WO2018122597A1 - Procédé permettant de masquer des programmes d'instructions pour des machines à commande numérique pour une impression 3d - Google Patents
Procédé permettant de masquer des programmes d'instructions pour des machines à commande numérique pour une impression 3d Download PDFInfo
- Publication number
- WO2018122597A1 WO2018122597A1 PCT/IB2017/001592 IB2017001592W WO2018122597A1 WO 2018122597 A1 WO2018122597 A1 WO 2018122597A1 IB 2017001592 W IB2017001592 W IB 2017001592W WO 2018122597 A1 WO2018122597 A1 WO 2018122597A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- program
- printing
- instruction
- sequence
- instruction program
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Definitions
- the invention relates to a method for masking files containing instructions program for numerical control machines, in particular 3D printing machines.
- 3D Printing we are witnessing a massive diffusion of Web platforms dedicated to file sharing of 3D printing models.
- Designers upload their digital products (3D objects to be printed) on said platforms that act as a showcase for the general public. Once purchased/downloaded the digital asset, the user can print it out on his own 3D printer or by an external printing service.
- 3D printing services are an option for all of those companies/users that do not wish to invest in printing machines, but that want to use their products (3D printed objects), anyway.
- These services are often available online (web-to-print) and accessible by the user by marketplaces specialised in 3D models, that complement on the one hand the 3D file sharing platform, and on the other hand the remote printing service.
- the 3D object resulting from the design or from a 3D scan is represented by points in the 3D space and polygons that approximate the "real" surface of the actual physical object (but also imagined), sometimes indicated as mesh, sometimes represented in the STL file format.
- 3D print machines operate in an additive manner, printing layer after layer the object to be formed.
- the 3D printers require a series of instructions indicated as machine instructions detailing the mechanical operations (for example the movements of the heads) to be performed layer after layer.
- machine instructions for example the movements of the heads
- the designer loads its own 3D digital products on the marketplace that are purchased by a user that simultaneously provides the Marketplace the information relating to the printer or to the print service shop to which he intends to send data.
- the Marketplace then sends the file ready to be printed (in GCODE format) to the printer itself.
- the encrypted file in this case the format GCODE 3D file
- This solution is in fact based on a file encryption, so it is exposed to the risk of failure in the presence of the instruments, very sophisticated nowadays, to remove the encryption keys available to potential counterfeiters capable of intercepting and reproducing the encrypted files.
- An example of said solution is disclosed in US2015134955.
- the GCODE file is subdivided into blocks. Each individual block is decoded and sent to the printer and then overwritten by the next block.
- An example of said solution is disclosed in US20132354 2.
- these known solutions do not solve the problem to avoid that a subject capable of intercepting the files transfer between server and printer known as risk of the "man in the middle" could rebuild and acquire the complete file.
- Protection systems indicated as mark or "watermarking” are also generally known that are incorporated in the production process between the creation of the STL file and its transformation in the GCODE instruction file, adding to the instructions to realize the printed object, the instructions for the 3D printing of a physical mark not visible to the naked eye that can then be recognized by means of special devices, and reporting information on the producing printer.
- the mark will be accessible after 3D scanning of the object to be part of a system designed for the reading of the hidden mark.
- An example of said solutions is disclosed in US2015378353.
- EP2453430 is also known a system of 3D data protection that uses a technique of mixing or permutation of the coordinates of the 3D points of a file.
- the original 3D file (and not the corresponding instructions file) is uploaded in the network not in a clear form but precisely "mixed” and to be re-assembled only by those in possession of the appropriate keys for further processing the file.
- a second known solution that uses the mixing technique is EP2757736, however in this case the printing instructions are the ones being mixed, in a way such as to prevent their use by devices not provided with the reordering key.
- an authorized printing service deals with the reordering of the file that therefore results as complete and clear before being sent to the printer and then subject to attacks of the "man in the middle" type.
- the need for a more robust masking technique of the files that enhances the GCODE instruction files protection, transiting between the service server and the 3D printer still remains.
- a first object of the present invention is therefore the proposal of a security method capable to effectively protect the instruction files sent by remote to a printing agent, and therefore prevent the uncontrolled printing of said files.
- the term "printing agent” indicates a software program loaded on a dedicated hardware device supporting the printer, that has the task of mediate the communication between the printer and the online platform.
- a second object of the invention is to facilitate the use of online platforms (Marketplace) for the sale of printable 3D files.
- Marketplace online platforms
- a third object is to ensure the protection of the file during its entire life cycle from the time of its purchase to its physical embodiment preventing the access to the clear data for the "man-in-the-middle".
- a first advantage of the invention is that the content of the instruction file transmitted to the printing agent is effectively protected, exactly in the intermediate network portion between Marketplace and printing agent which constitutes the highest vulnerability point of a 3D printing service based on remote order. Whether the user owns a printing device or relies on a third party for the process, it will be necessary to send the file directly to the printing agent that will provide for the elaboration and embodiment, ensuring that the file to be protected is never circulating in clear form in the network.
