CN103106513A - Multi-parameter univariate poly encryption anti-fake information storage trademark - Google Patents

Multi-parameter univariate poly encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106513A
CN103106513A CN2013100224120A CN201310022412A CN103106513A CN 103106513 A CN103106513 A CN 103106513A CN 2013100224120 A CN2013100224120 A CN 2013100224120A CN 201310022412 A CN201310022412 A CN 201310022412A CN 103106513 A CN103106513 A CN 103106513A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100224120A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100224120A priority Critical patent/CN103106513A/en
Publication of CN103106513A publication Critical patent/CN103106513A/en
Pending legal-status Critical Current

Links

Images

Abstract

Disclosed is a multi-parameter univariate poly encryption anti-fake information storage trademark. The multi-parameter univariate poly encryption anti-fake information storage trademark can enable binary system anti-fake information to be generated into a binary system modulating signal through polynary encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multiparameter univariate multielement anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multiparameter univariate multielement anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 852703DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 395942DEST_PATH_IMAGE002
Figure 300313DEST_PATH_IMAGE003
Figure 345059DEST_PATH_IMAGE004
Figure 910163DEST_PATH_IMAGE005
Figure 483358DEST_PATH_IMAGE006
Figure 875025DEST_PATH_IMAGE007
Figure 700024DEST_PATH_IMAGE008
With
Figure 493537DEST_PATH_IMAGE009
, encryption parameter
Figure 991962DEST_PATH_IMAGE003
Figure 3092DEST_PATH_IMAGE005
Figure 432936DEST_PATH_IMAGE006
Figure 300660DEST_PATH_IMAGE007
Figure 700418DEST_PATH_IMAGE008
With
Figure 969987DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j and q respectively, and encryption variables j and q are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 429787DEST_PATH_IMAGE010
Figure 784808DEST_PATH_IMAGE011
Figure 988256DEST_PATH_IMAGE012
Figure 112332DEST_PATH_IMAGE013
Figure 8613DEST_PATH_IMAGE014
Figure 571071DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 513620DEST_PATH_IMAGE010
Figure 76188DEST_PATH_IMAGE011
Figure 122904DEST_PATH_IMAGE012
Figure 720107DEST_PATH_IMAGE013
Figure 459655DEST_PATH_IMAGE014
Figure 509520DEST_PATH_IMAGE015
Figure 359926DEST_PATH_IMAGE016
Figure 421423DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 830408DEST_PATH_IMAGE010
Figure 21666DEST_PATH_IMAGE012
Figure 805910DEST_PATH_IMAGE013
Figure 120216DEST_PATH_IMAGE014
Figure 646138DEST_PATH_IMAGE015
Figure 336882DEST_PATH_IMAGE016
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 625223DEST_PATH_IMAGE010
Figure 136976DEST_PATH_IMAGE011
Figure 132876DEST_PATH_IMAGE012
Figure 148106DEST_PATH_IMAGE013
Figure 571259DEST_PATH_IMAGE014
Figure 304729DEST_PATH_IMAGE015
Figure 104320DEST_PATH_IMAGE016
Figure 239635DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 833689DEST_PATH_IMAGE010
Figure 54455DEST_PATH_IMAGE011
Figure 392158DEST_PATH_IMAGE012
Figure 257346DEST_PATH_IMAGE013
Figure 520837DEST_PATH_IMAGE014
Figure 730363DEST_PATH_IMAGE015
Figure 104713DEST_PATH_IMAGE016
Figure 716085DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 150478DEST_PATH_IMAGE010
Figure 847300DEST_PATH_IMAGE011
Figure 25341DEST_PATH_IMAGE012
Figure 865121DEST_PATH_IMAGE013
Figure 971879DEST_PATH_IMAGE014
