH_IMAGE023
Figure 917597DEST_PATH_IMAGE015
Figure 59996DEST_PATH_IMAGE024
Figure 612290DEST_PATH_IMAGE016
Figure 15589DEST_PATH_IMAGE025
Figure 149899DEST_PATH_IMAGE017
Figure 278129DEST_PATH_IMAGE026
, during binary operator control variables k=2, decrypt operation is M i=
Figure 890507DEST_PATH_IMAGE027
Figure 790724DEST_PATH_IMAGE010
Figure 220568DEST_PATH_IMAGE028
Figure 71981DEST_PATH_IMAGE011
Figure 505422DEST_PATH_IMAGE012
Figure 217419DEST_PATH_IMAGE029
Figure 821707DEST_PATH_IMAGE013
Figure 900522DEST_PATH_IMAGE022
Figure 772400DEST_PATH_IMAGE014
Figure 153834DEST_PATH_IMAGE023
Figure 504755DEST_PATH_IMAGE024
Figure 857238DEST_PATH_IMAGE016
Figure 173688DEST_PATH_IMAGE025
Figure 486989DEST_PATH_IMAGE017
Figure 284437DEST_PATH_IMAGE026
, during binary operator control variables k=3, decrypt operation is M i=
Figure 757007DEST_PATH_IMAGE027
Figure 480243DEST_PATH_IMAGE010
Figure 779375DEST_PATH_IMAGE028
Figure 879049DEST_PATH_IMAGE011
Figure 582956DEST_PATH_IMAGE029
Figure 867307DEST_PATH_IMAGE012
Figure 291521DEST_PATH_IMAGE013
Figure 348470DEST_PATH_IMAGE022
Figure 955742DEST_PATH_IMAGE023
Figure 521853DEST_PATH_IMAGE015
Figure 931843DEST_PATH_IMAGE024
Figure 433363DEST_PATH_IMAGE016
Figure 197313DEST_PATH_IMAGE025
Figure 301535DEST_PATH_IMAGE017
Figure 333076DEST_PATH_IMAGE026
, during binary operator control variables k=4, decrypt operation is M i=
Figure 504032DEST_PATH_IMAGE027
Figure 988235DEST_PATH_IMAGE010
Figure 374496DEST_PATH_IMAGE028
Figure 260543DEST_PATH_IMAGE011
Figure 228499DEST_PATH_IMAGE029
Figure 78293DEST_PATH_IMAGE012
Figure 31916DEST_PATH_IMAGE013
Figure 46140DEST_PATH_IMAGE018
Figure 3469DEST_PATH_IMAGE014
Figure 253185DEST_PATH_IMAGE023
Figure 113825DEST_PATH_IMAGE015
Figure 800414DEST_PATH_IMAGE024
Figure 746505DEST_PATH_IMAGE016
Figure 173813DEST_PATH_IMAGE025
Figure 13593DEST_PATH_IMAGE017
Figure 369619DEST_PATH_IMAGE026
, during binary operator control variables k=5, decrypt operation is M i=
Figure 771355DEST_PATH_IMAGE010
Figure 839543DEST_PATH_IMAGE028
Figure 491104DEST_PATH_IMAGE011
Figure 59193DEST_PATH_IMAGE012
Figure 607986DEST_PATH_IMAGE022
Figure 69929DEST_PATH_IMAGE013
Figure 212328DEST_PATH_IMAGE023
Figure 499043DEST_PATH_IMAGE014
Figure 167922DEST_PATH_IMAGE018
Figure 302231DEST_PATH_IMAGE015
Figure 164882DEST_PATH_IMAGE024
Figure 42840DEST_PATH_IMAGE016
Figure 943056DEST_PATH_IMAGE025
Figure 982687DEST_PATH_IMAGE017
Figure 473580DEST_PATH_IMAGE026
, during binary operator control variables k=6, decrypt operation is M i=
Figure 391114DEST_PATH_IMAGE027
Figure 644372DEST_PATH_IMAGE010
Figure 494385DEST_PATH_IMAGE028
Figure 334559DEST_PATH_IMAGE011
Figure 554319DEST_PATH_IMAGE029
Figure 426197DEST_PATH_IMAGE012
Figure 400680DEST_PATH_IMAGE013
Figure 511036DEST_PATH_IMAGE014
Figure 561906DEST_PATH_IMAGE024
Figure 875207DEST_PATH_IMAGE015
Figure 938234DEST_PATH_IMAGE018
Figure 145225DEST_PATH_IMAGE016
Figure 532846DEST_PATH_IMAGE026
, during binary operator control variables k=7, decrypt operation is M i=
Figure 236754DEST_PATH_IMAGE027
Figure 396471DEST_PATH_IMAGE010
Figure 917320DEST_PATH_IMAGE028
Figure 2267DEST_PATH_IMAGE029
Figure 609540DEST_PATH_IMAGE022
Figure 549551DEST_PATH_IMAGE013
Figure 585641DEST_PATH_IMAGE023
Figure 87160DEST_PATH_IMAGE014
Figure 861166DEST_PATH_IMAGE024
Figure 106333DEST_PATH_IMAGE015
Figure 639339DEST_PATH_IMAGE025
Figure 311760DEST_PATH_IMAGE016
Figure 294498DEST_PATH_IMAGE018
Figure 77777DEST_PATH_IMAGE017
Figure 88458DEST_PATH_IMAGE026
