CN103116793A - Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark - Google Patents

Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103116793A
CN103116793A CN2013100235905A CN201310023590A CN103116793A CN 103116793 A CN103116793 A CN 103116793A CN 2013100235905 A CN2013100235905 A CN 2013100235905A CN 201310023590 A CN201310023590 A CN 201310023590A CN 103116793 A CN103116793 A CN 103116793A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100235905A
Other languages
Chinese (zh)
Other versions
CN103116793B (en
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310023590.5A priority Critical patent/CN103116793B/en
Publication of CN103116793A publication Critical patent/CN103116793A/en
Application granted granted Critical
Publication of CN103116793B publication Critical patent/CN103116793B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark which enables binary anti-fake information to generate a binary modulating signal by means of binary circulation encryption and channel coding, and enables the anti-fake information to be embedded in the whole trademark page in a mode of ordered change of the conductivity of amplitude modulation outlets by means of a circulating look-up table modulation mode. By means of the multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark, the anti-fake information can be identified from any fragment when trademark identification is carried out, and multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multivariate multiparameter alternation binary cycle encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate multiparameter alternation binary cycle encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100235905100002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 2013100235905100002DEST_PATH_IMAGE002
,
Figure 2013100235905100002DEST_PATH_IMAGE003
,
Figure 2013100235905100002DEST_PATH_IMAGE004
,
Figure 2013100235905100002DEST_PATH_IMAGE005
,
Figure 2013100235905100002DEST_PATH_IMAGE006
,
Figure 2013100235905100002DEST_PATH_IMAGE007
,
Figure 2013100235905100002DEST_PATH_IMAGE008
With
Figure 2013100235905100002DEST_PATH_IMAGE009
, encryption parameter
Figure 595642DEST_PATH_IMAGE002
,
Figure 49757DEST_PATH_IMAGE003
,
Figure 952991DEST_PATH_IMAGE004
,
Figure 226977DEST_PATH_IMAGE005
,
Figure 873859DEST_PATH_IMAGE006
,
Figure 182481DEST_PATH_IMAGE007
,
Figure 256616DEST_PATH_IMAGE008
With
Figure 283478DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100235905100002DEST_PATH_IMAGE012
Figure 2013100235905100002DEST_PATH_IMAGE013
Figure 2013100235905100002DEST_PATH_IMAGE014
Figure 2013100235905100002DEST_PATH_IMAGE015
Figure 2013100235905100002DEST_PATH_IMAGE016
Figure 2013100235905100002DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 186581DEST_PATH_IMAGE010
Figure 739922DEST_PATH_IMAGE011
Figure 691063DEST_PATH_IMAGE014
Figure 974277DEST_PATH_IMAGE015
Figure 390215DEST_PATH_IMAGE016
Figure 126090DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 918465DEST_PATH_IMAGE010
Figure 56185DEST_PATH_IMAGE011
Figure 643025DEST_PATH_IMAGE012
Figure 866195DEST_PATH_IMAGE013
Figure 462262DEST_PATH_IMAGE014
Figure 47964DEST_PATH_IMAGE015
Figure 681071DEST_PATH_IMAGE016
Figure 516172DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 497083DEST_PATH_IMAGE011
Figure 566670DEST_PATH_IMAGE012
Figure 623488DEST_PATH_IMAGE013
Figure 30198DEST_PATH_IMAGE014
Figure 96560DEST_PATH_IMAGE016
Figure 516040DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 992021DEST_PATH_IMAGE010
Figure 813347DEST_PATH_IMAGE011
Figure 349370DEST_PATH_IMAGE012
Figure 256146DEST_PATH_IMAGE013
Figure 211650DEST_PATH_IMAGE015
Figure 906122DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 531542DEST_PATH_IMAGE011
Figure 19155DEST_PATH_IMAGE012
Figure 25157DEST_PATH_IMAGE013
Figure 297056DEST_PATH_IMAGE015
Figure 221149DEST_PATH_IMAGE016
Figure 448868DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 77296DEST_PATH_IMAGE010
Figure 847806DEST_PATH_IMAGE011
Figure 67434DEST_PATH_IMAGE012
Figure 621093DEST_PATH_IMAGE014
Figure 246109DEST_PATH_IMAGE015
Figure 636639DEST_PATH_IMAGE016
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 215705DEST_PATH_IMAGE010
Figure 695228DEST_PATH_IMAGE011
Figure 256659DEST_PATH_IMAGE012
Figure 415108DEST_PATH_IMAGE013
Figure 595554DEST_PATH_IMAGE014
Figure 661916DEST_PATH_IMAGE016
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 822956DEST_PATH_IMAGE010
Figure 136125DEST_PATH_IMAGE011
Figure 914725DEST_PATH_IMAGE012
Figure 101173DEST_PATH_IMAGE014
Figure 3270DEST_PATH_IMAGE015
Figure 77405DEST_PATH_IMAGE016
Figure 104267DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the binary cycle cryptographic calculation is defined as H i=
Figure 2013100235905100002DEST_PATH_IMAGE018
Figure 2013100235905100002DEST_PATH_IMAGE019
Figure 25322DEST_PATH_IMAGE018
Figure 273900DEST_PATH_IMAGE012
Figure 731426DEST_PATH_IMAGE019
Figure 139274DEST_PATH_IMAGE013
Figure 291087DEST_PATH_IMAGE014
Figure 958828DEST_PATH_IMAGE019
Figure 221183DEST_PATH_IMAGE015
Figure 683388DEST_PATH_IMAGE019
Figure 31193DEST_PATH_IMAGE016
Figure 237046DEST_PATH_IMAGE019
Figure 353907DEST_PATH_IMAGE017
Figure 252592DEST_PATH_IMAGE019
, during binary operator control variables k=1, the binary cycle cryptographic calculation is defined as H i=
Figure 2013100235905100002DEST_PATH_IMAGE020
Figure 150010DEST_PATH_IMAGE010
?
