CN103116788A - Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark - Google Patents

Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103116788A
CN103116788A CN201310022326XA CN201310022326A CN103116788A CN 103116788 A CN103116788 A CN 103116788A CN 201310022326X A CN201310022326X A CN 201310022326XA CN 201310022326 A CN201310022326 A CN 201310022326A CN 103116788 A CN103116788 A CN 103116788A
Authority
CN
China
Prior art keywords
binary
binary system
counterfeiting information
group
trade mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310022326XA
Other languages
Chinese (zh)
Other versions
CN103116788B (en
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022326.XA priority Critical patent/CN103116788B/en
Publication of CN103116788A publication Critical patent/CN103116788A/en
Application granted granted Critical
Publication of CN103116788B publication Critical patent/CN103116788B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

Provided is a multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark. By using the trademark, binary modulating signals can be generated from binary anti-counterfeiting information through binary variable cycle encryption and channel coding, and with a cycle look-up table method, the anti-counterfeiting information is embedded in an entire trademark page in a modulation mode with orderly change of conductivity of amplitude-modulated dot. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark can be used as any kind of anti-counterfeiting trademark.

Description

Multi-parameter binary variable circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multi-parameter binary variable circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 201310022326X100002DEST_PATH_IMAGE003
Figure 201310022326X100002DEST_PATH_IMAGE004
Figure 201310022326X100002DEST_PATH_IMAGE005
Figure 201310022326X100002DEST_PATH_IMAGE006
Figure 201310022326X100002DEST_PATH_IMAGE007
Figure 201310022326X100002DEST_PATH_IMAGE008
With
Figure 201310022326X100002DEST_PATH_IMAGE009
, encryption parameter
Figure 914761DEST_PATH_IMAGE002
Figure 831901DEST_PATH_IMAGE003
Figure 673955DEST_PATH_IMAGE004
Figure 758903DEST_PATH_IMAGE006
Figure 394415DEST_PATH_IMAGE007
Figure 723765DEST_PATH_IMAGE008
WithFor 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 201310022326X100002DEST_PATH_IMAGE011
Figure 201310022326X100002DEST_PATH_IMAGE012
Figure 201310022326X100002DEST_PATH_IMAGE013
Figure 201310022326X100002DEST_PATH_IMAGE015
Figure 201310022326X100002DEST_PATH_IMAGE016
Figure 201310022326X100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 903128DEST_PATH_IMAGE010
Figure 958809DEST_PATH_IMAGE011
Figure 523258DEST_PATH_IMAGE012
Figure 322587DEST_PATH_IMAGE013
Figure 659021DEST_PATH_IMAGE014
Figure 151183DEST_PATH_IMAGE015
Figure 205857DEST_PATH_IMAGE016
Figure 480981DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 186769DEST_PATH_IMAGE010
Figure 334984DEST_PATH_IMAGE011
Figure 126223DEST_PATH_IMAGE012
Figure 15157DEST_PATH_IMAGE013
Figure 575451DEST_PATH_IMAGE014
Figure 160148DEST_PATH_IMAGE015
Figure 173103DEST_PATH_IMAGE016
Figure 868658DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 221142DEST_PATH_IMAGE010
Figure 226007DEST_PATH_IMAGE011
Figure 476991DEST_PATH_IMAGE012
Figure 959924DEST_PATH_IMAGE013
Figure 242614DEST_PATH_IMAGE014
Figure 418380DEST_PATH_IMAGE015
Figure 343611DEST_PATH_IMAGE016
Figure 380968DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 504782DEST_PATH_IMAGE010