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 433245DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 404743DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 496382DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 635239DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multiparameter single argument monobasic encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100239681100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and the eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100239681100001DEST_PATH_IMAGE002
,
Figure 2013100239681100001DEST_PATH_IMAGE003
,
Figure 2013100239681100001DEST_PATH_IMAGE004
,
Figure 2013100239681100001DEST_PATH_IMAGE005
, ,
Figure 2013100239681100001DEST_PATH_IMAGE007
,
Figure 2013100239681100001DEST_PATH_IMAGE008
With
Figure 2013100239681100001DEST_PATH_IMAGE009
, encryption parameter ,
Figure 733345DEST_PATH_IMAGE003
,
Figure 886983DEST_PATH_IMAGE004
,
Figure 282192DEST_PATH_IMAGE005
,
Figure 971931DEST_PATH_IMAGE006
,
Figure 171224DEST_PATH_IMAGE007
,
Figure 313624DEST_PATH_IMAGE008
With
Figure 886425DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, the eight-digit binary number encryption variables is denoted as respectively j and q, the binary system positive integer that encryption variables j and q are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100239681100001DEST_PATH_IMAGE010
Figure 2013100239681100001DEST_PATH_IMAGE011
Figure 2013100239681100001DEST_PATH_IMAGE012
Figure 2013100239681100001DEST_PATH_IMAGE013
Figure 2013100239681100001DEST_PATH_IMAGE014
Figure 2013100239681100001DEST_PATH_IMAGE015
Figure 2013100239681100001DEST_PATH_IMAGE016
Figure 2013100239681100001DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 433600DEST_PATH_IMAGE010
Figure 426964DEST_PATH_IMAGE011
Figure 558124DEST_PATH_IMAGE012
Figure 67789DEST_PATH_IMAGE014
Figure 373000DEST_PATH_IMAGE015
Figure 266580DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 785417DEST_PATH_IMAGE010
Figure 223406DEST_PATH_IMAGE012
Figure 177587DEST_PATH_IMAGE013
Figure 52395DEST_PATH_IMAGE014
Figure 699408DEST_PATH_IMAGE015
Figure 23948DEST_PATH_IMAGE016
Figure 781820DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 453683DEST_PATH_IMAGE011
Figure 766984DEST_PATH_IMAGE012
Figure 561502DEST_PATH_IMAGE013
Figure 909438DEST_PATH_IMAGE014
Figure 376281DEST_PATH_IMAGE015
Figure 176878DEST_PATH_IMAGE016
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 213415DEST_PATH_IMAGE010
Figure 497766DEST_PATH_IMAGE011
Figure 287124DEST_PATH_IMAGE012
Figure 745973DEST_PATH_IMAGE014
Figure 710835DEST_PATH_IMAGE016
Figure 653777DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 830811DEST_PATH_IMAGE010
Figure 565287DEST_PATH_IMAGE011
Figure 952406DEST_PATH_IMAGE012
Figure 197573DEST_PATH_IMAGE013
Figure 465000DEST_PATH_IMAGE014
Figure 137421DEST_PATH_IMAGE015
Figure 746257DEST_PATH_IMAGE016
Figure 293651DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 179698DEST_PATH_IMAGE010
Figure 524485DEST_PATH_IMAGE011
Figure 495983DEST_PATH_IMAGE012
Figure 581489DEST_PATH_IMAGE013
Figure 322043DEST_PATH_IMAGE014
Figure 837731DEST_PATH_IMAGE015
Figure 296526DEST_PATH_IMAGE016
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 538096DEST_PATH_IMAGE012
Figure 466869DEST_PATH_IMAGE013
Figure 555917DEST_PATH_IMAGE014
Figure 36577DEST_PATH_IMAGE015
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 342438DEST_PATH_IMAGE010
Figure 869365DEST_PATH_IMAGE011
Figure 914682DEST_PATH_IMAGE012
Figure 686722DEST_PATH_IMAGE013
Figure 572824DEST_PATH_IMAGE015
Figure 839858DEST_PATH_IMAGE016