Figure 487451DEST_PATH_IMAGE011
?
Figure 599763DEST_PATH_IMAGE020
Figure 528405DEST_PATH_IMAGE012
?
Figure 726168DEST_PATH_IMAGE021
Figure 398458DEST_PATH_IMAGE013
?
Figure 365277DEST_PATH_IMAGE020
Figure 730399DEST_PATH_IMAGE014
?
Figure 149879DEST_PATH_IMAGE020
Figure 106420DEST_PATH_IMAGE015
?
Figure 52379DEST_PATH_IMAGE020
Figure 463769DEST_PATH_IMAGE016
?
Figure 682130DEST_PATH_IMAGE020
Figure 571588DEST_PATH_IMAGE017
?
Figure 637633DEST_PATH_IMAGE020
, during binary operator control variables k=2, the binary cycle cryptographic calculation is defined as H i=
Figure 2013100235905100002DEST_PATH_IMAGE022
Figure 282241DEST_PATH_IMAGE010
Figure 800947DEST_PATH_IMAGE022
Figure 494097DEST_PATH_IMAGE011
Figure 617911DEST_PATH_IMAGE012
Figure 495737DEST_PATH_IMAGE022
Figure 377105DEST_PATH_IMAGE013
Figure 649003DEST_PATH_IMAGE014
Figure 432152DEST_PATH_IMAGE022
Figure 394291DEST_PATH_IMAGE015
Figure 429244DEST_PATH_IMAGE022
Figure 324387DEST_PATH_IMAGE016
Figure 153803DEST_PATH_IMAGE022
Figure 973040DEST_PATH_IMAGE022
, during binary operator control variables k=3, the binary cycle cryptographic calculation is defined as H i=
Figure 2013100235905100002DEST_PATH_IMAGE024
Figure 925953DEST_PATH_IMAGE010
Figure 316483DEST_PATH_IMAGE024
Figure 394160DEST_PATH_IMAGE011
Figure 234126DEST_PATH_IMAGE012
Figure 2013100235905100002DEST_PATH_IMAGE025
Figure 264399DEST_PATH_IMAGE013
Figure 603294DEST_PATH_IMAGE014
Figure 669656DEST_PATH_IMAGE015
Figure 846559DEST_PATH_IMAGE024
Figure 565116DEST_PATH_IMAGE016
Figure 143865DEST_PATH_IMAGE024
Figure 922465DEST_PATH_IMAGE017
Figure 586665DEST_PATH_IMAGE024
, during binary operator control variables k=4, the binary cycle cryptographic calculation is defined as H i=
Figure 2013100235905100002DEST_PATH_IMAGE026
Figure 171230DEST_PATH_IMAGE010
Figure 604485DEST_PATH_IMAGE026
Figure 553987DEST_PATH_IMAGE011
Figure 765842DEST_PATH_IMAGE012
Figure 53604DEST_PATH_IMAGE026
Figure 2013100235905100002DEST_PATH_IMAGE027
Figure 281640DEST_PATH_IMAGE014
Figure 270325DEST_PATH_IMAGE026
Figure 287960DEST_PATH_IMAGE015
Figure 450037DEST_PATH_IMAGE027
Figure 978287DEST_PATH_IMAGE026
Figure 506221DEST_PATH_IMAGE017
Figure 358639DEST_PATH_IMAGE026
, during binary operator control variables k=5, the binary cycle cryptographic calculation is defined as H i=
Figure 2013100235905100002DEST_PATH_IMAGE028
Figure 443455DEST_PATH_IMAGE028
Figure 560316DEST_PATH_IMAGE011
Figure 459002DEST_PATH_IMAGE028
Figure 631543DEST_PATH_IMAGE028
Figure 743856DEST_PATH_IMAGE013
Figure 672497DEST_PATH_IMAGE028
Figure 870261DEST_PATH_IMAGE014
Figure 2013100235905100002DEST_PATH_IMAGE029
Figure 356288DEST_PATH_IMAGE029
Figure 832269DEST_PATH_IMAGE017
Figure 653595DEST_PATH_IMAGE028
, during binary operator control variables k=6, the binary cycle cryptographic calculation is defined as H i=
Figure 658460DEST_PATH_IMAGE010
Figure 689870DEST_PATH_IMAGE030
Figure 579328DEST_PATH_IMAGE011
Figure 114215DEST_PATH_IMAGE030
Figure 555560DEST_PATH_IMAGE012
Figure 767416DEST_PATH_IMAGE013
Figure 563334DEST_PATH_IMAGE030
Figure 441160DEST_PATH_IMAGE014
Figure 322528DEST_PATH_IMAGE030
Figure 678423DEST_PATH_IMAGE015
Figure 2013100235905100002DEST_PATH_IMAGE031
Figure 391164DEST_PATH_IMAGE016
Figure 439892DEST_PATH_IMAGE030
Figure 808556DEST_PATH_IMAGE017
Figure 968142DEST_PATH_IMAGE031
, during binary operator control variables k=7, the binary cycle cryptographic calculation is defined as H i=
Figure 66548DEST_PATH_IMAGE010
Figure 2013100235905100002DEST_PATH_IMAGE033
Figure 755018DEST_PATH_IMAGE011
Figure 610979DEST_PATH_IMAGE033
Figure 777518DEST_PATH_IMAGE012
Figure 527168DEST_PATH_IMAGE033
Figure 793064DEST_PATH_IMAGE013
Figure 995376DEST_PATH_IMAGE033
Figure 637710DEST_PATH_IMAGE014
Figure 678664DEST_PATH_IMAGE015
Figure 368271DEST_PATH_IMAGE033
Figure 283138DEST_PATH_IMAGE016
Figure 831599DEST_PATH_IMAGE032
Figure 32773DEST_PATH_IMAGE017
Figure 85043DEST_PATH_IMAGE033
, set encryption parameter
