Binary anti-counterfeit printing method based on transposition order-change

A technique of binary and binary information, applied to record carriers, instruments, electrical components, etc. used by machines

Inactive Publication Date: 2013-02-27
BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]The existing more common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser hidden ink fluorescent ink printing technology to mark the product The anti-counterfeit label of the product is printed with the emblem or a special identification pattern, and the same kind of label is used for the same type of product, because the anti-counterfeit label is easier to forge, and the forged anti-counterfeit label is used on the counterfeit product, causing the product to be damaged. True and false are confused, so it is difficult to effectively prevent counterfeiting
The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or network access computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the coded data is uniformly generated by the computer and printed on the label
In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary anti-counterfeit printing method based on transposition order-change
  • Binary anti-counterfeit printing method based on transposition order-change

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In the process of loading anti-counterfeiting information figure 1 Among them, the original anti-counterfeiting information (image, text, trademark) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded into a 16-bit binary information to generate A 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, and the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is denoted as N i , i is a positive integer greater than 0, the binary control variable is denoted as k, the control variable k is a positive integer of 0≦k≦3, and the eight-digit binary encryption parameter is denoted as , the eight-bit binary encrypted parameter variable is denoted as , encryption parameter It is a positive integer from 0 to 256, the operator Four types of +, -, ×, ÷ are used, and when the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a binary anti-counterfeit printing method based on transposition order-change, which comprises the steps of generating a binary modulation signal through transposition order-change encrypting calculation and channel coding of binary anti-counterfeit information; and embedding order change of anti-counterfeit information in shape of amplitude modulation websites in a circular look-up table manner in a full page. The anti-counterfeit information can be identified from any one fragment when printing materials are identified, so that the binary anti-counterfeit printing method based on the three-dimensional encrypting anti-counterfeit information can be widely applied to the anti-counterfeit field of printing materials.

Description

Technical field: [0001] The invention relates to an anti-counterfeit printing technology, in particular to a binary anti-counterfeit printing technology with transposition and sequence encryption. The anti-counterfeiting printing technology can be used for anti-counterfeiting of various printed products. Background technique: [0002] The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/06H04N1/405
Inventor 刘志京
Owner BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products