Figure 914124DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the monobasic cryptographic calculation is defined as H i=
Figure 2013100239681100001DEST_PATH_IMAGE018
Figure 569621DEST_PATH_IMAGE010
Figure 2013100239681100001DEST_PATH_IMAGE019
Figure 202465DEST_PATH_IMAGE011
Figure 2013100239681100001DEST_PATH_IMAGE020
Figure 208992DEST_PATH_IMAGE012
Figure 2013100239681100001DEST_PATH_IMAGE021
Figure 195271DEST_PATH_IMAGE013
Figure 2013100239681100001DEST_PATH_IMAGE022
Figure 970854DEST_PATH_IMAGE014
Figure 276064DEST_PATH_IMAGE015
Figure 42081DEST_PATH_IMAGE016
Figure 62383DEST_PATH_IMAGE025
Figure 272915DEST_PATH_IMAGE017
Figure 375738DEST_PATH_IMAGE026
, during binary operator control variables k=1, the monobasic cryptographic calculation is defined as H i=
Figure 827897DEST_PATH_IMAGE010
Figure 710795DEST_PATH_IMAGE018
Figure 802379DEST_PATH_IMAGE011
Figure 58786DEST_PATH_IMAGE028
Figure 606015DEST_PATH_IMAGE029
Figure 43950DEST_PATH_IMAGE013
Figure 339933DEST_PATH_IMAGE022
Figure 186404DEST_PATH_IMAGE014
Figure 909641DEST_PATH_IMAGE023
Figure 188265DEST_PATH_IMAGE015
Figure 412573DEST_PATH_IMAGE024
Figure 615015DEST_PATH_IMAGE016
Figure 273267DEST_PATH_IMAGE025
Figure 937991DEST_PATH_IMAGE017
Figure 575777DEST_PATH_IMAGE026
, during binary operator control variables k=2, the monobasic cryptographic calculation is defined as H i=
Figure 930743DEST_PATH_IMAGE011
Figure 343663DEST_PATH_IMAGE018
Figure 845183DEST_PATH_IMAGE012
Figure 606203DEST_PATH_IMAGE029
Figure 585791DEST_PATH_IMAGE013
Figure 118797DEST_PATH_IMAGE022
Figure 400054DEST_PATH_IMAGE023
Figure 947448DEST_PATH_IMAGE015
Figure 178282DEST_PATH_IMAGE016
Figure 274414DEST_PATH_IMAGE025
Figure 595805DEST_PATH_IMAGE017
Figure 100474DEST_PATH_IMAGE026
, during binary operator control variables k=3, the monobasic cryptographic calculation is defined as H i=
Figure 114697DEST_PATH_IMAGE027
Figure 698125DEST_PATH_IMAGE010
Figure 324672DEST_PATH_IMAGE028
Figure 185312DEST_PATH_IMAGE011
Figure 868972DEST_PATH_IMAGE029
Figure 868469DEST_PATH_IMAGE018
Figure 108518DEST_PATH_IMAGE013
Figure 130886DEST_PATH_IMAGE014
Figure 863350DEST_PATH_IMAGE023
Figure 934467DEST_PATH_IMAGE015
Figure 506711DEST_PATH_IMAGE016
Figure 275822DEST_PATH_IMAGE025
Figure 699981DEST_PATH_IMAGE017
Figure 164854DEST_PATH_IMAGE026
, during binary operator control variables k=4, the monobasic cryptographic calculation is defined as H i=
Figure 307253DEST_PATH_IMAGE027
Figure 158721DEST_PATH_IMAGE028
Figure 794495DEST_PATH_IMAGE011
Figure 158611DEST_PATH_IMAGE029
Figure 535104DEST_PATH_IMAGE012
Figure 58489DEST_PATH_IMAGE022
Figure 98120DEST_PATH_IMAGE013
Figure 716577DEST_PATH_IMAGE018
Figure 132646DEST_PATH_IMAGE014
Figure 884439DEST_PATH_IMAGE023
Figure 485184DEST_PATH_IMAGE015
Figure 823893DEST_PATH_IMAGE024
Figure 918461DEST_PATH_IMAGE025
Figure 424529DEST_PATH_IMAGE017
Figure 890014DEST_PATH_IMAGE026
, during binary operator control variables k=5, the monobasic cryptographic calculation is defined as H i=
Figure 772520DEST_PATH_IMAGE027
Figure 501835DEST_PATH_IMAGE010
Figure 54170DEST_PATH_IMAGE028
Figure 866006DEST_PATH_IMAGE011
Figure 427568DEST_PATH_IMAGE029
Figure 205DEST_PATH_IMAGE022
Figure 79481DEST_PATH_IMAGE014
Figure 363832DEST_PATH_IMAGE018
Figure 666342DEST_PATH_IMAGE024
Figure 224756DEST_PATH_IMAGE016
Figure 829098DEST_PATH_IMAGE017
, during binary operator control variables k=6, the monobasic cryptographic calculation is defined as H i=
Figure 683495DEST_PATH_IMAGE027
Figure 309649DEST_PATH_IMAGE010
Figure 306555DEST_PATH_IMAGE028
Figure 50257DEST_PATH_IMAGE011
Figure 81798DEST_PATH_IMAGE029