Figure 928234DEST_PATH_IMAGE002
,
Figure 569299DEST_PATH_IMAGE003
,
Figure 472533DEST_PATH_IMAGE004
,
Figure 196120DEST_PATH_IMAGE005
,
Figure 843002DEST_PATH_IMAGE006
,
Figure 994367DEST_PATH_IMAGE007
,
Figure 943868DEST_PATH_IMAGE008
With
Figure 841503DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 167442DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100235905100002DEST_PATH_IMAGE034
Carry out H 1=
Figure 986363DEST_PATH_IMAGE010
Figure 57142DEST_PATH_IMAGE011
Figure 45826DEST_PATH_IMAGE035
Figure 63461DEST_PATH_IMAGE012
Figure 744978DEST_PATH_IMAGE019
Figure 480853DEST_PATH_IMAGE013
Figure 7649DEST_PATH_IMAGE019
Figure 145369DEST_PATH_IMAGE014
Figure 997788DEST_PATH_IMAGE019
Figure 548855DEST_PATH_IMAGE015
Figure 20287DEST_PATH_IMAGE019
Figure 137148DEST_PATH_IMAGE016
Figure 605355DEST_PATH_IMAGE017
Figure 614900DEST_PATH_IMAGE019
Binary cycle cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 586267DEST_PATH_IMAGE034
Carry out H 1=
Figure 655854DEST_PATH_IMAGE035
Figure 525907DEST_PATH_IMAGE019
Figure 617360DEST_PATH_IMAGE011
Figure 401962DEST_PATH_IMAGE012
Figure 753309DEST_PATH_IMAGE019
Figure 699268DEST_PATH_IMAGE013
Figure 845079DEST_PATH_IMAGE019
Figure 876489DEST_PATH_IMAGE014
Figure 31526DEST_PATH_IMAGE019
Figure 831992DEST_PATH_IMAGE015
Figure 339514DEST_PATH_IMAGE016
Figure 626139DEST_PATH_IMAGE019
Figure 299883DEST_PATH_IMAGE019
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cycle cryptographic calculation, make next binary cycle cryptographic calculation point to H 2=
Figure 312204DEST_PATH_IMAGE011
Figure 236297DEST_PATH_IMAGE020
Figure 729596DEST_PATH_IMAGE012
Figure 764548DEST_PATH_IMAGE036
Figure 394112DEST_PATH_IMAGE013
Figure 489107DEST_PATH_IMAGE020
Figure 204122DEST_PATH_IMAGE014
Figure 42765DEST_PATH_IMAGE020
Figure 792416DEST_PATH_IMAGE015
Figure 58312DEST_PATH_IMAGE020
Figure 260623DEST_PATH_IMAGE016
Figure 637378DEST_PATH_IMAGE020
Figure 253253DEST_PATH_IMAGE017
Figure 690051DEST_PATH_IMAGE020
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 2013100235905100002DEST_PATH_IMAGE037
Carry out H 2=
Figure 441975DEST_PATH_IMAGE020
Figure 622421DEST_PATH_IMAGE010
Figure 954362DEST_PATH_IMAGE011
Figure 865686DEST_PATH_IMAGE020
Figure 849823DEST_PATH_IMAGE012
Figure 428571DEST_PATH_IMAGE036
Figure 207172DEST_PATH_IMAGE013
Figure 605792DEST_PATH_IMAGE020
Figure 128040DEST_PATH_IMAGE014
Figure 561295DEST_PATH_IMAGE020
Figure 510797DEST_PATH_IMAGE015
Figure 662293DEST_PATH_IMAGE020
Figure 722652DEST_PATH_IMAGE016
Figure 275994DEST_PATH_IMAGE020
Figure 769609DEST_PATH_IMAGE020
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cycle cryptographic calculation, make next binary cycle cryptographic calculation point to H 3=
Figure 41507DEST_PATH_IMAGE010
Figure 332811DEST_PATH_IMAGE022
Figure 2013100235905100002DEST_PATH_IMAGE038
Figure 454537DEST_PATH_IMAGE012
Figure 592257DEST_PATH_IMAGE022
Figure 179096DEST_PATH_IMAGE013
Figure 402267DEST_PATH_IMAGE038
Figure 998334DEST_PATH_IMAGE014
Figure 990560DEST_PATH_IMAGE022
Figure 748301DEST_PATH_IMAGE015
Figure 458768DEST_PATH_IMAGE022
Figure 970838DEST_PATH_IMAGE022
Figure 40425DEST_PATH_IMAGE017
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this binary cycle cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 910478DEST_PATH_IMAGE001
carry out the binary cycle cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to the binary cycle cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter
Figure 736351DEST_PATH_IMAGE002
,
Figure 976840DEST_PATH_IMAGE003
,
Figure 520954DEST_PATH_IMAGE004
,
Figure 872301DEST_PATH_IMAGE005
,
Figure 818260DEST_PATH_IMAGE006
,
Figure 229650DEST_PATH_IMAGE007
,
Figure 261060DEST_PATH_IMAGE008
With
Figure 416097DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value when initial value of setting encryption variables j, d, e, f, g, h, r, p and q is encryption, the initial value design of binary operator control variables k is k=0, known by the binary cycle ciphering process, and during binary operator control variables k=0, decrypt operation is M i=