Figure 77026DEST_PATH_IMAGE012
Figure 918074DEST_PATH_IMAGE013
Figure 161973DEST_PATH_IMAGE014
Figure 185203DEST_PATH_IMAGE015
Figure 713454DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 883349DEST_PATH_IMAGE013
Figure 773945DEST_PATH_IMAGE014
Figure 384049DEST_PATH_IMAGE015
Figure 55202DEST_PATH_IMAGE016
Figure 38814DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 111812DEST_PATH_IMAGE010
Figure 892817DEST_PATH_IMAGE011
Figure 988949DEST_PATH_IMAGE012
Figure 762870DEST_PATH_IMAGE013
Figure 441107DEST_PATH_IMAGE014
Figure 642281DEST_PATH_IMAGE015
Figure 38759DEST_PATH_IMAGE016
Figure 350791DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 146185DEST_PATH_IMAGE010
Figure 518260DEST_PATH_IMAGE011
Figure 402034DEST_PATH_IMAGE012
Figure 517757DEST_PATH_IMAGE013
Figure 170587DEST_PATH_IMAGE014
Figure 713563DEST_PATH_IMAGE015
Figure 819054DEST_PATH_IMAGE016
Figure 738468DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 432755DEST_PATH_IMAGE010
Figure 894436DEST_PATH_IMAGE011
Figure 210327DEST_PATH_IMAGE013
Figure 821437DEST_PATH_IMAGE014
Figure 722528DEST_PATH_IMAGE015
Figure 51879DEST_PATH_IMAGE016
Figure 63828DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 201310022326X100002DEST_PATH_IMAGE018
Figure 339564DEST_PATH_IMAGE010
Figure 598507DEST_PATH_IMAGE002
Figure 201310022326X100002DEST_PATH_IMAGE019
Figure 856127DEST_PATH_IMAGE013
Figure 645223DEST_PATH_IMAGE005
Figure 248242DEST_PATH_IMAGE014
Figure 891713DEST_PATH_IMAGE006
Figure 36999DEST_PATH_IMAGE015
Figure 828238DEST_PATH_IMAGE007
Figure 280396DEST_PATH_IMAGE008
Figure 815731DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 760553DEST_PATH_IMAGE002
Figure 926086DEST_PATH_IMAGE010
Figure 930951DEST_PATH_IMAGE019
Figure 179005DEST_PATH_IMAGE011
Figure 661939DEST_PATH_IMAGE003
Figure 201310022326X100002DEST_PATH_IMAGE020
Figure 596026DEST_PATH_IMAGE005
Figure 22776DEST_PATH_IMAGE006
Figure 369444DEST_PATH_IMAGE015
Figure 781970DEST_PATH_IMAGE007
Figure 354510DEST_PATH_IMAGE016
Figure 598409DEST_PATH_IMAGE008
Figure 866711DEST_PATH_IMAGE017
Figure 828850DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 208010DEST_PATH_IMAGE002
Figure 306416DEST_PATH_IMAGE010
Figure 745619DEST_PATH_IMAGE003
Figure 195055DEST_PATH_IMAGE011
Figure 132834DEST_PATH_IMAGE020
Figure 351326DEST_PATH_IMAGE012
Figure 961430DEST_PATH_IMAGE004
Figure 632583DEST_PATH_IMAGE013
Figure 201310022326X100002DEST_PATH_IMAGE021
Figure 505172DEST_PATH_IMAGE006
Figure 535445DEST_PATH_IMAGE015
Figure 441696DEST_PATH_IMAGE007
Figure 950038DEST_PATH_IMAGE016
Figure 80805DEST_PATH_IMAGE008
Figure 32712DEST_PATH_IMAGE017
Figure 678457DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 741222DEST_PATH_IMAGE002
Figure 788812DEST_PATH_IMAGE010
Figure 911620DEST_PATH_IMAGE003
Figure 982344DEST_PATH_IMAGE011
Figure 98068DEST_PATH_IMAGE004
Figure 290944DEST_PATH_IMAGE021
Figure 396435DEST_PATH_IMAGE013
Figure 315849DEST_PATH_IMAGE005
Figure 823185DEST_PATH_IMAGE014
Figure 201310022326X100002DEST_PATH_IMAGE022
Figure 395429DEST_PATH_IMAGE007
Figure 852955DEST_PATH_IMAGE016
Figure 211868DEST_PATH_IMAGE008
Figure 362226DEST_PATH_IMAGE017
Figure 629260DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 375630DEST_PATH_IMAGE002
Figure 919875DEST_PATH_IMAGE010
Figure 178818DEST_PATH_IMAGE003
Figure 729885DEST_PATH_IMAGE011
Figure 545525DEST_PATH_IMAGE004
Figure 131227DEST_PATH_IMAGE012
Figure 105612DEST_PATH_IMAGE005
Figure 409555DEST_PATH_IMAGE013
Figure 763307DEST_PATH_IMAGE022