Figure 388954DEST_PATH_IMAGE015
Figure 872150DEST_PATH_IMAGE016
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 968731DEST_PATH_IMAGE010
Figure 159989DEST_PATH_IMAGE012
Figure 833415DEST_PATH_IMAGE013
Figure 939223DEST_PATH_IMAGE015
Figure 3459DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 387035DEST_PATH_IMAGE010
Figure 767464DEST_PATH_IMAGE011
Figure 629109DEST_PATH_IMAGE012
Figure 778593DEST_PATH_IMAGE013
Figure 333071DEST_PATH_IMAGE014
Figure 935216DEST_PATH_IMAGE015
Figure 600553DEST_PATH_IMAGE016
Figure 870122DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 329922DEST_PATH_IMAGE010
Figure 809576DEST_PATH_IMAGE011
Figure 514489DEST_PATH_IMAGE012
Figure 137101DEST_PATH_IMAGE013
Figure 643168DEST_PATH_IMAGE014
Figure 485485DEST_PATH_IMAGE015
Figure 492624DEST_PATH_IMAGE016
Figure 471206DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 538388DEST_PATH_IMAGE018
Figure 602422DEST_PATH_IMAGE010
Figure 147672DEST_PATH_IMAGE019
Figure 246341DEST_PATH_IMAGE011
Figure 218845DEST_PATH_IMAGE018
Figure 144075DEST_PATH_IMAGE012
Figure 994482DEST_PATH_IMAGE020
Figure 446192DEST_PATH_IMAGE013
Figure 356641DEST_PATH_IMAGE018
Figure 519901DEST_PATH_IMAGE014
Figure 406954DEST_PATH_IMAGE021
Figure 214635DEST_PATH_IMAGE015
Figure 794521DEST_PATH_IMAGE018
Figure 320443DEST_PATH_IMAGE016
Figure 886553DEST_PATH_IMAGE022
Figure 47276DEST_PATH_IMAGE017
Figure 276091DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 787844DEST_PATH_IMAGE018
Figure 798973DEST_PATH_IMAGE023
Figure 955596DEST_PATH_IMAGE018
Figure 129088DEST_PATH_IMAGE012
Figure 765868DEST_PATH_IMAGE024
Figure 858458DEST_PATH_IMAGE013
Figure 580689DEST_PATH_IMAGE018
Figure 151347DEST_PATH_IMAGE014
Figure 908213DEST_PATH_IMAGE021
Figure 171704DEST_PATH_IMAGE015
Figure 381231DEST_PATH_IMAGE018
Figure 755580DEST_PATH_IMAGE016
Figure 366953DEST_PATH_IMAGE022
Figure 801345DEST_PATH_IMAGE017
Figure 872069DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 551574DEST_PATH_IMAGE018
Figure 515988DEST_PATH_IMAGE010
Figure 622747DEST_PATH_IMAGE023
Figure 39822DEST_PATH_IMAGE011
Figure 523018DEST_PATH_IMAGE018
Figure 341938DEST_PATH_IMAGE012
Figure 619598DEST_PATH_IMAGE024
Figure 789548DEST_PATH_IMAGE013
Figure 810856DEST_PATH_IMAGE018
Figure 484283DEST_PATH_IMAGE014
Figure 198423DEST_PATH_IMAGE021
Figure 465457DEST_PATH_IMAGE015
Figure 523411DEST_PATH_IMAGE018
Figure 201965DEST_PATH_IMAGE022
Figure 316814DEST_PATH_IMAGE017
Figure 444039DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 901147DEST_PATH_IMAGE023
Figure 67948DEST_PATH_IMAGE011
Figure 171219DEST_PATH_IMAGE012
Figure 260660DEST_PATH_IMAGE025
Figure 729688DEST_PATH_IMAGE013
Figure 853764DEST_PATH_IMAGE018
Figure 326782DEST_PATH_IMAGE021
Figure 333921DEST_PATH_IMAGE015
Figure 312504DEST_PATH_IMAGE018
Figure 114106DEST_PATH_IMAGE016
Figure 178140DEST_PATH_IMAGE022
Figure 864336DEST_PATH_IMAGE017
Figure 195960DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 935508DEST_PATH_IMAGE018
Figure 835779DEST_PATH_IMAGE023
Figure 287489DEST_PATH_IMAGE011
Figure 469520DEST_PATH_IMAGE012
Figure 123617DEST_PATH_IMAGE025
Figure 305200DEST_PATH_IMAGE013
Figure 885086DEST_PATH_IMAGE018
Figure 512204DEST_PATH_IMAGE014
Figure 704413DEST_PATH_IMAGE021
Figure 865136DEST_PATH_IMAGE015
Figure 117388DEST_PATH_IMAGE018
Figure 363561DEST_PATH_IMAGE016
Figure 733363DEST_PATH_IMAGE022
Figure 515636DEST_PATH_IMAGE017
Figure 437325DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 672259DEST_PATH_IMAGE018