Figure 216563DEST_PATH_IMAGE018
Figure 798854DEST_PATH_IMAGE010
Figure 317560DEST_PATH_IMAGE019
Figure 10710DEST_PATH_IMAGE011
Figure 418874DEST_PATH_IMAGE012
Figure 424877DEST_PATH_IMAGE019
Figure 921717DEST_PATH_IMAGE013
Figure 696775DEST_PATH_IMAGE019
Figure 620869DEST_PATH_IMAGE014
Figure 848588DEST_PATH_IMAGE019
Figure 873678DEST_PATH_IMAGE016
Figure 588693DEST_PATH_IMAGE019
Figure 427336DEST_PATH_IMAGE017
Figure 176987DEST_PATH_IMAGE019
, during binary operator control variables k=1, decrypt operation is M i=
Figure 442883DEST_PATH_IMAGE020
Figure 656913DEST_PATH_IMAGE010
?
Figure 33668DEST_PATH_IMAGE021
Figure 637824DEST_PATH_IMAGE011
?
Figure 323889DEST_PATH_IMAGE020
Figure 13497DEST_PATH_IMAGE012
?
Figure 193942DEST_PATH_IMAGE021
Figure 652605DEST_PATH_IMAGE013
?
Figure 260304DEST_PATH_IMAGE020
Figure 437208DEST_PATH_IMAGE014
?
Figure 421344DEST_PATH_IMAGE020
Figure 734514DEST_PATH_IMAGE015
?
Figure 513114DEST_PATH_IMAGE020
Figure 177314DEST_PATH_IMAGE016
?
Figure 699562DEST_PATH_IMAGE020
?
Figure 675794DEST_PATH_IMAGE020
, during binary operator control variables k=2, decrypt operation is M i=
Figure 702656DEST_PATH_IMAGE022
Figure 50778DEST_PATH_IMAGE022
Figure 561393DEST_PATH_IMAGE011
Figure 809972DEST_PATH_IMAGE023
Figure 798657DEST_PATH_IMAGE012
Figure 613029DEST_PATH_IMAGE022
Figure 432583DEST_PATH_IMAGE014
Figure 757254DEST_PATH_IMAGE022
Figure 567264DEST_PATH_IMAGE022
Figure 773118DEST_PATH_IMAGE016
Figure 358820DEST_PATH_IMAGE022
Figure 382140DEST_PATH_IMAGE017
Figure 92607DEST_PATH_IMAGE022
, during binary operator control variables k=3, decrypt operation is M i=
Figure 961205DEST_PATH_IMAGE024
Figure 666993DEST_PATH_IMAGE010
Figure 471001DEST_PATH_IMAGE024
Figure 793398DEST_PATH_IMAGE011
Figure 341054DEST_PATH_IMAGE024
Figure 432507DEST_PATH_IMAGE012
Figure 922263DEST_PATH_IMAGE025
Figure 466377DEST_PATH_IMAGE013
Figure 817724DEST_PATH_IMAGE024
Figure 763683DEST_PATH_IMAGE014
Figure 175073DEST_PATH_IMAGE025
Figure 218201DEST_PATH_IMAGE015
Figure 107660DEST_PATH_IMAGE024
Figure 173705DEST_PATH_IMAGE016
Figure 755996DEST_PATH_IMAGE024
Figure 274702DEST_PATH_IMAGE017
Figure 967852DEST_PATH_IMAGE024
, during binary operator control variables k=4, decrypt operation is M i=
Figure 622824DEST_PATH_IMAGE026
Figure 376016DEST_PATH_IMAGE010
Figure 382018DEST_PATH_IMAGE026
Figure 878859DEST_PATH_IMAGE011
Figure 653917DEST_PATH_IMAGE026
Figure 312431DEST_PATH_IMAGE012
Figure 805729DEST_PATH_IMAGE026
Figure 840682DEST_PATH_IMAGE013
Figure 735825DEST_PATH_IMAGE027
Figure 565241DEST_PATH_IMAGE014
Figure 545835DEST_PATH_IMAGE026
Figure 384478DEST_PATH_IMAGE015
Figure 868549DEST_PATH_IMAGE027
Figure 134446DEST_PATH_IMAGE016
Figure 979091DEST_PATH_IMAGE017
Figure 583247DEST_PATH_IMAGE026
, during binary operator control variables k=5, decrypt operation is M i=
Figure 20045DEST_PATH_IMAGE028
Figure 709652DEST_PATH_IMAGE010
Figure 421256DEST_PATH_IMAGE028
Figure 755286DEST_PATH_IMAGE011
Figure 487618DEST_PATH_IMAGE028
Figure 539888DEST_PATH_IMAGE012
Figure 383079DEST_PATH_IMAGE028
Figure 837194DEST_PATH_IMAGE013
Figure 740428DEST_PATH_IMAGE028
Figure 279994DEST_PATH_IMAGE014
Figure 926876DEST_PATH_IMAGE029
Figure 235497DEST_PATH_IMAGE015
Figure 309633DEST_PATH_IMAGE028
Figure 70915DEST_PATH_IMAGE016
Figure 521488DEST_PATH_IMAGE029
Figure 684616DEST_PATH_IMAGE017
Figure 929653DEST_PATH_IMAGE028
, during binary operator control variables k=6, decrypt operation is M i=
Figure 443811DEST_PATH_IMAGE030
Figure 432495DEST_PATH_IMAGE010
Figure 450130DEST_PATH_IMAGE030
Figure 131647DEST_PATH_IMAGE011
Figure 867522DEST_PATH_IMAGE030
Figure 532038DEST_PATH_IMAGE030
Figure 384457DEST_PATH_IMAGE013
Figure 607628DEST_PATH_IMAGE030
Figure 938115DEST_PATH_IMAGE014
Figure 930342DEST_PATH_IMAGE030
Figure 953661DEST_PATH_IMAGE015
Figure 645040DEST_PATH_IMAGE030