Figure 255684DEST_PATH_IMAGE012
Figure 739886DEST_PATH_IMAGE022
Figure 21701DEST_PATH_IMAGE013
Figure 907748DEST_PATH_IMAGE023
Figure 224034DEST_PATH_IMAGE024
Figure 935638DEST_PATH_IMAGE015
Figure 440306DEST_PATH_IMAGE018
Figure 454530DEST_PATH_IMAGE016
Figure 899046DEST_PATH_IMAGE026
, during binary operator control variables k=7, the monobasic cryptographic calculation is defined as H i=
Figure 84170DEST_PATH_IMAGE027
Figure 289584DEST_PATH_IMAGE010
Figure 218357DEST_PATH_IMAGE028
Figure 58137DEST_PATH_IMAGE011
Figure 912698DEST_PATH_IMAGE029
Figure 346085DEST_PATH_IMAGE012
Figure 314434DEST_PATH_IMAGE022
Figure 149666DEST_PATH_IMAGE013
Figure 801227DEST_PATH_IMAGE023
Figure 954866DEST_PATH_IMAGE014
Figure 225441DEST_PATH_IMAGE024
Figure 114473DEST_PATH_IMAGE025
Figure 755408DEST_PATH_IMAGE016
Figure 829674DEST_PATH_IMAGE018
Figure 498553DEST_PATH_IMAGE017
Figure 868748DEST_PATH_IMAGE026
, set encryption parameter
Figure 498443DEST_PATH_IMAGE002
,
Figure 874936DEST_PATH_IMAGE003
,
Figure 273687DEST_PATH_IMAGE004
,
Figure 437952DEST_PATH_IMAGE005
,
Figure 56409DEST_PATH_IMAGE006
,
Figure 472478DEST_PATH_IMAGE007
,
Figure 224271DEST_PATH_IMAGE008
With
Figure 825017DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 163725DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 884950DEST_PATH_IMAGE030
Carry out H 1=
Figure 992714DEST_PATH_IMAGE031
Figure 138263DEST_PATH_IMAGE010
Figure 964267DEST_PATH_IMAGE019
Figure 846773DEST_PATH_IMAGE011
Figure 394002DEST_PATH_IMAGE012
Figure 974391DEST_PATH_IMAGE022
Figure 464671DEST_PATH_IMAGE014
Figure 265268DEST_PATH_IMAGE023
Figure 863478DEST_PATH_IMAGE015
Figure 190554DEST_PATH_IMAGE024
Figure 850612DEST_PATH_IMAGE025
Figure 753977DEST_PATH_IMAGE017
Figure 309461DEST_PATH_IMAGE026
Monobasic cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 640079DEST_PATH_IMAGE030
Carry out H 1=
Figure 404816DEST_PATH_IMAGE031
Figure 970927DEST_PATH_IMAGE010
Figure 147961DEST_PATH_IMAGE019
Figure 147852DEST_PATH_IMAGE020
Figure 891555DEST_PATH_IMAGE012
Figure 47729DEST_PATH_IMAGE021
Figure 720150DEST_PATH_IMAGE013
Figure 705817DEST_PATH_IMAGE022
Figure 489097DEST_PATH_IMAGE014
Figure 499778DEST_PATH_IMAGE023
Figure 841635DEST_PATH_IMAGE015
Figure 901569DEST_PATH_IMAGE016
Figure 780980DEST_PATH_IMAGE017
Figure 738309DEST_PATH_IMAGE026
Carry out i+1, j+1, q+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 2=
Figure 248933DEST_PATH_IMAGE010
Figure 878684DEST_PATH_IMAGE011
Figure 807457DEST_PATH_IMAGE028
Figure 647237DEST_PATH_IMAGE012
Figure 938114DEST_PATH_IMAGE013
Figure 903534DEST_PATH_IMAGE022
Figure 473187DEST_PATH_IMAGE014
Figure 390327DEST_PATH_IMAGE023
Figure 546895DEST_PATH_IMAGE015
Figure 817471DEST_PATH_IMAGE024
Figure 5744DEST_PATH_IMAGE016
Figure 828207DEST_PATH_IMAGE025
Figure 222804DEST_PATH_IMAGE017
Figure 421704DEST_PATH_IMAGE026
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 464484DEST_PATH_IMAGE033
Carry out H 2=
Figure 333214DEST_PATH_IMAGE027
Figure 464374DEST_PATH_IMAGE010
Figure 201386DEST_PATH_IMAGE032
Figure 600138DEST_PATH_IMAGE011
Figure 403883DEST_PATH_IMAGE028
Figure 172830DEST_PATH_IMAGE029
Figure 816301DEST_PATH_IMAGE013
Figure 26833DEST_PATH_IMAGE022
Figure 129656DEST_PATH_IMAGE014
Figure 83837DEST_PATH_IMAGE023
Figure 958645DEST_PATH_IMAGE015
Figure 730292DEST_PATH_IMAGE024
Figure 556297DEST_PATH_IMAGE016
Figure 40554DEST_PATH_IMAGE017
Figure 359933DEST_PATH_IMAGE026
Carry out i+1, j+1, q+1 and k+1 computing in the time of the monobasic cryptographic calculation, make next monobasic cryptographic calculation point to H 3=
