Double-encryption binary anti-counterfeiting printing method

A binary and binary information technology, which is applied to record carriers used in machines, instruments, electrical components, etc., can solve the problems that counterfeit products cannot be fundamentally prevented, it is difficult to effectively prevent counterfeiting, and anti-counterfeiting labels are easy to forge.

Active Publication Date: 2015-07-15
北京奇良海德印刷股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]The existing more common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser hidden ink fluorescent ink printing technology to mark the product The anti-counterfeit label of the product is printed with the emblem or a special identification pattern, and the same kind of label is used for the same type of product, because the anti-counterfeit label is easier to forge, and the forged anti-counterfeit label is used on the counterfeit product, causing the product to be damaged. True and false are confused, so it is difficult to effectively prevent counterfeiting
The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or network access computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the coded data is uniformly generated by the computer and printed on the label
In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-encryption binary anti-counterfeiting printing method
  • Double-encryption binary anti-counterfeiting printing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In the process of loading anti-counterfeiting information figure 1 Among them, the original anti-counterfeiting information (image, text, trademark) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded into a 16-bit binary information to generate A 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, and the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is denoted as N i , i is a positive integer greater than 0, the eight-digit binary encryption parameter is recorded as C, and the encryption parameter C is a positive integer of 0≦C≦256, the operator@ 1 k Use +, -, ×, ÷ four, @ 2 k Four types of ×, -, +, ÷ are used, and the two-digit binary operator control variable is recorded as k, and the operator control variable k is a positive integer of 0≦k≦3. When the operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a double-encryption binary anti-counterfeiting printing method which comprises the following steps: performing Ni@1kC@2kC encrypting operation and channel encoding to binary anti-counterfeiting information to generate a binary modulating signal, and adopting a modulation mode of a looped look-up table method to embed the anti-counterfeiting information into the whole page through sequential change in a shape of amplitude-modulated dot. Therefore, the anti-counterfeiting information can be recognized from any fragment during presswork recognition. The method can be widely applied to the anti-counterfeiting field of presswork.

Description

Technical field: [0001] The invention relates to an anti-counterfeiting printing technology, in particular to a double-encrypted binary anti-counterfeiting printing technology, which can be used for anti-counterfeiting of various printed products. Background technique: [0002] The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/06H04N1/405
Inventor 刘志京
Owner 北京奇良海德印刷股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products