Figure 573681DEST_PATH_IMAGE017
Figure 771445DEST_PATH_IMAGE031
, during binary operator control variables k=7, decrypt operation is M i=
Figure 443734DEST_PATH_IMAGE032
Figure 410553DEST_PATH_IMAGE010
Figure 510096DEST_PATH_IMAGE033
Figure 671136DEST_PATH_IMAGE033
Figure 492462DEST_PATH_IMAGE012
Figure 28485DEST_PATH_IMAGE033
Figure 961073DEST_PATH_IMAGE033
Figure 902484DEST_PATH_IMAGE014
Figure 874988DEST_PATH_IMAGE033
Figure 393694DEST_PATH_IMAGE015
Figure 86843DEST_PATH_IMAGE033
Figure 7395DEST_PATH_IMAGE016
Figure 760587DEST_PATH_IMAGE032
Figure 766589DEST_PATH_IMAGE017
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 772909DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 697002DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 225253DEST_PATH_IMAGE001
carry out the binary cycle cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 854817DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the multivariate multiparameter alternation binary cycle encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 201033DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 181627DEST_PATH_IMAGE002
,
Figure 754691DEST_PATH_IMAGE003
, ,
Figure 770237DEST_PATH_IMAGE005
,
Figure 972549DEST_PATH_IMAGE006
,
Figure 614882DEST_PATH_IMAGE007
,
Figure 687881DEST_PATH_IMAGE008
With
Figure 249312DEST_PATH_IMAGE009
, encryption parameter
Figure 814286DEST_PATH_IMAGE002
,
Figure 853786DEST_PATH_IMAGE003
, ,
Figure 185727DEST_PATH_IMAGE005
,
Figure 237997DEST_PATH_IMAGE006
,
Figure 81188DEST_PATH_IMAGE007
, With
Figure 907378DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as respectively j, d, e, f, g, h, r, p and q, the binary system positive integer that encryption variables j, d, e, f, g, h, r, p and q are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 93826DEST_PATH_IMAGE011
Figure 527081DEST_PATH_IMAGE012
Figure 476583DEST_PATH_IMAGE013
Figure 362499DEST_PATH_IMAGE014
Figure 976200DEST_PATH_IMAGE016
Figure 96603DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 735395DEST_PATH_IMAGE010
Figure 192921DEST_PATH_IMAGE011
Figure 210555DEST_PATH_IMAGE012
Figure 627947DEST_PATH_IMAGE014
Figure 154744DEST_PATH_IMAGE015
Figure 292464DEST_PATH_IMAGE016
Figure 144882DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 102474DEST_PATH_IMAGE010
Figure 698540DEST_PATH_IMAGE011
Figure 295961DEST_PATH_IMAGE012
Figure 826486DEST_PATH_IMAGE014
Figure 276239DEST_PATH_IMAGE016
Figure 470460DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 402644DEST_PATH_IMAGE010
Figure 340513DEST_PATH_IMAGE011
Figure 307332DEST_PATH_IMAGE012
Figure 406875DEST_PATH_IMAGE013
Figure 91934DEST_PATH_IMAGE014
Figure 982715DEST_PATH_IMAGE016
Figure 128526DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 159936DEST_PATH_IMAGE010
Figure 314974DEST_PATH_IMAGE011
Figure 115439DEST_PATH_IMAGE012
Figure 697730DEST_PATH_IMAGE013
Figure 216436DEST_PATH_IMAGE014
Figure 909586DEST_PATH_IMAGE015
Figure 830137DEST_PATH_IMAGE016
Figure 176805DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 792594DEST_PATH_IMAGE010
Figure 414068DEST_PATH_IMAGE011
Figure 481885DEST_PATH_IMAGE014
Figure 641470DEST_PATH_IMAGE015
Figure 146401DEST_PATH_IMAGE016
Figure 834871DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 549887DEST_PATH_IMAGE010
Figure 388530DEST_PATH_IMAGE011
Figure 138180DEST_PATH_IMAGE012
Figure 404076DEST_PATH_IMAGE013
Figure 606387DEST_PATH_IMAGE014
Figure 576617DEST_PATH_IMAGE015
Figure 56140DEST_PATH_IMAGE016
Figure 617571DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 182545DEST_PATH_IMAGE010
Figure 487624DEST_PATH_IMAGE011
Figure 87233DEST_PATH_IMAGE012
Figure 606256DEST_PATH_IMAGE014
Figure 183868DEST_PATH_IMAGE015
Figure 762617DEST_PATH_IMAGE016
Figure 541217DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 939837DEST_PATH_IMAGE010
Figure 462085DEST_PATH_IMAGE011
Figure 996338DEST_PATH_IMAGE014
Figure 56698DEST_PATH_IMAGE015
Figure 78880DEST_PATH_IMAGE016
