Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Binary anti-counterfeiting printing method based on three-dimensional encrypted anti-counterfeiting information

A binary and binary information technology, applied in image communication, record carrier used by machines, instruments, etc., can solve the problems of inability to fundamentally prevent counterfeit products, difficult and effective anti-counterfeiting, and confusion between true and false products.

Inactive Publication Date: 2016-02-17
BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]The existing more common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser hidden ink fluorescent ink printing technology to mark the product The anti-counterfeit label of the product is printed with the emblem or a special identification pattern, and the same kind of label is used for the same type of product, because the anti-counterfeit label is easier to forge, and the forged anti-counterfeit label is used on the counterfeit product, causing the product to be damaged. True and false are confused, so it is difficult to effectively prevent counterfeiting
The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or network access computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the coded data is uniformly generated by the computer and printed on the label
In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary anti-counterfeiting printing method based on three-dimensional encrypted anti-counterfeiting information
  • Binary anti-counterfeiting printing method based on three-dimensional encrypted anti-counterfeiting information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In the process of loading anti-counterfeiting information figure 1 Among them, the original anti-counterfeiting information (image, text) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded into a 16-bit binary information to generate a high 8 A 16-bit binary anti-counterfeiting information table whose bits are all 0, and the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is denoted as N i , i is a positive integer greater than 0, the eight-bit binary encryption parameter is denoted as C, the encryption parameter C is an integer of 0≦C Using +, -, ×, ÷ four, Using ×, -, +, ÷ four, Four types of ÷, -, ×, + are used, and when the operator control variable k=0 Defined as "+" operation, when the operator control variable k=1 Defined as "-" operation, when the operator control variable k=2 De...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a binary anti-counterfeit printing method based on three-dimensional encrypting anti-counterfeit information, which comprises the steps of generating a binary modulation signal through Ni@1kC@2kC#3kC encrypting calculation and channel coding of binary anti-counterfeit information; and embedding order change of anti-counterfeit information in shape of amplitude modulation websites in a circular look-up table manner. The anti-counterfeit information can be identified from any one fragment when printing materials are identified, so that the binary anti-counterfeit printing method based on the three-dimensional encrypting anti-counterfeit information can be widely applied to the anti-counterfeit field of printing materials.

Description

Technical field: [0001] The invention relates to an anti-counterfeiting printing technology, in particular to a binary anti-counterfeiting printing technology based on three-dimensional encrypted anti-counterfeiting information, which can be used for anti-counterfeiting of various printed products. Background technique: [0002] The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/06H04N1/405
Inventor 董武
Owner BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products