CN104484584B - A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment - Google Patents
A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment Download PDFInfo
- Publication number
- CN104484584B CN104484584B CN201410695478.0A CN201410695478A CN104484584B CN 104484584 B CN104484584 B CN 104484584B CN 201410695478 A CN201410695478 A CN 201410695478A CN 104484584 B CN104484584 B CN 104484584B
- Authority
- CN
- China
- Prior art keywords
- printing
- model
- certificate
- printing equipment
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000007639 printing Methods 0.000 title claims abstract description 201
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000013475 authorization Methods 0.000 claims description 57
- 230000008569 process Effects 0.000 claims description 10
- 238000010146 3D printing Methods 0.000 claims description 7
- 238000011017 operating method Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 4
- 239000007787 solid Substances 0.000 description 4
- 238000005336 cracking Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T17/00—Three dimensional [3D] modelling, e.g. data description of 3D objects
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Graphics (AREA)
- Geometry (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment, including the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;Computer or server the generation model certificate of authority after encryption by the decruption key of the three-dimensional modeling data of the encryption and model authorized content;The microprocessor system of 3 D-printing equipment receives the model certificate of authority sent by the computer or server and the three-dimensional modeling data of the encryption;The microprocessor system of 3 D-printing equipment decrypts the model certificate of authority, obtains the decruption key and the model authorized content of the three-dimensional modeling data of the encryption;The microprocessor system of 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and prints threedimensional model according to the model authorized content.The rights and interests for making three-dimensional modeling data supplier using this method are effectively guaranteed, and the protection to three-dimensional modeling data has simply, reliably, completely.
Description
Technical field
The present invention relates to three-dimensional printing technology field, and in particular to a kind of threedimensional model copyright based on 3 D-printing equipment
The method of protection.
Background technology
With the development of three-dimensional printing technology, three-dimensional software designer only prints three in the 3 D-printing equipment of oneself
Tieing up article, oneself can not meet requirement.Now commonplace electronic bits of data access method can by network online access, but its by
It is limited to the security limitation of network transmission, is not easy to print three-dimensional article whenever and wherever possible.There are some 3 D-printing terminals now
Equipment, due to not applicable three-dimensional modeling data, can not be downloaded, its reason is that can not be for electricity directly from network again
The copyright of sub- data is effectively protected and managed.
Digital copyright management (Digital Rights Management, DRM) concept is occurred in that in this case.
Mainstream media's propagation and the application of security product being applied to current digital copyright management, it is impossible to meet single hardware terminal more
Demand of all kinds of three-dimensional modeling datas to protection and the management of copyright is downloaded and accessed to (such as 3 D-printing equipment).
Electronic bits of data supplier and copyright owner of today, do not have oneself effective copy-right protection method, with
Ensure that the electronic bits of data three-dimensional modeling data of oneself is stolen, therefore need a kind of system and method for digital copyright management badly.
Now with the development and popularization of three-dimensional printing technology, increasing three-dimensional modeling data (abbreviation threedimensional model)
It is transmitted and prints.For example, online mode is sold by way of downloading or charge opening for free.Wherein threedimensional model
The charge of data is sold mainly by protocol, lacks objective copyright protection regime so that three-dimensional modeling data is easy to non-
Method spreads, and designer or supplier to model data cause damage, and be unfavorable for setting up reliable business model can
Developer is allowed to obtain economic feedback, it is difficult to form benign development circulation.
The content of the invention
Present invention aims at overcoming defect of the prior art, there is provided a kind of copyright protection machine of three-dimensional modeling data
System, the mechanism allows the copyright of three-dimensional modeling data to be obtained during 3 D-printing is carried out by 3 D-printing equipment can
Lean on, complete protection, on this basis threedimensional model supplier can also be allowed to control the mandate of three-dimensional modeling data.
To achieve the above object, the technical solution adopted by the present invention is:A kind of three-dimensional based on 3 D-printing equipment is provided
The method of model copyright protection, the 3 D-printing equipment, which is included, can be encrypted and decrypted the microprocessor system of operation,
Following operating procedure is pressed in the guard method:
Step 1, the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;
Step 2, the computer or server award the decruption key and model of the three-dimensional modeling data of the encryption
Weigh content generation model certificate of authority after encryption;
Step 3, the microprocessor system of the 3 D-printing equipment receives the institute sent by the computer or server
State the three-dimensional modeling data of the model certificate of authority and the encryption;
Step 4, the microprocessor system of the 3 D-printing equipment decrypts the model certificate of authority, obtains described add
The decruption key of close three-dimensional modeling data and the model authorized content;
Step 5, the microprocessor system of the 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and root
Threedimensional model is printed according to the model authorized content.