Figure 323917DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, the binary cycle cryptographic calculation is defined as H i=
Figure 572496DEST_PATH_IMAGE018
Figure 572899DEST_PATH_IMAGE010
Figure 272051DEST_PATH_IMAGE011
Figure 7926DEST_PATH_IMAGE018
Figure 800301DEST_PATH_IMAGE012
Figure 938021DEST_PATH_IMAGE019
Figure 524861DEST_PATH_IMAGE013
Figure 341507DEST_PATH_IMAGE019
Figure 812939DEST_PATH_IMAGE014
Figure 156382DEST_PATH_IMAGE015
Figure 866849DEST_PATH_IMAGE019
Figure 1027DEST_PATH_IMAGE016
Figure 847760DEST_PATH_IMAGE019
Figure 41981DEST_PATH_IMAGE017
Figure 974165DEST_PATH_IMAGE019
, during binary operator control variables k=1, the binary cycle cryptographic calculation is defined as H i=
Figure 318559DEST_PATH_IMAGE020
Figure 144432DEST_PATH_IMAGE010
?
Figure 384921DEST_PATH_IMAGE021
Figure 929035DEST_PATH_IMAGE011
?
Figure 280382DEST_PATH_IMAGE020
Figure 226341DEST_PATH_IMAGE012
?
Figure 637731DEST_PATH_IMAGE021
Figure 669141DEST_PATH_IMAGE013
?
Figure 824178DEST_PATH_IMAGE020
Figure 624644DEST_PATH_IMAGE014
?
Figure 206935DEST_PATH_IMAGE020
Figure 725641DEST_PATH_IMAGE015
?
Figure 418791DEST_PATH_IMAGE020
Figure 339342DEST_PATH_IMAGE016
?
Figure 826955DEST_PATH_IMAGE020
Figure 832958DEST_PATH_IMAGE017
?
Figure 329798DEST_PATH_IMAGE020
, during binary operator control variables k=2, the binary cycle cryptographic calculation is defined as H i=
Figure 104856DEST_PATH_IMAGE022
Figure 256669DEST_PATH_IMAGE022
Figure 291621DEST_PATH_IMAGE011
Figure 186764DEST_PATH_IMAGE023
Figure 281759DEST_PATH_IMAGE012
Figure 996774DEST_PATH_IMAGE022
Figure 835418DEST_PATH_IMAGE013
Figure 585068DEST_PATH_IMAGE023
Figure 53275DEST_PATH_IMAGE022
Figure 430030DEST_PATH_IMAGE015
Figure 34187DEST_PATH_IMAGE022
Figure 470984DEST_PATH_IMAGE016
Figure 160591DEST_PATH_IMAGE022
Figure 341037DEST_PATH_IMAGE017
Figure 206225DEST_PATH_IMAGE022
, during binary operator control variables k=3, the binary cycle cryptographic calculation is defined as H i=
Figure 938558DEST_PATH_IMAGE024
Figure 584302DEST_PATH_IMAGE010
Figure 99597DEST_PATH_IMAGE024
Figure 288133DEST_PATH_IMAGE011
Figure 730933DEST_PATH_IMAGE012
Figure 760572DEST_PATH_IMAGE024
Figure 787434DEST_PATH_IMAGE014
Figure 135555DEST_PATH_IMAGE015
Figure 646171DEST_PATH_IMAGE024
Figure 894750DEST_PATH_IMAGE016
Figure 895153DEST_PATH_IMAGE024
Figure 178367DEST_PATH_IMAGE017
Figure 594305DEST_PATH_IMAGE024
, during binary operator control variables k=4, the binary cycle cryptographic calculation is defined as H i=
Figure 227652DEST_PATH_IMAGE026
Figure 689858DEST_PATH_IMAGE011
Figure 37662DEST_PATH_IMAGE026
Figure 774674DEST_PATH_IMAGE012
Figure 766901DEST_PATH_IMAGE026
Figure 790221DEST_PATH_IMAGE013
Figure 500688DEST_PATH_IMAGE027
Figure 369287DEST_PATH_IMAGE014
Figure 481599DEST_PATH_IMAGE026
Figure 608004DEST_PATH_IMAGE027
Figure 280294DEST_PATH_IMAGE016
Figure 247113DEST_PATH_IMAGE026
Figure 612235DEST_PATH_IMAGE017
Figure 31715DEST_PATH_IMAGE026
, during binary operator control variables k=5, the binary cycle cryptographic calculation is defined as H i=
Figure 507696DEST_PATH_IMAGE028
Figure 329021DEST_PATH_IMAGE010
Figure 785913DEST_PATH_IMAGE028
Figure 727324DEST_PATH_IMAGE012
Figure 434249DEST_PATH_IMAGE028
Figure 828322DEST_PATH_IMAGE013
Figure 646105DEST_PATH_IMAGE028
Figure 176443DEST_PATH_IMAGE014
Figure 557112DEST_PATH_IMAGE028
Figure 207536DEST_PATH_IMAGE016
Figure 990684DEST_PATH_IMAGE029
Figure 359349DEST_PATH_IMAGE017
Figure 518935DEST_PATH_IMAGE028
, during binary operator control variables k=6, the binary cycle cryptographic calculation is defined as H i=
Figure 289445DEST_PATH_IMAGE030
Figure 243494DEST_PATH_IMAGE010
Figure 755247DEST_PATH_IMAGE030
Figure 593890DEST_PATH_IMAGE011
Figure 343857DEST_PATH_IMAGE012
Figure 546168DEST_PATH_IMAGE030
Figure 188502DEST_PATH_IMAGE013
Figure 792659DEST_PATH_IMAGE030
Figure 229457DEST_PATH_IMAGE014
Figure 919064DEST_PATH_IMAGE030
Figure 569891DEST_PATH_IMAGE031
Figure 177590DEST_PATH_IMAGE016