- a second advantage consists in delivering the protected information without changing the format of the file already used in the current unprotected diffusion systems.
- a third advantage consists in enabling all of the 3D printers belonging to the circuit connected to the marketplace to print the files purchased by the user in a controlled manner by excluding the possibility to print the same object more times than those purchased or to sell the printable files to unauthorized third parties.
- Figure 1 schematically shows the operating steps of the processing procedure that the 3D object undergoes from the moment in which it is loaded onto the platform to the one when it is loaded on the 3D printer;
- FIG. 1a schematically depicts the scenario of application of the invention, from sale acceptance of a 3D file, the conversion of a digital STL file corresponding to the purchased object in the programming format "GCODE" that can occur in the sharing platform server, and the delivery through the Internet to the selected 3D printer;
- FIG. 2 schematically shows the configuration of a remote 3D printing service that performs the printing process of Figure 1 ;
- Figure 3 schematically shows a first step of the masking method of the invention
- Figure 4 schematically shows the configuration of a remote 3D printing service that performs the method of the invention
- Figure 4a schematically shows the projection of all the original gcode layers on the plane of projection
- Figure 4b shows the 2D image obtained with the projection of fig.4a
- Figure 5 shows an example of watermarking map created with the method of the invention
- Figure 6 shows an example of a projection grid of the image of Figure 4b, created on the basis of the map of fig.5;
- Figure 7a, 7b respectively depict, in a schematic way, the steps of encoding and decoding of the mark
- the method includes generating via a remote server 1 an original instruction software GC1 , for example of a GCODE file, composed of an ordered sequence (S1-Sn) of rows of printing instructions, that if performed by a 3D printing machine 3 determine the 3D print of a desired shape P, on a specific user request.
- an original instruction software GC1 for example of a GCODE file, composed of an ordered sequence (S1-Sn) of rows of printing instructions, that if performed by a 3D printing machine 3 determine the 3D print of a desired shape P, on a specific user request.
- the GCODE file is obtained starting from a 3D polygonal mesh type file, for example an STL file, and from the knowledge of the 3D printer type and model chosen for printing the file.
- the GCODE file expresses by machine language the movements sequence to communicate to the printer in order to produce a given object.
- the original GCODE GC1 is subjected remotely to a watermarking process.
- the procedure is to bring on a same plane XY (for example with the coordinate z equal to zero) all the coordinates of the GCODE file (fig.4a) obtaining a 2D projection (image) (fig.4b) on which it is inserted a mark, with a K key, obtaining a branded GCODE file of instructions GC1.
- XY for example with the coordinate z equal to zero
- the procedure is to bring on a same plane XY (for example with the coordinate z equal to zero) all the coordinates of the GCODE file (fig.4a) obtaining a 2D projection (image) (fig.4b) on which it is inserted a mark, with a K key, obtaining a branded GCODE file of instructions GC1.
- a possible mixing of the layers of the GCODE file does not alter the projection of the 2D image.
- a map of Wmap watermarking is generated (fig.5).
- This sequence is stored on a matrix with n rows and m columns.
- Each point of the projected GCODE falls in an item of the grid, the corresponding element of the watermarking matrix determines the value of the mark (d,) to be allocated to that point according to any one of the reading watermarking algorithms, if of a known type.
- the insertion/reading procedure of the mark is such that the mark itself will contain the key H to reorder the mixed coordinates before sending the file, and will then allow the printing agent to read the correct order of machine instructions.
- the second step consists in remotely subjecting the GCODE , preferably at the same server 1 , to a mixing processing: taking into account the specific structure of a GCODE, wherein for each level (coordinate Z) are listed movements on XY of the printhead, the process of mixing the blocks of instructions on XY between different levels using a mixing key H is conducted, thus obtaining a marked and mixed GCODE composed of a sequence of instructions rows altered with respect to the original sequence.
- the GC2 file marked and mixed is then sent, by means of a segment 5 accessible to third parties of a telecommunications network (WEB), to a local printing agent 2, i.e. to a hardware device supporting the printer in which a software program is loaded that has the task of mediating the communication between the printer and the online platform.
- WEB telecommunications network
- the file that is transferred and that in segment 5 is potentially "visible", even if it was illegally downloaded cannot be neither used nor recomposed, thus obtaining a particularly effective protection from counterfeiting the contents.
- the mark contains the key H for the correct reading of the sequence of the mixed printing lines, but only the local printing agent contains the key K for the reading of the mark (which is not transferred between Marketplace and printing agent).
- the printing agent can then read and send via an interface 4 to the printing machine 3 the correct sequence of instructions (S1-Sn) of the original instruction software GC1 to accomplish 3D printing of the desired shape P.