Figure 141198DEST_PATH_IMAGE014
Figure 804261DEST_PATH_IMAGE006
Figure 80653DEST_PATH_IMAGE015
Figure 201310022326X100002DEST_PATH_IMAGE023
Figure 300412DEST_PATH_IMAGE016
Figure 860707DEST_PATH_IMAGE008
Figure 176894DEST_PATH_IMAGE017
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 337934DEST_PATH_IMAGE002
Figure 503467DEST_PATH_IMAGE010
Figure 242753DEST_PATH_IMAGE003
Figure 493737DEST_PATH_IMAGE011
Figure 242250DEST_PATH_IMAGE004
Figure 262290DEST_PATH_IMAGE012
Figure 438056DEST_PATH_IMAGE005
Figure 173407DEST_PATH_IMAGE013
Figure 350889DEST_PATH_IMAGE014
Figure 635240DEST_PATH_IMAGE023
Figure 844505DEST_PATH_IMAGE015
Figure 682623DEST_PATH_IMAGE007
Figure 201310022326X100002DEST_PATH_IMAGE024
Figure 257141DEST_PATH_IMAGE017
Figure 156964DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 536124DEST_PATH_IMAGE002
Figure 634530DEST_PATH_IMAGE010
Figure 73732DEST_PATH_IMAGE003
Figure 257589DEST_PATH_IMAGE011
Figure 679439DEST_PATH_IMAGE012
Figure 476494DEST_PATH_IMAGE005
Figure 898379DEST_PATH_IMAGE013
Figure 868609DEST_PATH_IMAGE006
Figure 692340DEST_PATH_IMAGE014
Figure 722613DEST_PATH_IMAGE007
Figure 631794DEST_PATH_IMAGE015
Figure 343398DEST_PATH_IMAGE024
Figure 536482DEST_PATH_IMAGE016
Figure 485459DEST_PATH_IMAGE008
Figure 865625DEST_PATH_IMAGE017
Figure 193969DEST_PATH_IMAGE025
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 241560DEST_PATH_IMAGE027
Figure 364368DEST_PATH_IMAGE010
Figure 285236DEST_PATH_IMAGE011
Figure 938065DEST_PATH_IMAGE004
Figure 481042DEST_PATH_IMAGE012
Figure 849182DEST_PATH_IMAGE005
Figure 503017DEST_PATH_IMAGE013
Figure 275932DEST_PATH_IMAGE006
Figure 989811DEST_PATH_IMAGE014
Figure 769548DEST_PATH_IMAGE007
Figure 977806DEST_PATH_IMAGE015
Figure 819357DEST_PATH_IMAGE025
Figure 828377DEST_PATH_IMAGE017
Figure 559573DEST_PATH_IMAGE009
, set encryption parameter
Figure 365986DEST_PATH_IMAGE002
Figure 182632DEST_PATH_IMAGE003
Figure 583975DEST_PATH_IMAGE005
Figure 561289DEST_PATH_IMAGE006
Figure 865232DEST_PATH_IMAGE007
Figure 216054DEST_PATH_IMAGE008
With
Figure 656263DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 201310022326X100002DEST_PATH_IMAGE028
Carry out H1=
Figure 408766DEST_PATH_IMAGE029
Figure 815477DEST_PATH_IMAGE010
Figure 47875DEST_PATH_IMAGE002
Figure 632571DEST_PATH_IMAGE011
Figure 201310022326X100002DEST_PATH_IMAGE031
Figure 784809DEST_PATH_IMAGE012
Figure 542680DEST_PATH_IMAGE004
Figure 710149DEST_PATH_IMAGE005
Figure 961133DEST_PATH_IMAGE014
Figure 709646DEST_PATH_IMAGE006
Figure 916636DEST_PATH_IMAGE015
Figure 843135DEST_PATH_IMAGE007
Figure 830683DEST_PATH_IMAGE016
Figure 257433DEST_PATH_IMAGE017
Figure 86324DEST_PATH_IMAGE009
Binary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 498851DEST_PATH_IMAGE028
Carry out H1=
Figure 963068DEST_PATH_IMAGE029
Figure 957700DEST_PATH_IMAGE010
Figure 475269DEST_PATH_IMAGE002
Figure 922562DEST_PATH_IMAGE011
Figure 852658DEST_PATH_IMAGE012
Figure 288931DEST_PATH_IMAGE004
Figure 655638DEST_PATH_IMAGE005
Figure 874130DEST_PATH_IMAGE014
Figure 484234DEST_PATH_IMAGE006
Figure 653922DEST_PATH_IMAGE015
Figure 374885DEST_PATH_IMAGE007
Figure 385566DEST_PATH_IMAGE016
Figure 415839DEST_PATH_IMAGE008
Figure 158028DEST_PATH_IMAGE017
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary variable circulation cryptographic calculation, next binary variable circulation cryptographic calculation is pointed to H2=
Figure 610186DEST_PATH_IMAGE002
Figure 811360DEST_PATH_IMAGE010
Figure 207838DEST_PATH_IMAGE011
Figure 785450DEST_PATH_IMAGE003