Figure 704806DEST_PATH_IMAGE010
Figure 341586DEST_PATH_IMAGE023
Figure 434176DEST_PATH_IMAGE011
Figure 156407DEST_PATH_IMAGE018
Figure 992645DEST_PATH_IMAGE012
Figure 749510DEST_PATH_IMAGE025
Figure 13001DEST_PATH_IMAGE013
Figure 596878DEST_PATH_IMAGE014
Figure 208250DEST_PATH_IMAGE026
Figure 518008DEST_PATH_IMAGE015
Figure 447787DEST_PATH_IMAGE018
Figure 127292DEST_PATH_IMAGE016
Figure 91706DEST_PATH_IMAGE022
Figure 198465DEST_PATH_IMAGE017
Figure 881119DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 183235DEST_PATH_IMAGE010
Figure 460895DEST_PATH_IMAGE023
Figure 365266DEST_PATH_IMAGE011
Figure 760475DEST_PATH_IMAGE018
Figure 200946DEST_PATH_IMAGE012
Figure 148043DEST_PATH_IMAGE025
Figure 41174DEST_PATH_IMAGE013
Figure 364708DEST_PATH_IMAGE018
Figure 683123DEST_PATH_IMAGE014
Figure 801121DEST_PATH_IMAGE026
Figure 181549DEST_PATH_IMAGE015
Figure 308774DEST_PATH_IMAGE018
Figure 458258DEST_PATH_IMAGE016
Figure 747157DEST_PATH_IMAGE022
Figure 994641DEST_PATH_IMAGE017
Figure 161443DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 478789DEST_PATH_IMAGE023
Figure 449281DEST_PATH_IMAGE011
Figure 806313DEST_PATH_IMAGE018
Figure 204059DEST_PATH_IMAGE012
Figure 279331DEST_PATH_IMAGE025
Figure 787935DEST_PATH_IMAGE013
Figure 265052DEST_PATH_IMAGE018
Figure 372830DEST_PATH_IMAGE026
Figure 685125DEST_PATH_IMAGE015
Figure 681528DEST_PATH_IMAGE027
Figure 30470DEST_PATH_IMAGE017
, set encryption parameter
Figure 127050DEST_PATH_IMAGE002
Figure 318308DEST_PATH_IMAGE004
Figure 705875DEST_PATH_IMAGE006
Figure 966218DEST_PATH_IMAGE007
Figure 656962DEST_PATH_IMAGE008
With
Figure 584729DEST_PATH_IMAGE009
Initial value, setting encryption variables j and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 335516DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 83154DEST_PATH_IMAGE028
Carry out H1=
Figure 577590DEST_PATH_IMAGE029
Figure 156918DEST_PATH_IMAGE019
Figure 890388DEST_PATH_IMAGE011
Figure 424399DEST_PATH_IMAGE029
Figure 559714DEST_PATH_IMAGE012
Figure 153769DEST_PATH_IMAGE020
Figure 374535DEST_PATH_IMAGE013
Figure 467015DEST_PATH_IMAGE021
Figure 175077DEST_PATH_IMAGE015
Figure 316471DEST_PATH_IMAGE029
Figure 96656DEST_PATH_IMAGE022
Figure 292014DEST_PATH_IMAGE017
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is rightCarry out H1=
Figure 440030DEST_PATH_IMAGE029
Figure 6840DEST_PATH_IMAGE010
Figure 224457DEST_PATH_IMAGE019
Figure 43377DEST_PATH_IMAGE011
Figure 586616DEST_PATH_IMAGE029
Figure 490987DEST_PATH_IMAGE012
Figure 512295DEST_PATH_IMAGE020
Figure 451301DEST_PATH_IMAGE013
Figure 273764DEST_PATH_IMAGE029
Figure 143458DEST_PATH_IMAGE014
Figure 466992DEST_PATH_IMAGE021
Figure 879967DEST_PATH_IMAGE029
Figure 634296DEST_PATH_IMAGE016
Figure 997407DEST_PATH_IMAGE022
Figure 645426DEST_PATH_IMAGE017
Figure 701369DEST_PATH_IMAGE029
I+1, j+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 67628DEST_PATH_IMAGE030
Figure 342752DEST_PATH_IMAGE010
Figure 72121DEST_PATH_IMAGE011
Figure 630590DEST_PATH_IMAGE012
Figure 754666DEST_PATH_IMAGE024
Figure 526313DEST_PATH_IMAGE013
Figure 587307DEST_PATH_IMAGE021
Figure 155954DEST_PATH_IMAGE015
Figure 593888DEST_PATH_IMAGE030
Figure 139139DEST_PATH_IMAGE016
Figure 237807DEST_PATH_IMAGE022
Figure 27220DEST_PATH_IMAGE030
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is rightCarry out H2=
Figure 437658DEST_PATH_IMAGE030
Figure 348108DEST_PATH_IMAGE010
Figure 539366DEST_PATH_IMAGE011
Figure 845582DEST_PATH_IMAGE030
Figure 661354DEST_PATH_IMAGE012