Figure 915346DEST_PATH_IMAGE030
Figure 633903DEST_PATH_IMAGE017
Figure 212652DEST_PATH_IMAGE031
, during binary operator control variables k=7, the binary cycle cryptographic calculation is defined as H i=
Figure 991252DEST_PATH_IMAGE032
Figure 655452DEST_PATH_IMAGE010
Figure 177700DEST_PATH_IMAGE033
Figure 610955DEST_PATH_IMAGE011
Figure 560457DEST_PATH_IMAGE033
Figure 446373DEST_PATH_IMAGE012
Figure 122391DEST_PATH_IMAGE013
Figure 242794DEST_PATH_IMAGE033
Figure 881585DEST_PATH_IMAGE014
Figure 745636DEST_PATH_IMAGE033
Figure 887905DEST_PATH_IMAGE015
Figure 444788DEST_PATH_IMAGE033
Figure 305296DEST_PATH_IMAGE016
Figure 973038DEST_PATH_IMAGE032
Figure 969813DEST_PATH_IMAGE017
Figure 697598DEST_PATH_IMAGE033
, set encryption parameter
Figure 45402DEST_PATH_IMAGE002
,
Figure 251256DEST_PATH_IMAGE003
,
Figure 368116DEST_PATH_IMAGE004
, , , ,
Figure 82814DEST_PATH_IMAGE008
With
Figure 604931DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 474984DEST_PATH_IMAGE034
Carry out H 1=
Figure 441803DEST_PATH_IMAGE035
Figure 802333DEST_PATH_IMAGE010
Figure 487392DEST_PATH_IMAGE019
Figure 963373DEST_PATH_IMAGE011
Figure 784698DEST_PATH_IMAGE035
Figure 320722DEST_PATH_IMAGE012
Figure 227498DEST_PATH_IMAGE019
Figure 241590DEST_PATH_IMAGE013
Figure 183001DEST_PATH_IMAGE019
Figure 624347DEST_PATH_IMAGE014
Figure 18419DEST_PATH_IMAGE019
Figure 509946DEST_PATH_IMAGE016
Figure 391315DEST_PATH_IMAGE019
Figure 747210DEST_PATH_IMAGE017
Figure 397634DEST_PATH_IMAGE019
Binary cycle cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 446361DEST_PATH_IMAGE034
Carry out H 1=
Figure 815026DEST_PATH_IMAGE035
Figure 974612DEST_PATH_IMAGE010
Figure 479542DEST_PATH_IMAGE019
Figure 699171DEST_PATH_IMAGE011
Figure 555132DEST_PATH_IMAGE035
Figure 252829DEST_PATH_IMAGE012
Figure 877846DEST_PATH_IMAGE019
Figure 674900DEST_PATH_IMAGE013
Figure 877212DEST_PATH_IMAGE019
Figure 519546DEST_PATH_IMAGE014
Figure 123702DEST_PATH_IMAGE019
Figure 560500DEST_PATH_IMAGE015
Figure 250107DEST_PATH_IMAGE019
Figure 164973DEST_PATH_IMAGE016
Figure 889216DEST_PATH_IMAGE019
Figure 496915DEST_PATH_IMAGE017
Figure 673818DEST_PATH_IMAGE019
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cycle cryptographic calculation, make next binary cycle cryptographic calculation point to H 2=
Figure 392375DEST_PATH_IMAGE020
Figure 971124DEST_PATH_IMAGE010
Figure 749725DEST_PATH_IMAGE036
Figure 413924DEST_PATH_IMAGE011
Figure 936172DEST_PATH_IMAGE020
Figure 369428DEST_PATH_IMAGE012
Figure 318929DEST_PATH_IMAGE036
Figure 204845DEST_PATH_IMAGE013
Figure 530785DEST_PATH_IMAGE020
Figure 818546DEST_PATH_IMAGE014
Figure 938949DEST_PATH_IMAGE020
Figure 577741DEST_PATH_IMAGE015
Figure 441792DEST_PATH_IMAGE020
Figure 1452DEST_PATH_IMAGE017
Figure 403615DEST_PATH_IMAGE020
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 665969DEST_PATH_IMAGE037
Carry out H 2=
Figure 393753DEST_PATH_IMAGE020
Figure 475979DEST_PATH_IMAGE010
Figure 947411DEST_PATH_IMAGE036
Figure 64272DEST_PATH_IMAGE011
Figure 697379DEST_PATH_IMAGE020
Figure 532479DEST_PATH_IMAGE012
Figure 542024DEST_PATH_IMAGE036
Figure 513391DEST_PATH_IMAGE013
Figure 639796DEST_PATH_IMAGE014
Figure 453031DEST_PATH_IMAGE020
Figure 556202DEST_PATH_IMAGE015
Figure 62270DEST_PATH_IMAGE020
Figure 340805DEST_PATH_IMAGE016
Figure 754468DEST_PATH_IMAGE020
Figure 846238DEST_PATH_IMAGE020
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of the binary cycle cryptographic calculation, make next binary cycle cryptographic calculation point to H 3=
Figure 877648DEST_PATH_IMAGE022
Figure 32686DEST_PATH_IMAGE010
Figure 833152DEST_PATH_IMAGE022
Figure 415443DEST_PATH_IMAGE011
Figure 934149DEST_PATH_IMAGE038
Figure 627298DEST_PATH_IMAGE012
Figure 547850DEST_PATH_IMAGE022
Figure 301042DEST_PATH_IMAGE013
Figure 41465DEST_PATH_IMAGE038
Figure 538306DEST_PATH_IMAGE014
Figure 313363DEST_PATH_IMAGE022
Figure 137280DEST_PATH_IMAGE022
Figure 296866DEST_PATH_IMAGE016
Figure 21425DEST_PATH_IMAGE017
