Single-parameter first-order cyclic encryption binary anti-counterfeiting printing method

A binary and binary information technology, which is applied to record carriers used in machines, instruments, electrical components, etc., can solve the problems that counterfeit products cannot be fundamentally prevented, it is difficult to effectively prevent counterfeiting, and anti-counterfeiting labels are easy to forge.

Inactive Publication Date: 2016-04-20
BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]The existing more common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser hidden ink fluorescent ink printing technology to mark the product The anti-counterfeit label of the product is printed with the emblem or a special identification pattern, and the same kind of label is used for the same type of product, because the anti-counterfeit label is easier to forge, and the forged anti-counterfeit label is used on the counterfeit product, causing the product to be damaged. True and false are confused, so it is difficult to effectively prevent counterfeiting
The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they can enter the numbers on the logo into the computer database for comparison and identification through telephone or networked computers. The same is true, and the difference is false. The method is simple and easy to identify. , not easy to forge, but in actual use, because the coded data is generated by the computer and printed on the label
In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single-parameter first-order cyclic encryption binary anti-counterfeiting printing method
  • Single-parameter first-order cyclic encryption binary anti-counterfeiting printing method
  • Single-parameter first-order cyclic encryption binary anti-counterfeiting printing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In the process of loading anti-counterfeiting information figure 1 Among them, the original anti-counterfeiting information (image, text) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded into a 16-bit binary information to generate a high 8 A 16-bit binary anti-counterfeiting information table whose bits are all 0, and the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is denoted as N i , i is a positive integer greater than 0, the eight-bit binary encryption parameter is denoted as C, the encryption parameter C is a positive integer of 0≦C Using +, ×, -, ÷ four operators, operator control variable k = 0 They are respectively defined as "+", "×", "-", "÷" operations, when the operator control variable k=1 Respectively defined as, "-", "÷", "+", "×" operations, when the operator control vari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a single-parameter first-order encrypted binary anti-counterfeiting printing method which comprises the following steps: generating binary anti-counterfeiting information into a binary modulation signal through encryption algorithm and channel coding and embedding the anti-counterfeiting information into a whole page through the orderly change of the shape of an amplitude modulation dot in a circular table look-up method modulation manner. When printed matters are identified, the anti-counterfeiting information can be identified from any one fragment; and the single-parameter first-order encrypted binary anti-counterfeiting printing method can be widely applied to the field of anti-counterfeiting of printed matters.

Description

Technical field: [0001] The invention relates to an anti-counterfeiting printing technology, in particular to a single-parameter first-order cyclic encryption binary anti-counterfeiting printing technology, which can be used for anti-counterfeiting of various printed products. Background technique: [0002] The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each prod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/06H04N1/405
Inventor 张立君
Owner BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products