Figure 685811DEST_PATH_IMAGE024
Figure 664896DEST_PATH_IMAGE014
Figure 678114DEST_PATH_IMAGE021
Figure 172549DEST_PATH_IMAGE015
Figure 63145DEST_PATH_IMAGE030
Figure 946869DEST_PATH_IMAGE016
Figure 181804DEST_PATH_IMAGE022
Figure 355296DEST_PATH_IMAGE017
Figure 490611DEST_PATH_IMAGE030
I+1, j+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 305432DEST_PATH_IMAGE010
Figure 632956DEST_PATH_IMAGE011
Figure 397912DEST_PATH_IMAGE032
Figure 607439DEST_PATH_IMAGE012
Figure 483253DEST_PATH_IMAGE024
Figure 593160DEST_PATH_IMAGE013
Figure 529018DEST_PATH_IMAGE032
Figure 724376DEST_PATH_IMAGE014
Figure 403881DEST_PATH_IMAGE021
Figure 243661DEST_PATH_IMAGE015
Figure 848955DEST_PATH_IMAGE032
Figure 126057DEST_PATH_IMAGE022
Figure 944977DEST_PATH_IMAGE017
Figure 222637DEST_PATH_IMAGE032
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 18686DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 538529DEST_PATH_IMAGE002
Figure 713420DEST_PATH_IMAGE003
Figure 926096DEST_PATH_IMAGE004
Figure 119324DEST_PATH_IMAGE006
Figure 148722DEST_PATH_IMAGE007
Figure 407665DEST_PATH_IMAGE008
With
Figure 663460DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when set encryption variables j and q initial value for encryption, binary operator control variable k initial value design for k=0, by polynary ciphering process, and binary operator controls to decrypt computing during variable k=0 for Mi=
Figure 400471DEST_PATH_IMAGE018
Figure 48490DEST_PATH_IMAGE010
Figure 104433DEST_PATH_IMAGE019
Figure 122647DEST_PATH_IMAGE018
Figure 267583DEST_PATH_IMAGE012
Figure 602749DEST_PATH_IMAGE020
Figure 207037DEST_PATH_IMAGE013
Figure 911950DEST_PATH_IMAGE018
Figure 534562DEST_PATH_IMAGE014
Figure 40629DEST_PATH_IMAGE021
Figure 509044DEST_PATH_IMAGE015
Figure 494766DEST_PATH_IMAGE016
Figure 63413DEST_PATH_IMAGE022
Figure 501347DEST_PATH_IMAGE017
Figure 46598DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 168704DEST_PATH_IMAGE018
Figure 642673DEST_PATH_IMAGE010
Figure 567904DEST_PATH_IMAGE023
Figure 418310DEST_PATH_IMAGE011
Figure 780470DEST_PATH_IMAGE012
Figure 317630DEST_PATH_IMAGE024
Figure 80050DEST_PATH_IMAGE013
Figure 887731DEST_PATH_IMAGE018
Figure 467617DEST_PATH_IMAGE014
Figure 993538DEST_PATH_IMAGE021
Figure 684283DEST_PATH_IMAGE015
Figure 972624DEST_PATH_IMAGE016
Figure 110475DEST_PATH_IMAGE022
Figure 339331DEST_PATH_IMAGE017
Figure 495506DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 918660DEST_PATH_IMAGE018
Figure 652129DEST_PATH_IMAGE010
Figure 451720DEST_PATH_IMAGE023
Figure 587035DEST_PATH_IMAGE011
Figure 554991DEST_PATH_IMAGE018
Figure 401856DEST_PATH_IMAGE012
Figure 473979DEST_PATH_IMAGE024
Figure 729380DEST_PATH_IMAGE013
Figure 452114DEST_PATH_IMAGE021
Figure 63486DEST_PATH_IMAGE015
Figure 194701DEST_PATH_IMAGE016
Figure 372741DEST_PATH_IMAGE022
Figure 212521DEST_PATH_IMAGE017
Figure 295843DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 196114DEST_PATH_IMAGE010
Figure 15034DEST_PATH_IMAGE023
Figure 666595DEST_PATH_IMAGE011
Figure 462644DEST_PATH_IMAGE018
Figure 483952DEST_PATH_IMAGE012
Figure 32745DEST_PATH_IMAGE025
Figure 245420DEST_PATH_IMAGE013
Figure 138552DEST_PATH_IMAGE018
Figure 196507DEST_PATH_IMAGE014
Figure 491484DEST_PATH_IMAGE021
Figure 501160DEST_PATH_IMAGE015
Figure 989910DEST_PATH_IMAGE018
Figure 117135DEST_PATH_IMAGE016
Figure 266619DEST_PATH_IMAGE022
Figure 423242DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 88578DEST_PATH_IMAGE018
Figure 907389DEST_PATH_IMAGE011