Figure 318193DEST_PATH_IMAGE012
Figure 500388DEST_PATH_IMAGE013
Figure 633429DEST_PATH_IMAGE005
Figure 499885DEST_PATH_IMAGE014
Figure 277348DEST_PATH_IMAGE006
Figure 758008DEST_PATH_IMAGE015
Figure 129078DEST_PATH_IMAGE007
Figure 782913DEST_PATH_IMAGE016
Figure 287319DEST_PATH_IMAGE008
Figure 266777DEST_PATH_IMAGE017
Figure 859563DEST_PATH_IMAGE009
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 201310022326X100002DEST_PATH_IMAGE035
Carry out H2=
Figure 317089DEST_PATH_IMAGE002
Figure 944511DEST_PATH_IMAGE010
Figure 829290DEST_PATH_IMAGE032
Figure 781809DEST_PATH_IMAGE011
Figure 980710DEST_PATH_IMAGE003
Figure 711905DEST_PATH_IMAGE012
Figure 518318DEST_PATH_IMAGE034
Figure 334965DEST_PATH_IMAGE013
Figure 885026DEST_PATH_IMAGE005
Figure 470728DEST_PATH_IMAGE014
Figure 713621DEST_PATH_IMAGE006
Figure 17564DEST_PATH_IMAGE015
Figure 40490DEST_PATH_IMAGE007
Figure 497010DEST_PATH_IMAGE016
Figure 894494DEST_PATH_IMAGE008
Figure 699300DEST_PATH_IMAGE009
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary variable circulation cryptographic calculation, next binary variable circulation cryptographic calculation is pointed to H3=
Figure 72644DEST_PATH_IMAGE002
Figure 654410DEST_PATH_IMAGE010
Figure 362920DEST_PATH_IMAGE011
Figure 201310022326X100002DEST_PATH_IMAGE036
Figure 653087DEST_PATH_IMAGE012
Figure 408685DEST_PATH_IMAGE004
Figure 908936DEST_PATH_IMAGE013
Figure 201310022326X100002DEST_PATH_IMAGE038
Figure 225427DEST_PATH_IMAGE014
Figure 511046DEST_PATH_IMAGE006
Figure 773215DEST_PATH_IMAGE008
Figure 870615DEST_PATH_IMAGE017
Figure 345458DEST_PATH_IMAGE009
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out binary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, binary variable circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 365159DEST_PATH_IMAGE002
Figure 617149DEST_PATH_IMAGE003
Figure 958449DEST_PATH_IMAGE005
Figure 73167DEST_PATH_IMAGE006
Figure 496058DEST_PATH_IMAGE007
Figure 696226DEST_PATH_IMAGE008
WithInitial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by binary variable circulation ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 18940DEST_PATH_IMAGE018
Figure 626114DEST_PATH_IMAGE010
Figure 795802DEST_PATH_IMAGE002
Figure 782344DEST_PATH_IMAGE011
Figure 855342DEST_PATH_IMAGE019
Figure 319450DEST_PATH_IMAGE013
Figure 246954DEST_PATH_IMAGE005
Figure 779359DEST_PATH_IMAGE006
Figure 91392DEST_PATH_IMAGE015
Figure 889715DEST_PATH_IMAGE007
Figure 261790DEST_PATH_IMAGE016
Figure 893367DEST_PATH_IMAGE008
Figure 9090DEST_PATH_IMAGE017
Figure 848870DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 372704DEST_PATH_IMAGE010
Figure 42850DEST_PATH_IMAGE019
Figure 799454DEST_PATH_IMAGE011
Figure 306451DEST_PATH_IMAGE012
Figure 763977DEST_PATH_IMAGE020
Figure 125820DEST_PATH_IMAGE013
Figure 356261DEST_PATH_IMAGE014
Figure 833827DEST_PATH_IMAGE015
Figure 155087DEST_PATH_IMAGE007
Figure 719536DEST_PATH_IMAGE016
Figure 518864DEST_PATH_IMAGE008
Figure 855299DEST_PATH_IMAGE017
Figure 347460DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 739575DEST_PATH_IMAGE010
Figure 196096DEST_PATH_IMAGE003
Figure 531262DEST_PATH_IMAGE011
Figure 322501DEST_PATH_IMAGE020
Figure 234872DEST_PATH_IMAGE012
Figure 795166DEST_PATH_IMAGE004
Figure 114283DEST_PATH_IMAGE013
Figure 88373DEST_PATH_IMAGE014
Figure 445722DEST_PATH_IMAGE015
Figure 696706DEST_PATH_IMAGE007
Figure 462329DEST_PATH_IMAGE008
Figure 372516DEST_PATH_IMAGE017
Figure 110796DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 335104DEST_PATH_IMAGE002
