



全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
更新日期:20121012-技术原理概要综述 Technical Principle Summary 立德高科自主研发的隐形防伪图像元及快速智能化机读识别技术被列为国家质检公益科研专项项目,拥有自主知识产权。它是一项将防伪信息通过印刷植入到纸、薄膜、金属等介质上,并使用专用防伪鉴别仪进行精确鉴别的高新防伪技术。 其核心原理是通过立德高科自主研发的隐形防伪图像元技术,在不破坏印刷效果和不增加印刷成本的前提下,在印刷品表面植入隐形防伪图像元,通过防伪鉴别仪自身的高解析光学识别模块,对隐形防伪图像元进行准确鉴别,并通过一系列运算解码,将编码对应的信息通过音频或视频呈现出来。 通过此技术,我们可以将数字信息通过编码方式处理成隐形防伪图像元,并与传统印刷方式无缝衔接,将加密信息编码的难破解性和传统印刷的批量处理性完美结合。核心技术 自主知识产权的隐形防伪图像元及快速智能化机读识别技术(简称“隐形防伪图像元”技术)Invisible Image Pixel Recognition Technology技术特点 用户自主加密、植入简单便捷、成本低廉、检验迅速可靠、无法复制应用领域 票据票券、证件证卡、包装材料、商品标识防伪理念 并非制造“绝对无法破解”的防伪产品,而是大大提高仿冒造假的门槛,让造假者需要投入巨大的资金成本、人力成本、时间成本、科技研发成本,同时大大增加溯源风险、失败风险从而望而却步。海量信息 隐形防伪图像元编码达到了以亿为单位的专有信息量,足以满足任一行业的用户最大需求;技术升级后,此数量则以亿亿为单位,是目前世界专有防伪图像元编码最多的技术,没有之一。九大加密 图像元编码加密:1亿亿特殊函数公式1万亿 软件加密:23台指定计算机 用户自主加密:用户自定义 应用加密:USB Key 指定计算机识别、15秒自锁 传输加密:加密文件包 接收加密:专用解密软件+只读文件 文件格式加密:非MP3、WAV等通用格式 ,只能在专属防伪鉴别仪解码 硬件加密:系统加密区+双IC配置、自毁程序 成品加密:隐形油墨、隐藏遮盖、伪码、更迭音频防伪 自主知识产权隐形防伪图像元技术为立德高科(北京)数码科技有限责任公司自主研发,并拥有自主知识产权的高新防伪技术,并同时拥有十几项发明专利。已通过国家质量技术监管部门检测评审,同时受到公安部、中国防伪技术协会、中国防伪行业协会、中国印钞造币总公司、中国集邮总公司等多个国家机关的认证和评定,获得一致好评。-Technical Principle SummaryThe Invisible Security Code and Machine Readable Identification Technology (ISC) which is autonomously developed by Leader Tech have been listed as the special project of AQSIQ public welfare scientific research and own proprietary intellectual property rights. It is an advanced anti-counterfeiting technology that implants anti-counterfeiting information into paper, thin film, metal, and some other medium by printing; the exclusive anti-counterfeiting identification device applies to accurate identification.The core principle is to apply ISC technology to implant the invisible security code into the surface of printing productions without damaging the printing effect and increasing printing cost. The invisible security code is accurately identified by the high resolution optics identification module in the anti-counterfeiting identification device and the code corresponding information will be presented in audio/video by a series of operation decryption.ISC code which is generated from digital information in a special coding method works seamlessly with the traditional printing method. It makes a perfect combination of difficult to cracking the encryption information coding and the batch processing for traditional printing.The Most Important Technologynvisible anti-counterfeiting security code and instant identification technology with complete independent intellectual property rights are referred as the invisible security code technology.Technology FeaturesUser-self Encryption, Convenient Implantation, Low Cost, Instant and Reliable Identification, Cannot CopyApplication FieldsBills and Tickets, Certificates and Cards, Packaging, Commodity LabelAnti-Counterfeiting ConceptWe do not make “absolutely unbreakable” anti-counterfeiting product but greatly enhance the difficulty to let counterfeiters to spend huge capital cost, human resource cost, time cost, and technology R&D cost. Meanwhile it will greatly increase risk of traceability and risk of failure to force counterfeiters stepping back.Massive InformationLeader Techs invisible security code reaches the exclusive amount of information with the unit of trillions. It is big enough to meet the maximum demand of any industry; this number could be up to the unit of 100 million after upgrade, it is the one and only technology which has the most exclusive security codes in the world. 9 Encryption Methods Security Code Encryption: 1 quadrillionspecial function1 trillion Software Encryption:23 specified computer installation User-Self Encryption:User defines the secondary encryption Application Encryption:USB Key designated computer identification, Self-Lock in 15 Seconds Transmission Encryption:cryptographic package Receiving Encryption:exclusive decryption software + read-only file File Format Encryption : Not MP3, RM, WMV, AVI and other general formats Hardware Encryption :system encryption area + double IC configuration,the self-destruct program Finished product encryption:invisible ink, hiding and cover, pseudo code, alternate broadcast Proprietary Intellectual Property RightsInvisible Security Code Technology (ISC) is an advanced anti-counterfeiting technology which is autonomously developed by Leader Tech (Beijing) Digital Technology Co.,Ltd.and owns proprietary intellectual property rights and a dozen patents for invention. It has passed the evaluation of national quality and technology supervision department meanwhile it obtains the authentication and commendation of Chinas Mini
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年天津师范大学辅导员-专业技术辅助岗位招聘29人方案笔试备考题库及完整答案详解1套
- 2024-2025学年度银行岗位试卷附参考答案详解(基础题)
- 2025年石油石化职业技能鉴定考试高频难、易错点题【必考】附答案详解
- 2024年法律硕士考前冲刺练习题含答案详解【培优B卷】
- 邮政行业职业技能鉴定试题附完整答案详解(各地真题)
- 2025年职称计算机预测复习附参考答案详解【达标题】
- 公务员(国考)经典例题及完整答案详解(考点梳理)
- 2025江西省樟树市中考物理考前冲刺练习试题及参考答案详解(新)
- 2025自考专业(金融)常考点试卷(完整版)附答案详解
- 广东茂名幼儿师范专科学校单招《职业适应性测试》通关题库附答案详解(基础题)
- 新22J01 工程做法图集
- 2024年社区警务规范考试题库
- 水产品安全控制
- 艺术涂料施工合同涂料施工合同共
- 养老服务公司经营范围(41个范本)
- 青少年脊柱侧弯筛查课件
- 北京十一学校2+4模式
- 第四章 解离平衡
- 小学生仪容仪表课件
- 初中语文中考复习 专题01 名著阅读之《朝花夕拾》(课内文言文+课外文言文)-2022年中考语文一轮复习黄金考点讲练测
- GB/T 38207-2019中国地理实体通名汉语拼音字母拼写规则
评论
0/150
提交评论