It is preferred that technical scheme also have, carry out 3 D-printing as follows before the step 2 generation model certificate of authority
The identification of equipment, the 3 D-printing equipment is by continuing model licensing process with the generation model certificate of authority after identification, otherwise
Refusal is authorized:
Step 2.1, the computer or server of the three-dimensional modeling data provider is sent to the 3 D-printing equipment
3 D-printing device authorization is asked;
Step 2.2, the microprocessor system of the 3 D-printing equipment receives the 3 D-printing device authorization request;
Step 2.3, the microprocessor system of the 3 D-printing equipment is asked according to the 3 D-printing device authorization, will
3 D-printing device identification is encrypted or generates 3 D-printing device authorization after signing;
Step 2.4, the 3 D-printing device authorization by the three-dimensional modeling data provider computer or server
Receive;
Step 2.5, the computer or server of the three-dimensional modeling data provider is by the 3 D-printing device authorization
Decryption is verified, obtains the 3 D-printing device identification;
Step 2.6, the computer or server of the three-dimensional modeling data provider is according to the 3 D-printing equipment mark
The 3 D-printing equipment is identified for knowledge.
Further optimal technical scheme also has, and the 3 D-printing device authorization in the step 2.1 is asked by three
Third party's generation that printing device manufacturer or manufacturer authorize is tieed up, and is supplied to three-dimensional modeling data provider, institute is stored in
State in the computer or server of three-dimensional modeling data provider;The 3 D-printing device authorization request is one group of data, bag
The three-dimensional modeling data provider containing the third party's encryption authorized by the 3 D-printing equipment manufacturers or manufacturer
Encryption key;The 3 D-printing equipment is provided with the 3rd that the 3 D-printing equipment manufacturers or manufacturer authorize in advance
The decruption key of side, can decrypt adding for the three-dimensional modeling data provider from 3 D-printing device authorization request
Key;Ciphering process in the step 2.3 uses the encryption key of the three-dimensional modeling data provider.
Threedimensional model mandate causes 3 D-printing equipment to decrypt threedimensional model in printing, and according to threedimensional model provider
The content of mandate printed.But the side of cracking can pretend equipment, model mandate is gained, so as to decrypt threedimensional model, so by cheating
Do not operated afterwards by authorized content, it might even be possible to will be published after the model decryption of encryption.Then equipment is identified and (set
It is standby to authorize), that is to say, that it is not really camouflage that three-dimensional modeling data provider, which first has to determine that this 3 D-printing equipment is,
Then model mandate (model decruption key is included in model mandate) could be sent to it.But, the side of cracking can also disguise oneself as
Three-dimensional modeling data provider, sends device authorization request to real 3 D-printing equipment, gains real equipment mandate by cheating, then
Disguise oneself as 3 D-printing equipment again, the true mandate is transmitted into true three-dimension model data provider, so as to gain three-dimensional mould by cheating
The mandate of type data.Then there is further model provider to authorize, be actually " request of 3 D-printing device authorization "
This group of data.The data are that decruption key is by manufacturer by manufacturer (or third party of manufacturer's mandate) encryption generation
(or third party of manufacturer's mandate) is pre-installed in printing device, when using asymmetric encryption, even if equipment is cracked,
Cause decruption key to leak, can not also obtain encryption key, it is raw not become effective " request of 3 D-printing device authorization ", so that
Manufacturer can not be pretended to be, that is to say, that the encryption key of three-dimensional modeling data provider can not be sent to three-dimensional and beaten by the side of cracking
Printing apparatus, 3 D-printing equipment also can not just generate correct 3 D-printing device authorization so that three-dimensional modeling data provider
Model mandate can not be provided.
Model mandate and device authorization (identification) are substantially on-line automatic progress, easily camouflage and deception;Manufacturer pair
It is that party discusses face-to-face that model provider, which authorizes, it is not easy to camouflage and deception.