Figure 251783DEST_PATH_IMAGE018
Figure 6560DEST_PATH_IMAGE025
Figure 347412DEST_PATH_IMAGE013
Figure 856016DEST_PATH_IMAGE018
Figure 208500DEST_PATH_IMAGE014
Figure 10102DEST_PATH_IMAGE021
Figure 74136DEST_PATH_IMAGE015
Figure 884966DEST_PATH_IMAGE018
Figure 718055DEST_PATH_IMAGE016
Figure 831504DEST_PATH_IMAGE022
Figure 881369DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 183485DEST_PATH_IMAGE018
Figure 267249DEST_PATH_IMAGE023
Figure 419882DEST_PATH_IMAGE011
Figure 227563DEST_PATH_IMAGE018
Figure 807449DEST_PATH_IMAGE012
Figure 333371DEST_PATH_IMAGE025
Figure 899481DEST_PATH_IMAGE013
Figure 60204DEST_PATH_IMAGE018
Figure 312456DEST_PATH_IMAGE014
Figure 558630DEST_PATH_IMAGE026
Figure 710705DEST_PATH_IMAGE018
Figure 632393DEST_PATH_IMAGE016
Figure 867328DEST_PATH_IMAGE022
Figure 899875DEST_PATH_IMAGE017
Figure 910556DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 504611DEST_PATH_IMAGE018
Figure 187713DEST_PATH_IMAGE023
Figure 318480DEST_PATH_IMAGE011
Figure 83436DEST_PATH_IMAGE018
Figure 525919DEST_PATH_IMAGE012
Figure 667312DEST_PATH_IMAGE025
Figure 86978DEST_PATH_IMAGE018
Figure 518222DEST_PATH_IMAGE014
Figure 696262DEST_PATH_IMAGE026
Figure 767434DEST_PATH_IMAGE018
Figure 325455DEST_PATH_IMAGE016
Figure 881794DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 807472DEST_PATH_IMAGE010
Figure 746478DEST_PATH_IMAGE023
Figure 195040DEST_PATH_IMAGE011
Figure 586707DEST_PATH_IMAGE018
Figure 80584DEST_PATH_IMAGE025
Figure 198582DEST_PATH_IMAGE013
Figure 579010DEST_PATH_IMAGE018
Figure 706235DEST_PATH_IMAGE014
Figure 386243DEST_PATH_IMAGE018
Figure 553044DEST_PATH_IMAGE016
Figure 55570DEST_PATH_IMAGE027
Figure 282414DEST_PATH_IMAGE017
Figure 870390DEST_PATH_IMAGE018
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 840883DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 197915DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 969561DEST_PATH_IMAGE028
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 546299DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 553438DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Multiparameter univariate multielement anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 691475DEST_PATH_IMAGE002
Figure 471212DEST_PATH_IMAGE003
Figure 492520DEST_PATH_IMAGE004
Figure 431526DEST_PATH_IMAGE005
Figure 271754DEST_PATH_IMAGE007
Figure 221386DEST_PATH_IMAGE008
With
Figure 890265DEST_PATH_IMAGE009
, encryption parameter
Figure 509728DEST_PATH_IMAGE002
Figure 388691DEST_PATH_IMAGE003
Figure 751801DEST_PATH_IMAGE004
Figure 399820DEST_PATH_IMAGE005
Figure 822022DEST_PATH_IMAGE007
WithFor 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j and q respectively, and encryption variables j and q are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 452614DEST_PATH_IMAGE010
Figure 181536DEST_PATH_IMAGE011
Figure 509060DEST_PATH_IMAGE013
Figure 405341DEST_PATH_IMAGE014
Figure 982078DEST_PATH_IMAGE015
Figure 864583DEST_PATH_IMAGE016
Figure 341701DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 910348DEST_PATH_IMAGE010
Figure 472916DEST_PATH_IMAGE011
Figure 519632DEST_PATH_IMAGE012
Figure 230285DEST_PATH_IMAGE014
Figure 383131DEST_PATH_IMAGE015
Figure 732073DEST_PATH_IMAGE016
Figure 419668DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 828653DEST_PATH_IMAGE010
Figure 241180DEST_PATH_IMAGE011
Figure 895277DEST_PATH_IMAGE012
Figure 17265DEST_PATH_IMAGE014
Figure 660233DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 646906DEST_PATH_IMAGE010