Figure 821897DEST_PATH_IMAGE003
Figure 296741DEST_PATH_IMAGE011
Figure 872210DEST_PATH_IMAGE004
Figure 116109DEST_PATH_IMAGE012
Figure 571361DEST_PATH_IMAGE021
Figure 758870DEST_PATH_IMAGE014
Figure 447340DEST_PATH_IMAGE022
Figure 647508DEST_PATH_IMAGE015
Figure 814048DEST_PATH_IMAGE007
Figure 580326DEST_PATH_IMAGE008
Figure 251479DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 308089DEST_PATH_IMAGE002
Figure 247544DEST_PATH_IMAGE003
Figure 693568DEST_PATH_IMAGE011
Figure 637385DEST_PATH_IMAGE004
Figure 838559DEST_PATH_IMAGE012
Figure 235036DEST_PATH_IMAGE005
Figure 547069DEST_PATH_IMAGE013
Figure 342462DEST_PATH_IMAGE022
Figure 652221DEST_PATH_IMAGE014
Figure 785262DEST_PATH_IMAGE006
Figure 651718DEST_PATH_IMAGE015
Figure 675519DEST_PATH_IMAGE023
Figure 156179DEST_PATH_IMAGE016
Figure 181084DEST_PATH_IMAGE017
Figure 688420DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 402298DEST_PATH_IMAGE002
Figure 260663DEST_PATH_IMAGE010
Figure 718189DEST_PATH_IMAGE003
Figure 266982DEST_PATH_IMAGE011
Figure 165144DEST_PATH_IMAGE004
Figure 494494DEST_PATH_IMAGE012
Figure 240864DEST_PATH_IMAGE005
Figure 972060DEST_PATH_IMAGE013
Figure 595119DEST_PATH_IMAGE014
Figure 410760DEST_PATH_IMAGE023
Figure 934145DEST_PATH_IMAGE015
Figure 235910DEST_PATH_IMAGE016
Figure 692933DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 969324DEST_PATH_IMAGE002
Figure 313718DEST_PATH_IMAGE010
Figure 874012DEST_PATH_IMAGE003
Figure 193129DEST_PATH_IMAGE011
Figure 471664DEST_PATH_IMAGE004
Figure 164289DEST_PATH_IMAGE012
Figure 579090DEST_PATH_IMAGE005
Figure 69108DEST_PATH_IMAGE013
Figure 507043DEST_PATH_IMAGE006
Figure 255556DEST_PATH_IMAGE014
Figure 224070DEST_PATH_IMAGE016
Figure 364195DEST_PATH_IMAGE008
Figure 710863DEST_PATH_IMAGE017
Figure 670860DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 942758DEST_PATH_IMAGE010
Figure 208130DEST_PATH_IMAGE003
Figure 170270DEST_PATH_IMAGE011
Figure 549429DEST_PATH_IMAGE004
Figure 647835DEST_PATH_IMAGE012
Figure 208578DEST_PATH_IMAGE013
Figure 640696DEST_PATH_IMAGE006
Figure 609920DEST_PATH_IMAGE014
Figure 469292DEST_PATH_IMAGE007
Figure 888248DEST_PATH_IMAGE015
Figure 858478DEST_PATH_IMAGE008
Figure 682208DEST_PATH_IMAGE016
Figure 712481DEST_PATH_IMAGE025
Figure 621662DEST_PATH_IMAGE017
Figure 395583DEST_PATH_IMAGE009
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 478257DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 858423DEST_PATH_IMAGE028
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 183837DEST_PATH_IMAGE001
Carry out binary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the Multi-parameter binary variable being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 201310022326X100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 201310022326X100001DEST_PATH_IMAGE003
Figure 201310022326X100001DEST_PATH_IMAGE004
Figure 201310022326X100001DEST_PATH_IMAGE005
Figure 201310022326X100001DEST_PATH_IMAGE006
Figure 201310022326X100001DEST_PATH_IMAGE007
Figure 201310022326X100001DEST_PATH_IMAGE008
With
Figure 201310022326X100001DEST_PATH_IMAGE009
, encryption parameter
Figure 549853DEST_PATH_IMAGE002
Figure 168048DEST_PATH_IMAGE003
Figure 283771DEST_PATH_IMAGE004
Figure 936601DEST_PATH_IMAGE005
Figure 479577DEST_PATH_IMAGE006
Figure 439236DEST_PATH_IMAGE008
With
Figure 461418DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 201310022326X100001DEST_PATH_IMAGE010
Figure 201310022326X100001DEST_PATH_IMAGE011
Figure 201310022326X100001DEST_PATH_IMAGE012