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this binary cycle cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table carry out the binary cycle cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310023590.5A 2013-01-22 2013-01-22 Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark Expired - Fee Related CN103116793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310023590.5A CN103116793B (en) 2013-01-22 2013-01-22 Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310023590.5A CN103116793B (en) 2013-01-22 2013-01-22 Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103116793A true CN103116793A (en) 2013-05-22
CN103116793B CN103116793B (en) 2015-11-18

Family

ID=48415163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310023590.5A Expired - Fee Related CN103116793B (en) 2013-01-22 2013-01-22 Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103116793B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal

Also Published As

Publication number Publication date
CN103116793B (en) 2015-11-18

Similar Documents

Publication Publication Date Title
CN103116800A (en) Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark
CN103116793A (en) Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark
CN103116780A (en) Multivariable parameter gradient binary circulation encryption anti-fake information storage trademark
CN103116781A (en) Multivariable multi-parameter gradient ternary variable circulation encryption anti-fake information storage trademark
CN103116794A (en) Multi-parameter variable gradient binary variable circulation encryption anti-fake information storage trademark
CN103116799A (en) Multi-parameter multivariable multivariate circulation encryption anti-fake information storage trademark
CN103116785A (en) Multi-parameter multivariable unitary circulation encryption anti-fake information storage trademark
CN103116791A (en) Multi-parameter multivariate multivariable circulation encryption anti-fake information storage trademark
CN103116786A (en) Multi-parameter variable gradient binary encryption anti-fake information storage trademark
CN103106470A (en) Multivariate multi-parameter gradient binary variable circulating encryption anti-fake information storage trademark
CN103106492A (en) Parameter-gradient multivariable circulating-encryption anti-fake information storage trademark
CN103106472A (en) Multivariate multi-parameter gradient polynary circulating encryption anti-fake storage trademark
CN103116787A (en) Multi-parameter variable gradient unitary encryption anti-fake information storage trademark
CN103116784A (en) Multi-parameter univariable ternary circulation encryption anti-fake information storage trademark
CN103106511A (en) Multivariate multi-parameter gradient unitary circulating encryption anti-fake information storage trademark
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103106477A (en) Multi-parameter binary multivariant circulating encryption anti-fake information storage brand
CN103106431A (en) Multi-parametric-variable gradient binary circulating encryption anti-fake information storage trademark
CN103106520A (en) Multiparameter multivariable binary cycle encryption anti-fake information storage trademark
CN103106501A (en) Multiparameter transmutation multivariable multielement encryption anti-fake information storage trademark
CN103106454A (en) Multi-parametric-variable gradient polynary variable circulating encryption anti-fake information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103116783A (en) Parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106495A (en) Multi-parametric-variable gradient ternary circulating encryption anti-fake information storage trademark
CN103106480A (en) Multi-parameter ternary multivariant circulating encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151118

Termination date: 20190122

CF01 Termination of patent right due to non-payment of annual fee