Figure 34025DEST_PATH_IMAGE011
Figure 528460DEST_PATH_IMAGE012
Figure 45155DEST_PATH_IMAGE013
Figure 966843DEST_PATH_IMAGE014
Figure 201778DEST_PATH_IMAGE015
Figure 126002DEST_PATH_IMAGE016
Figure 261317DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 951504DEST_PATH_IMAGE011
Figure 787742DEST_PATH_IMAGE012
Figure 125948DEST_PATH_IMAGE015
Figure 1762DEST_PATH_IMAGE016
Figure 111669DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 47526DEST_PATH_IMAGE010
Figure 118251DEST_PATH_IMAGE011
Figure 296291DEST_PATH_IMAGE012
Figure 762170DEST_PATH_IMAGE013
Figure 659905DEST_PATH_IMAGE015
Figure 267735DEST_PATH_IMAGE016
Figure 588120DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 239681DEST_PATH_IMAGE010
Figure 409631DEST_PATH_IMAGE011
Figure 407501DEST_PATH_IMAGE012
Figure 80928DEST_PATH_IMAGE013
Figure 795069DEST_PATH_IMAGE014
Figure 186736DEST_PATH_IMAGE015
Figure 11734DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 798611DEST_PATH_IMAGE010
Figure 179039DEST_PATH_IMAGE011
Figure 40684DEST_PATH_IMAGE012
Figure 190168DEST_PATH_IMAGE013
Figure 744646DEST_PATH_IMAGE014
Figure 346791DEST_PATH_IMAGE015
Figure 281697DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 741498DEST_PATH_IMAGE010
Figure 470419DEST_PATH_IMAGE011
Figure 175332DEST_PATH_IMAGE012
Figure 797944DEST_PATH_IMAGE013
Figure 930110DEST_PATH_IMAGE014
Figure 270961DEST_PATH_IMAGE015
Figure 153467DEST_PATH_IMAGE016
Figure 132049DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 199231DEST_PATH_IMAGE018
Figure 263264DEST_PATH_IMAGE010
Figure 683882DEST_PATH_IMAGE019
Figure 281085DEST_PATH_IMAGE011
Figure 755054DEST_PATH_IMAGE018
Figure 655325DEST_PATH_IMAGE020
Figure 17484DEST_PATH_IMAGE018
Figure 554645DEST_PATH_IMAGE014
Figure 943163DEST_PATH_IMAGE021
Figure 124746DEST_PATH_IMAGE015
Figure 704632DEST_PATH_IMAGE018
Figure 230553DEST_PATH_IMAGE016
Figure 921298DEST_PATH_IMAGE022
Figure 606923DEST_PATH_IMAGE017
Figure 357710DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 370928DEST_PATH_IMAGE018
Figure 475150DEST_PATH_IMAGE010
Figure 755958DEST_PATH_IMAGE023
Figure 179112DEST_PATH_IMAGE011
Figure 912582DEST_PATH_IMAGE018
Figure 2013100224120100001DEST_PATH_IMAGE024
Figure 847488DEST_PATH_IMAGE013
Figure 441542DEST_PATH_IMAGE018
Figure 662308DEST_PATH_IMAGE014
Figure 734432DEST_PATH_IMAGE021
Figure 865199DEST_PATH_IMAGE015
Figure 128690DEST_PATH_IMAGE018
Figure 338216DEST_PATH_IMAGE016
Figure 712566DEST_PATH_IMAGE022
Figure 633697DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 458083DEST_PATH_IMAGE018
Figure 636123DEST_PATH_IMAGE010
Figure 102002DEST_PATH_IMAGE023
Figure 707296DEST_PATH_IMAGE011
Figure 301853DEST_PATH_IMAGE024
Figure 579513DEST_PATH_IMAGE013
Figure 749463DEST_PATH_IMAGE018
Figure 747334DEST_PATH_IMAGE014
Figure 296127DEST_PATH_IMAGE021
Figure 508802DEST_PATH_IMAGE015
Figure 401934DEST_PATH_IMAGE018
Figure 459889DEST_PATH_IMAGE016
Figure 754866DEST_PATH_IMAGE022
Figure 13809DEST_PATH_IMAGE017
Figure 627193DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 68167DEST_PATH_IMAGE023
Figure 60525DEST_PATH_IMAGE011
Figure 227326DEST_PATH_IMAGE018
Figure 729852DEST_PATH_IMAGE012
Figure 2013100224120100001DEST_PATH_IMAGE025
Figure 81330DEST_PATH_IMAGE013
Figure 170771DEST_PATH_IMAGE018
Figure 639798DEST_PATH_IMAGE014
Figure 763874DEST_PATH_IMAGE021
Figure 269942DEST_PATH_IMAGE015
Figure 610794DEST_PATH_IMAGE018
Figure 119398DEST_PATH_IMAGE016
Figure 596515DEST_PATH_IMAGE022