It is preferred that technical scheme also have, the 3 D-printing device authorization in the step 2.3 is beaten comprising the three-dimensional
The encryption key of printing apparatus;Computer or server the decryption institute of the three-dimensional modeling data provider in the step 2.5
The encryption key of the 3 D-printing equipment is obtained when stating 3 D-printing device authorization;The threedimensional model in the step 2
Ciphering process of the computer or server of data providing when generating the model certificate of authority uses the 3 D-printing
The encryption key of equipment.
It is preferred that technical scheme also have, the model authorized content include specified three-dimensional printing device, threedimensional model are beaten
The restriction data of printing amount, time-write interval or threedimensional model version.
It is preferred that technical scheme also have, the storage inside of the 3 D-printing equipment has 3 D-printing device certificate, described
The third party that 3 D-printing device certificate is authorized by the manufacturer of 3 D-printing equipment or manufacturer provides.
Further preferred technical scheme is that the 3 D-printing device certificate includes the mark of 3 D-printing device certificate
Know, the private key and public key of 3 D-printing device certificate, the mark of 3 D-printing equipment, the description and offer of 3 D-printing equipment
Third-party mark and public key that the manufacturer of 3 D-printing device certificate or manufacturer authorize.
Further preferred technical scheme is that the storage inside of the 3 D-printing equipment has the more than one three-dimensional
Printing device certificate, the 3 D-printing device certificate of first storage is main device certificate, and the main equipment certificate is by institute
The manufacturer for stating 3 D-printing equipment is provided, and other described 3 D-printing device certificate are slave certificate, and the subordinate is set
Standby certificate has to pass through the private key signature of the main equipment certificate, and the microprocessor system of the 3 D-printing equipment is successfully being tested
Demonstrate,prove just can arrive the 3 D-printing equipment after the signature of the main equipment certificate by slave certificate storage.That is
Third-party 3 D-printing device certificate will authorize (signature) could store and arrive the 3 D-printing equipment by manufacturer.
Further preferred technical scheme is that the 3 D-printing device certificate with identical content is stored in some
In the 3 D-printing equipment.
Advantages of the present invention and beneficial effect are to carry out copyright protection using 3 D-printing equipment printing threedimensional model
Method, the rights and interests of three-dimensional modeling data supplier can be made to be effectively guaranteed.Methods described is for threedimensional model simultaneously
The features such as protection of data has simple, reliable, complete, practical.
Brief description of the drawings
Fig. 1 prints the schematic diagram that threedimensional model carries out copy-right protection method with 3 D-printing equipment for the present invention.
Embodiment
As shown in figure 1, the present invention is a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment, described three
Dimension printing device is comprising that can be encrypted and decrypted the microprocessor system of operation, and the guard method is by following operation step
Suddenly:
Step 1, the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;
Step 2, the computer or server award the decruption key and model of the three-dimensional modeling data of the encryption
Weigh content generation model certificate of authority after encryption;
Step 3, the microprocessor system of the 3 D-printing equipment receives the institute sent by the computer or server
State the three-dimensional modeling data of the model certificate of authority and the encryption;
Step 4, the microprocessor system of the 3 D-printing equipment decrypts the model certificate of authority, obtains described add
The decruption key of close three-dimensional modeling data and the model authorized content;
Step 5, the microprocessor system of the 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and root
Threedimensional model is printed according to the model authorized content.
It is preferred that technical scheme also have, carry out 3 D-printing as follows before the step 2 generation model certificate of authority
The identification of equipment, the 3 D-printing equipment then continues model licensing process by identification with the generation model certificate of authority, otherwise
Refusal is authorized:
Step 2.1, the computer or server of the three-dimensional modeling data provider is sent to the 3 D-printing equipment
3 D-printing device authorization is asked;
Step 2.2, the microprocessor system of the 3 D-printing equipment receives the 3 D-printing device authorization request;
Step 2.3, the microprocessor system of the 3 D-printing equipment is asked according to the 3 D-printing device authorization, will
3 D-printing device identification is encrypted or generates 3 D-printing device authorization after signing;
Step 2.4, the 3 D-printing device authorization by the three-dimensional modeling data provider computer or server
Receive;
Step 2.5, the computer or server of the three-dimensional modeling data provider is by the 3 D-printing device authorization
Decryption is verified, obtains the 3 D-printing device identification;
Step 2.6, the computer or server of the three-dimensional modeling data provider is according to the 3 D-printing equipment mark
The 3 D-printing equipment is identified for knowledge.