Figure 201310022326X100001DEST_PATH_IMAGE013
Figure 201310022326X100001DEST_PATH_IMAGE014
Figure 201310022326X100001DEST_PATH_IMAGE015
Figure 201310022326X100001DEST_PATH_IMAGE016
Figure 201310022326X100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 611515DEST_PATH_IMAGE010
Figure 204301DEST_PATH_IMAGE011
Figure 661827DEST_PATH_IMAGE012
Figure 289249DEST_PATH_IMAGE013
Figure 174028DEST_PATH_IMAGE014
Figure 254111DEST_PATH_IMAGE015
Figure 515328DEST_PATH_IMAGE016
Figure 994326DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 50007DEST_PATH_IMAGE010
Figure 682294DEST_PATH_IMAGE012
Figure 486936DEST_PATH_IMAGE015
Figure 840688DEST_PATH_IMAGE016
Figure 280896DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 691762DEST_PATH_IMAGE010
Figure 217421DEST_PATH_IMAGE011
Figure 374864DEST_PATH_IMAGE012
Figure 607262DEST_PATH_IMAGE013
Figure 441226DEST_PATH_IMAGE014
Figure 204914DEST_PATH_IMAGE015
Figure 149736DEST_PATH_IMAGE016
Figure 315269DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 568188DEST_PATH_IMAGE011
Figure 254385DEST_PATH_IMAGE012
Figure 450191DEST_PATH_IMAGE014
Figure 437738DEST_PATH_IMAGE015
Figure 475096DEST_PATH_IMAGE016
Figure 864489DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 883260DEST_PATH_IMAGE010
Figure 108836DEST_PATH_IMAGE011
Figure 199152DEST_PATH_IMAGE012
Figure 214292DEST_PATH_IMAGE013
Figure 731861DEST_PATH_IMAGE014
Figure 179154DEST_PATH_IMAGE015
Figure 807581DEST_PATH_IMAGE016
Figure 109250DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 548452DEST_PATH_IMAGE010
Figure 732309DEST_PATH_IMAGE011
Figure 915160DEST_PATH_IMAGE012
Figure 133652DEST_PATH_IMAGE013
Figure 740826DEST_PATH_IMAGE014
Figure 411979DEST_PATH_IMAGE015
Figure 132941DEST_PATH_IMAGE016
Figure 205939DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 986945DEST_PATH_IMAGE010
Figure 83077DEST_PATH_IMAGE011
Figure 856998DEST_PATH_IMAGE012
Figure 597552DEST_PATH_IMAGE013
Figure 546529DEST_PATH_IMAGE014
Figure 129957DEST_PATH_IMAGE015
Figure 707569DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 612388DEST_PATH_IMAGE010
Figure 496161DEST_PATH_IMAGE011
Figure 611885DEST_PATH_IMAGE012
Figure 264714DEST_PATH_IMAGE013
Figure 807691DEST_PATH_IMAGE014
Figure 175831DEST_PATH_IMAGE015
Figure 337002DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 201310022326X100001DEST_PATH_IMAGE018
Figure 316459DEST_PATH_IMAGE010
Figure 366772DEST_PATH_IMAGE011
Figure 201310022326X100001DEST_PATH_IMAGE019
Figure 56510DEST_PATH_IMAGE012
Figure 689093DEST_PATH_IMAGE004
Figure 18443DEST_PATH_IMAGE013
Figure 761588DEST_PATH_IMAGE014
Figure 568001DEST_PATH_IMAGE006
Figure 322330DEST_PATH_IMAGE015
Figure 121659DEST_PATH_IMAGE007
Figure 458094DEST_PATH_IMAGE016
Figure 386473DEST_PATH_IMAGE008
Figure 690415DEST_PATH_IMAGE017
Figure 775659DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 629662DEST_PATH_IMAGE010
Figure 420901DEST_PATH_IMAGE019
Figure 312764DEST_PATH_IMAGE011
Figure 644706DEST_PATH_IMAGE012
Figure 470710DEST_PATH_IMAGE013
Figure 225652DEST_PATH_IMAGE005
Figure 333734DEST_PATH_IMAGE006
Figure 833985DEST_PATH_IMAGE015
Figure 67652DEST_PATH_IMAGE007
Figure 602538DEST_PATH_IMAGE016
Figure 529037DEST_PATH_IMAGE008
Figure 516584DEST_PATH_IMAGE017
Figure 386950DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 510763DEST_PATH_IMAGE002
Figure 608163DEST_PATH_IMAGE010
Figure 83007DEST_PATH_IMAGE003
Figure 924055DEST_PATH_IMAGE011
Figure 357628DEST_PATH_IMAGE012
Figure 70500DEST_PATH_IMAGE004
Figure 698927DEST_PATH_IMAGE013