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 774446DEST_PATH_IMAGE018
Figure 845619DEST_PATH_IMAGE023
Figure 895483DEST_PATH_IMAGE011
Figure 72966DEST_PATH_IMAGE012
Figure 481950DEST_PATH_IMAGE025
Figure 254997DEST_PATH_IMAGE013
Figure 407629DEST_PATH_IMAGE018
Figure 946755DEST_PATH_IMAGE016
Figure 697542DEST_PATH_IMAGE022
Figure 445181DEST_PATH_IMAGE017
Figure 939616DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 721889DEST_PATH_IMAGE018
Figure 643578DEST_PATH_IMAGE010
Figure 252414DEST_PATH_IMAGE023
Figure 515795DEST_PATH_IMAGE012
Figure 736561DEST_PATH_IMAGE025
Figure 74264DEST_PATH_IMAGE013
Figure 205031DEST_PATH_IMAGE018
Figure 2013100224120100001DEST_PATH_IMAGE026
Figure 537103DEST_PATH_IMAGE015
Figure 678497DEST_PATH_IMAGE018
Figure 706683DEST_PATH_IMAGE022
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 280381DEST_PATH_IMAGE018
Figure 387140DEST_PATH_IMAGE010
Figure 69794DEST_PATH_IMAGE023
Figure 287411DEST_PATH_IMAGE011
Figure 371910DEST_PATH_IMAGE018
Figure 649570DEST_PATH_IMAGE012
Figure 949150DEST_PATH_IMAGE013
Figure 389621DEST_PATH_IMAGE018
Figure 336717DEST_PATH_IMAGE014
Figure 428750DEST_PATH_IMAGE015
Figure 222262DEST_PATH_IMAGE018
Figure 841725DEST_PATH_IMAGE016
Figure 720688DEST_PATH_IMAGE022
Figure 723279DEST_PATH_IMAGE017
Figure 872763DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 161662DEST_PATH_IMAGE018
Figure 29386DEST_PATH_IMAGE010
Figure 694722DEST_PATH_IMAGE023
Figure 698713DEST_PATH_IMAGE011
Figure 424092DEST_PATH_IMAGE018
Figure 857927DEST_PATH_IMAGE025
Figure 214959DEST_PATH_IMAGE013
Figure 612704DEST_PATH_IMAGE018
Figure 687976DEST_PATH_IMAGE014
Figure 196580DEST_PATH_IMAGE026
Figure 616246DEST_PATH_IMAGE018
Figure 2013100224120100001DEST_PATH_IMAGE027
Figure 117208DEST_PATH_IMAGE017
Figure 448832DEST_PATH_IMAGE018
, set encryption parameter
Figure 211818DEST_PATH_IMAGE002
Figure 261683DEST_PATH_IMAGE003
Figure 485991DEST_PATH_IMAGE004
Figure 439165DEST_PATH_IMAGE005
Figure 582571DEST_PATH_IMAGE006
Figure 621196DEST_PATH_IMAGE007
With
Figure 955411DEST_PATH_IMAGE009
Initial value, setting encryption variables j and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 36762DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is rightCarry out H1=
Figure 2013100224120100001DEST_PATH_IMAGE029
Figure 421738DEST_PATH_IMAGE010
Figure 112483DEST_PATH_IMAGE019
Figure 791037DEST_PATH_IMAGE029
Figure 663309DEST_PATH_IMAGE012
Figure 33110DEST_PATH_IMAGE020
Figure 815384DEST_PATH_IMAGE013
Figure 737072DEST_PATH_IMAGE029
Figure 972007DEST_PATH_IMAGE014
Figure 879920DEST_PATH_IMAGE021
Figure 15235DEST_PATH_IMAGE015
Figure 609290DEST_PATH_IMAGE029
Figure 830056DEST_PATH_IMAGE016
Figure 167758DEST_PATH_IMAGE022
Figure 32946DEST_PATH_IMAGE017
Figure 296437DEST_PATH_IMAGE029
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 505964DEST_PATH_IMAGE028
Carry out H1=
Figure 145893DEST_PATH_IMAGE029
Figure 491686DEST_PATH_IMAGE010
Figure 926078DEST_PATH_IMAGE019
Figure 622901DEST_PATH_IMAGE011
Figure 640721DEST_PATH_IMAGE012
Figure 430134DEST_PATH_IMAGE013
Figure 647751DEST_PATH_IMAGE029
Figure 342037DEST_PATH_IMAGE014
Figure 383812DEST_PATH_IMAGE021
Figure 766210DEST_PATH_IMAGE015
Figure 286053DEST_PATH_IMAGE029
Figure 726524DEST_PATH_IMAGE016
Figure 548986DEST_PATH_IMAGE022
Figure 940653DEST_PATH_IMAGE017
I+1, j+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 2013100224120100001DEST_PATH_IMAGE030
Figure 309897DEST_PATH_IMAGE010