Further optimal technical scheme also has, and the 3 D-printing device authorization in the step 2.1 is asked by three
Third party's generation that printing device manufacturer or manufacturer authorize is tieed up, and is supplied to three-dimensional modeling data provider, institute is stored in
State in the computer or server of three-dimensional modeling data provider;The 3 D-printing device authorization request is one group of data, bag
The three-dimensional modeling data provider containing the third party's encryption authorized by the 3 D-printing equipment manufacturers or manufacturer
Encryption key;The 3 D-printing equipment is provided with the 3rd that the 3 D-printing equipment manufacturers or manufacturer authorize in advance
The decruption key of side, can decrypt adding for the three-dimensional modeling data provider from 3 D-printing device authorization request
Key;Ciphering process in the step 2.3 uses the encryption key of the three-dimensional modeling data provider.
It is preferred that technical scheme also have, the 3 D-printing device authorization in the step 2.3 is beaten comprising the three-dimensional
The encryption key of printing apparatus;Computer or server the decryption institute of the three-dimensional modeling data provider in the step 2.5
The encryption key of the 3 D-printing equipment is obtained when stating 3 D-printing device authorization;The threedimensional model in the step 2
Ciphering process of the computer or server of data providing when generating the model certificate of authority uses the 3 D-printing
The encryption key of equipment.
It is preferred that technical scheme also have, the model authorized content include specified three-dimensional printing device, threedimensional model are beaten
The restriction data of printing amount, time-write interval or threedimensional model version.
It is preferred that technical scheme also have, the storage inside of the 3 D-printing equipment has 3 D-printing device certificate, described
The third party that 3 D-printing device certificate is authorized by the manufacturer of 3 D-printing equipment or manufacturer provides.
Further preferred technical scheme is that the 3 D-printing device certificate includes the mark of 3 D-printing device certificate
Know, the private key and public key of 3 D-printing device certificate, the mark of 3 D-printing equipment, the description and offer of 3 D-printing equipment
Third-party mark and public key that the manufacturer of 3 D-printing device certificate or manufacturer authorize.
Further preferred technical scheme also has, and the storage inside of the 3 D-printing equipment has more than one described three
Tie up printing device certificate, first storage the 3 D-printing device certificate be main device certificate, the main equipment certificate by
The manufacturer of the 3 D-printing equipment provides, and other described 3 D-printing device certificate are slave certificate, the subordinate
Device certificate has to pass through the private key signature of the main equipment certificate, and the microprocessor system of the 3 D-printing equipment is in success
Verify just can arrive the 3 D-printing equipment after the signature of the main equipment certificate by slave certificate storage.
It is preferred that technical scheme also have, the 3 D-printing device certificate with identical content is stored in described in some
In 3 D-printing equipment.
Embodiment
It is that the theory diagram that threedimensional model carries out the method for copyright protection is printed with 3 D-printing equipment shown in Fig. 1, uses
After methods described, 3 D-printing equipment (hereinafter referred to as equipment) realizes the mechanism to three-dimensional modeling data copyright protection.For just
Solid box in understanding, figure is data, and circle is processing procedure, provider and reciever of the thick dashed line frame for threedimensional model
The different field of (equipment side), fine dotted line frame represents the flow direction of option content, arrows show data or operation.
Three-dimensional modeling data copyright protection (hereinafter referred to as copyright protection) described here refers to only when the three-dimensional mould
The computer of data (hereinafter referred to as model) side of being provided of type or server mandate, and the mandate is effective by device authentication
The equipment just can be by the threedimensional model " printing " into 3D solid afterwards, it is ensured that three-dimensional modeling data will not be printed arbitrarily,
By the method for encryption three bit model data will not be leaked in itself simultaneously.
In computer or server, copyright protection is realized by multi-enciphering.Model is in computer or server
Storage and carried out in the way of encryption during being transferred to equipment, symmetric cryptography, such as AES encryption, after encryption can be used
Model can be transmitted by carriers such as network or USB flash disks, using after reliable AES, third party can not be not
The content of model is cracked out when obtaining decruption key, so model will not be stolen during transmission in itself.Model
The request and authorization data that provider and equipment room are exchanged are also that, by encryption, can also use asymmetrical AES, such as
RSA Algorithm.Unless stated otherwise, present patent application use AES and relational language, for example private key, public key,
Encryption, decryption, signature etc., are all known disclosed canonical algorithm and definition, and its details refers to books disclosed in correlation or money
Material, is not repeated herein.
