A kind of anti-fake printing system that is applied to rolling temperature-sensitive series products
Technical field
The utility model relates to the anti-counterfeiting printing technology field, particularly a kind of anti-fake printing system that is applied to rolling temperature-sensitive series products.
Background technology
In the prior art, the two-dimension code internal information just can be distinguished two-dimension code as long as the fake producer has corresponding two-dimentional recognizing apparatus, thereby obtain the two-dimension code internal information not through encryption.Like this, two-dimension code just can't be used under some have the occasion of security requirements.In addition, the too fast printing ink of speed is not done and can be adhered to the print product back side when for example originally printing product such as lottery ticket, causes the dirty version of the space of a whole page, speed can cause heat-sensitive layer black thoroughly too slowly again, therefore cannot say for sure to demonstrate,prove the stability of product quality.Simultaneously because rolling anti-counterfeiting heat-sensitive series products is printed as the roll type printing, the sticking back of the body of printing ink phenomenon needs just can display after one month, production process is difficult to be detected, generally product will arrive the terminal use and just can find quality problems, social influence is bigger, so its quality has bigger uncertain factor.
Summary of the invention
The purpose of this utility model provides a kind of anti-fake printing system that is applied to rolling temperature-sensitive series products, and it can effectively improve antifalse effect.
For achieving the above object, the utility model by the following technical solutions: a kind of anti-fake printing system that is applied to rolling temperature-sensitive series products is characterized in that: comprise that two-dimension code is encrypted and two-dimension code deciphering two big modules; Described two-dimension code encrypting module is generated print module and is connected to form successively by data detection processing module, two-dimension code encryption processing module, two-dimension code; Described two-dimension code deciphering module data extraction module, two-dimension code decryption processing module connect to form successively.
Described two-dimension code generates the output of print module and the data input pin of high-end heat-sensitive coating high speed printer.
The utility model is a kind of anti-fake printing system that is applied to rolling temperature-sensitive series products, anti-fake product with its production has the advantages that to be forged and to substitute, the high speed printer of the also external high-end heat-sensitive coating of the utility model simultaneously, solved the dry problem of two-dimension code spray printing on high-end heat-sensitive coated paper, simple in structure, have certain market value.
Description of drawings
Fig. 1 is the utility model two-dimension code encrypting module schematic diagram.
Fig. 2 is the principle analysis diagram of Fig. 1 two-dimension code encrypting module.
Fig. 3 is the utility model two-dimension code deciphering module schematic diagram.
Fig. 4 is the principle analysis diagram of the two-dimension code deciphering module of Fig. 3.
The specific embodiment
Below in conjunction with drawings and Examples the utility model is described further.
As shown in figures 1 and 3, the utility model provides a kind of anti-fake printing system that is applied to rolling temperature-sensitive series products, it is characterized in that: comprise that two-dimension code is encrypted and two-dimension code deciphering two big modules; Described two-dimension code encrypting module is generated print module and is connected to form successively by data detection processing module, two-dimension code encryption processing module, two-dimension code; Described two-dimension code deciphering module data extraction module, two-dimension code decryption processing module connect to form successively.Whole encryption and decryption principle is: customer data is imported in the two-dimension code encryption system go, utilize two kinds of AESs of encryption system to generate the double-encryption data, and apply it in the two-dimension code initial data, generate random data, generate the two-dimension code of multi-enciphering at last, the verification true and false must just can read out the content of ciphering two-dimension sign indicating number by the two dimension code reading equipment that special use contains decode system.Whether consistent by the plaintext inspection content that obtains at last with the subscriber's computer system content, determine the true and false.This technology can prevent effectively that other people from utilizing existing two-dimensional code reading equipment that encrypted content is deciphered to obtain two-dimension code internal information, good confidentiality.
As shown in Figure 2, the two-dimension code encrypting module of native system is at first with two-dimension code initial data input encryption system to be encrypted; Then encryption system takes out a certain or several and carries out a re-encryption algorithm computing from this two-dimension code initial data, obtains one group of check code at random; And with this group stochastic kernel to piling up in the two-dimension code initial data, generate one group and contain the data of check code at random; Then the data of check code that contain at random that obtain are carried out double AES computing, generate the double-encryption data; The double-encryption data that utilization obtains generate the double-encryption two-dimension code; At last the double-encryption two-dimension code is transferred to digital printing system printing.
As shown in Figure 4: the two-dimension code deciphering module of native system at first utilizes the recognizing apparatus that contains decrypted program to read the double-encryption two-dimension code, obtains the double-encryption data; And the double-encryption data are carried out double decipherment algorithm computing, obtain containing the data of check code at random; As do not obtain containing the data of check code at random, promptly be accredited as vacation; Then carry out a heavy decipherment algorithm computing, the two-dimension code initial data that obtains deciphering to containing at random the data of check code; As the two-dimension code initial data that does not obtain deciphering, promptly be accredited as vacation; The two-dimension code initial data that obtains deciphering and the data in the computer are compared, and identical being is true.
In addition, in order better to improve the effect of anti-counterfeit printing, the output that described two-dimension code generates print module is connected with the data input pin of high-end heat-sensitive coating high speed printer.Described high-end heat-sensitive coated paper high speed printing device comprises that the high-end heat-sensitive coated paper printing fails pipeline production line, establishes the dry rotary drive mechanism of high-end heat-sensitive coated paper and high-end heat-sensitive coated paper heat dry equipment of oven dry and wind cold drying equipment on the production line between Printing Department and the rolling portion.Its advantage is: one solves two-dimension code prints dry problem at the temperature-sensitive face, and the 2nd, rational in infrastructure; The 3rd, gathered multiple typography, technology is an one, the technical parameter, synchronous operation and the apparent size that have solved multiple different process, equipment existence on even machine integrates with are difficult to technical barriers such as coordinate operation, have realized print product disposable finishing from the body paper to the finished product; The 4th, shortened the production time; The 5th, help producers' monitoring management, thereby improve the quality of products.
The above only is preferred embodiment of the present utility model, and all equalizations of being done according to the utility model claim change and modify, and all should belong to covering scope of the present utility model.