Figure 201310022326X100001DEST_PATH_IMAGE021
Figure 46656DEST_PATH_IMAGE006
Figure 496092DEST_PATH_IMAGE015
Figure 865893DEST_PATH_IMAGE007
Figure 428910DEST_PATH_IMAGE008
Figure 850795DEST_PATH_IMAGE017
Figure 86604DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 907405DEST_PATH_IMAGE002
Figure 937678DEST_PATH_IMAGE010
Figure 558463DEST_PATH_IMAGE011
Figure 485968DEST_PATH_IMAGE004
Figure 437875DEST_PATH_IMAGE012
Figure 83620DEST_PATH_IMAGE021
Figure 146385DEST_PATH_IMAGE013
Figure 193975DEST_PATH_IMAGE005
Figure 503734DEST_PATH_IMAGE014
Figure 201310022326X100001DEST_PATH_IMAGE022
Figure 446894DEST_PATH_IMAGE015
Figure 313350DEST_PATH_IMAGE007
Figure 215447DEST_PATH_IMAGE016
Figure 509157DEST_PATH_IMAGE008
Figure 863915DEST_PATH_IMAGE017
Figure 721012DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 228348DEST_PATH_IMAGE002
Figure 942226DEST_PATH_IMAGE010
Figure 797662DEST_PATH_IMAGE003
Figure 255188DEST_PATH_IMAGE011
Figure 408324DEST_PATH_IMAGE005
Figure 420273DEST_PATH_IMAGE013
Figure 954952DEST_PATH_IMAGE014
Figure 508610DEST_PATH_IMAGE015
Figure 201310022326X100001DEST_PATH_IMAGE023
Figure 907362DEST_PATH_IMAGE016
Figure 150256DEST_PATH_IMAGE008
Figure 188619DEST_PATH_IMAGE017
Figure 542371DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 248159DEST_PATH_IMAGE002
Figure 583325DEST_PATH_IMAGE010
Figure 122366DEST_PATH_IMAGE003
Figure 574524DEST_PATH_IMAGE004
Figure 142909DEST_PATH_IMAGE012
Figure 172176DEST_PATH_IMAGE005
Figure 116998DEST_PATH_IMAGE013
Figure 469482DEST_PATH_IMAGE006
Figure 725331DEST_PATH_IMAGE023
Figure 514392DEST_PATH_IMAGE007
Figure 162859DEST_PATH_IMAGE024
Figure 387167DEST_PATH_IMAGE017
Figure 527292DEST_PATH_IMAGE009
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 873960DEST_PATH_IMAGE002
Figure 99536DEST_PATH_IMAGE010
Figure 924273DEST_PATH_IMAGE003
Figure 915975DEST_PATH_IMAGE011
Figure 433544DEST_PATH_IMAGE004
Figure 333367DEST_PATH_IMAGE012
Figure 712527DEST_PATH_IMAGE005
Figure 810933DEST_PATH_IMAGE013
Figure 250136DEST_PATH_IMAGE006
Figure 699571DEST_PATH_IMAGE014
Figure 616843DEST_PATH_IMAGE007
Figure 835335DEST_PATH_IMAGE015
Figure 632389DEST_PATH_IMAGE024
Figure 287154DEST_PATH_IMAGE008
Figure 110885DEST_PATH_IMAGE017
Figure 141158DEST_PATH_IMAGE025
, binary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 50339DEST_PATH_IMAGE026
Figure 558681DEST_PATH_IMAGE010
Figure 703671DEST_PATH_IMAGE011
Figure 97219DEST_PATH_IMAGE004
Figure 409252DEST_PATH_IMAGE012
Figure 579650DEST_PATH_IMAGE013
Figure 579147DEST_PATH_IMAGE014
Figure 231976DEST_PATH_IMAGE007
Figure 774953DEST_PATH_IMAGE015
Figure 877514DEST_PATH_IMAGE008
Figure 796928DEST_PATH_IMAGE016
Figure 491215DEST_PATH_IMAGE025
Figure 955825DEST_PATH_IMAGE017
Figure 63459DEST_PATH_IMAGE009
, set encryption parameter
Figure 407087DEST_PATH_IMAGE004
Figure 736437DEST_PATH_IMAGE005
Figure 482808DEST_PATH_IMAGE006
Figure 472946DEST_PATH_IMAGE008
With
Figure 771816DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 836724DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 173159DEST_PATH_IMAGE027
Carry out H1=
Figure 399741DEST_PATH_IMAGE028
Figure 454415DEST_PATH_IMAGE010
Figure 57435DEST_PATH_IMAGE002
Figure 435327DEST_PATH_IMAGE011
Figure 849122DEST_PATH_IMAGE029
Figure 374781DEST_PATH_IMAGE012
Figure 529294DEST_PATH_IMAGE004
Figure 89589DEST_PATH_IMAGE013
Figure 569746DEST_PATH_IMAGE006
Figure 735279DEST_PATH_IMAGE015
Figure 474565DEST_PATH_IMAGE007
Figure 725549DEST_PATH_IMAGE016
Figure 514609DEST_PATH_IMAGE017