Figure 929360DEST_PATH_IMAGE023
Figure 683689DEST_PATH_IMAGE011
Figure 545335DEST_PATH_IMAGE030
Figure 694818DEST_PATH_IMAGE012
Figure 249297DEST_PATH_IMAGE024
Figure 490922DEST_PATH_IMAGE013
Figure 392144DEST_PATH_IMAGE030
Figure 160249DEST_PATH_IMAGE014
Figure 121514DEST_PATH_IMAGE021
Figure 850436DEST_PATH_IMAGE015
Figure 53884DEST_PATH_IMAGE030
Figure 177960DEST_PATH_IMAGE016
Figure 74241DEST_PATH_IMAGE022
Figure 650978DEST_PATH_IMAGE017
Figure 658117DEST_PATH_IMAGE030
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100224120100001DEST_PATH_IMAGE031
Carry out H2=
Figure 329980DEST_PATH_IMAGE010
Figure 767915DEST_PATH_IMAGE023
Figure 63898DEST_PATH_IMAGE011
Figure 162566DEST_PATH_IMAGE030
Figure 325880DEST_PATH_IMAGE024
Figure 176287DEST_PATH_IMAGE013
Figure 362417DEST_PATH_IMAGE030
Figure 272867DEST_PATH_IMAGE014
Figure 147430DEST_PATH_IMAGE021
Figure 926161DEST_PATH_IMAGE015
Figure 733842DEST_PATH_IMAGE030
Figure 48149DEST_PATH_IMAGE016
Figure 574071DEST_PATH_IMAGE022
Figure 890913DEST_PATH_IMAGE017
Figure 317216DEST_PATH_IMAGE030
I+1, j+1, q+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 2013100224120100001DEST_PATH_IMAGE032
Figure 428522DEST_PATH_IMAGE010
Figure 946134DEST_PATH_IMAGE023
Figure 832630DEST_PATH_IMAGE032
Figure 591914DEST_PATH_IMAGE024
Figure 900722DEST_PATH_IMAGE032
Figure 494776DEST_PATH_IMAGE014
Figure 466275DEST_PATH_IMAGE021
Figure 544531DEST_PATH_IMAGE032
Figure 309487DEST_PATH_IMAGE016
Figure 768282DEST_PATH_IMAGE022
Figure 629369DEST_PATH_IMAGE032
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 63762DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100224120A 2013-01-22 2013-01-22 Multi-parameter univariate poly encryption anti-fake information storage trademark Pending CN103106513A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100224120A CN103106513A (en) 2013-01-22 2013-01-22 Multi-parameter univariate poly encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100224120A CN103106513A (en) 2013-01-22 2013-01-22 Multi-parameter univariate poly encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106513A true CN103106513A (en) 2013-05-15

Family

ID=48314359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100224120A Pending CN103106513A (en) 2013-01-22 2013-01-22 Multi-parameter univariate poly encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106513A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106183533A (en) * 2016-09-25 2016-12-07 北京印刷学院 Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106218263A (en) * 2016-09-25 2016-12-14 北京印刷学院 Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427283A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427282A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN202106702U (en) * 2011-06-14 2012-01-11 北京印刷学院 Non-ink printing paper
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102298876A (en) * 2011-07-04 2011-12-28 北京印刷学院 Three-color overlapping ink-free printing paper

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106183533A (en) * 2016-09-25 2016-12-07 北京印刷学院 Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106218263A (en) * 2016-09-25 2016-12-14 北京印刷学院 Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427283A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427282A (en) * 2016-09-25 2017-02-22 北京印刷学院 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Similar Documents

Publication Publication Date Title
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515