- the instructions can be read and processed without the need to ever trace the entire file in a clear form, avoiding the risk of "man in the middle" type.
- the method also provides for the repetition of the above disclosed procedure, with different keys, also for each copy of the same purchased 3D file, so as to ensure the protection for each copy, and so that it is not possible to print the same file multiple times without being authorized.
- An alternative implementation of the invention provides that the procedure is applied to an online file sharing that could be not mediated by services of "webstore”, so as to secure the 3D printing for a user that "draws" its object and requires printing services for the embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
Abstract
L'invention concerne un procédé permettant de masquer un programme d'instruction pour des machines d'impression 3D à commande numérique, comprenant les étapes consistant à générer, par le biais d'un ordinateur de serveur à distance, un programme d'instruction, à mélanger le programme d'instruction d'origine, à filigraner le programme d'instruction mélangé et à envoyer le programme d'instruction filigrané et mélangé à un agent d'impression local qui a une connexion pour envoyer la séquence d'instructions à une machine d'impression.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IT102016000132554A IT201600132554A1 (it) | 2016-12-30 | 2016-12-30 | Metodo di mascheramento di programmi di istruzioni per macchine a controllo numerico di stampa in 3d. |
IT102016000132554 | 2016-12-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018122597A1 true WO2018122597A1 (fr) | 2018-07-05 |
Family
ID=58737714
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2017/001592 WO2018122597A1 (fr) | 2016-12-30 | 2017-12-21 | Procédé permettant de masquer des programmes d'instructions pour des machines à commande numérique pour une impression 3d |
Country Status (2)
Country | Link |
---|---|
IT (1) | IT201600132554A1 (fr) |
WO (1) | WO2018122597A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1055321A1 (fr) * | 1998-02-10 | 2000-11-29 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Distribution securisee de representations numeriques |
EP2453430A1 (fr) * | 2010-11-15 | 2012-05-16 | Thomson Licensing | Procédé et dispositif de protection d'objet 3D par permutation des coordonnées de ses points |
CN103824248A (zh) * | 2014-02-28 | 2014-05-28 | 西安理工大学 | 基于Surfacelet域的3D网格模型水印方法 |
-
2016
- 2016-12-30 IT IT102016000132554A patent/IT201600132554A1/it unknown
-
2017
- 2017-12-21 WO PCT/IB2017/001592 patent/WO2018122597A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1055321A1 (fr) * | 1998-02-10 | 2000-11-29 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Distribution securisee de representations numeriques |
EP2453430A1 (fr) * | 2010-11-15 | 2012-05-16 | Thomson Licensing | Procédé et dispositif de protection d'objet 3D par permutation des coordonnées de ses points |
CN103824248A (zh) * | 2014-02-28 | 2014-05-28 | 西安理工大学 | 基于Surfacelet域的3D网格模型水印方法 |
Also Published As
Publication number | Publication date |
---|---|
IT201600132554A1 (it) | 2018-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10320567B2 (en) | Security scheme for authenticating object origins | |
EP3907634B1 (fr) | Protection du droit d'auteur basée sur des informations cachées sur le droit d'auteur | |
EP3673393B1 (fr) | Identification de matériel protégé par le droit d'auteur au moyen d'informations de droit d'auteur intégrées | |
US11106766B2 (en) | Identifying copyrighted material using copyright information embedded in electronic files | |
US9613327B2 (en) | Adapting an incremental information object | |
US10949936B2 (en) | Identifying copyrighted material using copyright information embedded in tables | |
US20120280029A1 (en) | Incremental information object with an embedded information region | |
US20050188205A1 (en) | Method and system for controlling encoded image production | |
US7386177B2 (en) | Method and system for encoding images using encoding parameters from multiple sources | |
EP3175385A1 (fr) | Transmission d'un repère d'authentification | |
US9477853B2 (en) | Generating an incremental information object | |
CN115713344A (zh) | 数字藏品的防伪、生成、管理方法、与实体藏品的关联方法及数字藏品和数字藏品系统 | |
WO2012144994A1 (fr) | Objet d'information incrémental d'échelle de gris | |
EP2661719B1 (fr) | Objet d'information incrémentale de double dissuasion | |
WO2018122597A1 (fr) | Procédé permettant de masquer des programmes d'instructions pour des machines à commande numérique pour une impression 3d | |
JP2023074506A (ja) | デジタル描画製作管理デバイス及びプロセス | |
CN114912085A (zh) | 基于随机水印分布加密文件、验证追溯方法及应用 | |
US8857711B2 (en) | Tracking customer loyalty information using an incremental information object | |
HK40045519A (en) | Identifying copyrighted material using copyright information embedded in electronic files | |
HK40030252A (en) | Identifying copyrighted material using copyright information embedded in tables | |
HK40044799A (en) | Identifying copyrighted material using embedded copyright information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17826545 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17826545 Country of ref document: EP Kind code of ref document: A1 |