Figure 797868DEST_PATH_IMAGE027
Figure 93851DEST_PATH_IMAGE010
Figure 940322DEST_PATH_IMAGE028
Figure 929138DEST_PATH_IMAGE011
Figure 207762DEST_PATH_IMAGE034
Figure 368933DEST_PATH_IMAGE029
Figure 27185DEST_PATH_IMAGE013
Figure 570205DEST_PATH_IMAGE022
Figure 972105DEST_PATH_IMAGE014
Figure 153688DEST_PATH_IMAGE023
Figure 218727DEST_PATH_IMAGE015
Figure 370747DEST_PATH_IMAGE024
Figure 310759DEST_PATH_IMAGE016
Figure 487794DEST_PATH_IMAGE025
Figure 612318DEST_PATH_IMAGE026
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 857486DEST_PATH_IMAGE001
carry out the monobasic cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100239681A 2013-01-22 2013-01-22 Multiparameter univariate unitary encryption anti-fake information storage trademark Pending CN103106507A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100239681A CN103106507A (en) 2013-01-22 2013-01-22 Multiparameter univariate unitary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100239681A CN103106507A (en) 2013-01-22 2013-01-22 Multiparameter univariate unitary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106507A true CN103106507A (en) 2013-05-15

Family

ID=48314353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100239681A Pending CN103106507A (en) 2013-01-22 2013-01-22 Multiparameter univariate unitary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106507A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103116800A (en) Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark
CN103106507A (en) Multiparameter univariate unitary encryption anti-fake information storage trademark
CN103106521A (en) Multiparameter univariate ternary encryption anti-fake information storage trademark
CN103106482A (en) Multiparameter univariate binary encryption anti-fake information storage trademark
CN103106436A (en) Multiparameter univariate unitary cycle encryption anti-fake information storage trademark
CN103106497A (en) Multiparameter univariate binary variable cycle encryption anti-fake information storage trademark
CN103106461A (en) Multiparameter multivariable unitary encryption anti-fake information storage trademark
CN103106525A (en) Multiparameter multielement encryption anti-fake information storage trademark
CN103106455A (en) Multiparameter univariate binary cycle encryption anti-fake information storage trademark
CN103106523A (en) Multiparameter univariate multielement cycle encryption anti-fake information storage trademark
CN103106500A (en) Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103106490A (en) Multiparameter polytomy variable cycle encryption anti-fake information storage trademark
CN103106435A (en) Multiparameter univariate ternary variable cycle encryption anti-fake information storage trademark
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark
CN103106498A (en) Multiparameter multivariable multielement encryption anti-fake information storage trademark
CN103106476A (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106504A (en) Single variable parameter transmutation binary encryption anti-fake information storage trademark
CN103106514A (en) Multi-parameter binary encryption anti-fake information storage brand
CN103106496A (en) Multi-parameter unitary circulating encryption anti-fake information storage brand
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103106444A (en) Single variable parameter transmutation ternary encryption anti-fake information storage trademark
CN103106483A (en) Multi-parameter ternary encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515