Figure 690376DEST_PATH_IMAGE009
Binary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is rightCarry out H1=
Figure 715281DEST_PATH_IMAGE028
Figure 855406DEST_PATH_IMAGE010
Figure 202074DEST_PATH_IMAGE002
Figure 162071DEST_PATH_IMAGE011
Figure 252386DEST_PATH_IMAGE029
Figure 244089DEST_PATH_IMAGE012
Figure 761658DEST_PATH_IMAGE004
Figure 474530DEST_PATH_IMAGE013
Figure 102957DEST_PATH_IMAGE005
Figure 952096DEST_PATH_IMAGE014
Figure 640566DEST_PATH_IMAGE006
Figure 7273DEST_PATH_IMAGE007
Figure 973568DEST_PATH_IMAGE016
Figure 645989DEST_PATH_IMAGE008
Figure 254825DEST_PATH_IMAGE017
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary variable circulation cryptographic calculation, next binary variable circulation cryptographic calculation is pointed to H2=
Figure 79058DEST_PATH_IMAGE010
Figure 988240DEST_PATH_IMAGE030
Figure 762161DEST_PATH_IMAGE011
Figure 910486DEST_PATH_IMAGE013
Figure 488098DEST_PATH_IMAGE005
Figure 596179DEST_PATH_IMAGE006
Figure 463641DEST_PATH_IMAGE015
Figure 327167DEST_PATH_IMAGE007
Figure 229264DEST_PATH_IMAGE016
Figure 398340DEST_PATH_IMAGE008
Figure 18677DEST_PATH_IMAGE017
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is rightCarry out H2=
Figure 255547DEST_PATH_IMAGE002
Figure 907108DEST_PATH_IMAGE010
Figure 749162DEST_PATH_IMAGE030
Figure 957421DEST_PATH_IMAGE011
Figure 834110DEST_PATH_IMAGE003
Figure 469622DEST_PATH_IMAGE012
Figure 798972DEST_PATH_IMAGE031
Figure 997872DEST_PATH_IMAGE013
Figure 479800DEST_PATH_IMAGE005
Figure 535481DEST_PATH_IMAGE014
Figure 438955DEST_PATH_IMAGE007
Figure 416270DEST_PATH_IMAGE016
Figure 71034DEST_PATH_IMAGE017
Figure 324292DEST_PATH_IMAGE009
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while binary variable circulation cryptographic calculation, next binary variable circulation cryptographic calculation is pointed to H3=
Figure 987355DEST_PATH_IMAGE002
Figure 263747DEST_PATH_IMAGE010
Figure 670457DEST_PATH_IMAGE003
Figure 715905DEST_PATH_IMAGE011
Figure 201310022326X100001DEST_PATH_IMAGE033
Figure 445742DEST_PATH_IMAGE012
Figure 396381DEST_PATH_IMAGE004
Figure 91936DEST_PATH_IMAGE013
Figure 201310022326X100001DEST_PATH_IMAGE034
Figure 319786DEST_PATH_IMAGE014
Figure 324651DEST_PATH_IMAGE006
Figure 575635DEST_PATH_IMAGE015
Figure 324148DEST_PATH_IMAGE007
Figure 454708DEST_PATH_IMAGE008
Figure 442255DEST_PATH_IMAGE017
Figure 479612DEST_PATH_IMAGE009
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 869005DEST_PATH_IMAGE001
Carry out binary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022326.XA 2013-01-22 2013-01-22 Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark Expired - Fee Related CN103116788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022326.XA CN103116788B (en) 2013-01-22 2013-01-22 Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022326.XA CN103116788B (en) 2013-01-22 2013-01-22 Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark

Publications (2)

Publication Number Publication Date
CN103116788A true CN103116788A (en) 2013-05-22
CN103116788B CN103116788B (en) 2015-07-01

Family

ID=48415158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022326.XA Expired - Fee Related CN103116788B (en) 2013-01-22 2013-01-22 Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103116788B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter

Also Published As

Publication number Publication date
CN103116788B (en) 2015-07-01

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150701

Termination date: 20190122