Every equipment at least one device certificate.Device certificate is stored in device interior, and device certificate is not right in itself
Outer transmission, third party's (being generally called producer in figure) that device certificate is authorized by the manufacturer of equipment or manufacturer provides.Equipment
Certificate includes device certificate mark, the private key and public key of equipment, device identification, the mark of equipment description and device certificate supplier
Know and public key.Device identification is the unique numeral for representing equipment, further, and the device identification numeral has specific number
According to structure or verification, it can be used for judging the true and false of equipment;Manufacturer is the unique numeral for representing manufacturer.Equipment is retouched
Stating the type for providing equipment, print capacity (material, speed, size etc.), number of devices (allows the public card of one group of equipment
Book), the device-dependent detailed information such as license type (such as commercialization, individual, education, scientific research, charity organization).Device authorization will
The public information of equipment is supplied to the computer or server of model provider, and for generation model mandate, it is by device certificate
The equipment generation at place, the part that discloses comprising the device certificate, i.e. device certificate mark, the public key of equipment, equipment mark
Know, equipment is described.Device authorization is encrypted when generating by AES, and the encryption key needed for it is led to by computer or server
Cross device request and be supplied to equipment.
Device request is one group of data, the public affairs of the model provider comprising manufacturer and by manufacturer's private key encryption
Key, it is previously generated by manufacturer for the computer or server of model provider, and is stored in the computer of model provider
Or in server.The computer or server of model provider will propose to set when requiring that equipment provides device authorization to equipment
Standby request.As long as saved device request is transferred to equipment by the computer or server of model provider, it is not necessary to again
Do the encryption process.The device request sent by computer or server is carried the public key of model provider with a kind of reliable way
Supply arrangement, it is to avoid the hacker model provider that disguises oneself as gains the information of equipment by cheating.
Equipment is received after the device request that computer or server are sent, and is searched certainly according to the manufacturer of device request
The device certificate of body, and go out with manufacturer's public key decryptions of relevant device certificate the public key of model provider, and use the mould
The public key of type provider is encrypted for device authorization, is transferred to the computer or server of model provider.
The computer or server of model provider is received after device authorization, carries out equipment identification, the i.e. private key with itself
Decrypt the content of device authorization.Device identification and equipment description in the device authorization can be for keeping accounts or charging, example
Such as different device types, different number of devices has different model mandate expenses.The computer or clothes of model provider
Be engaged in device authorize model in use, by authorized solution to model key and authorized content the equipment in the device authorization
Public key is encrypted, and the device identification in the device authorization of additional unencryption, generation model mandate, and by computer or
Server transport is to equipment.Authorized content is model access right, and it limits how the model uses, for example, limit quantity and beat
Print, is printed between prescribing a time limit, limit three-dimensional modeling data version printing etc.;Other authorized content also specifies printing device, for example, it can be with
, can also be by way of implicitly specifying, as used by showing the mark for including 3 D-printing equipment in authorized content
The public key of 3 D-printing equipment is stated to encrypt generation model mandate.
Equipment receives the model mandate that computer or server are sent, according to the equipment of unencryption in the model mandate
Identifier lookup device certificate, extraction equipment private key, and decrypt the model decruption key in model mandate with the private key and award
Weigh content.The equipment authorized model of model decryption key decryption correspondence, and the right to use is being verified according to authorized content
The effectively rear three-dimensional article printing for carrying out model of limit.For example, authorized content includes model usage quantity information, the equipment record
The quantity of the model printed, the equipment has been printed according to the usage quantity information of authorized content and record
Quantity verifies the validity of access right.For example, authorized content is comprising use time information is allowed, the equipment has real-time
Clock obtains current time, and the equipment allows the current time of use time information and the equipment to test according to authorized content
Demonstrate,prove the validity of access right.Allow to use version information for example, authorized content is included, the model includes version information, institute
State equipment allows to verify access right using the version information of version information and the model according to the authorized content
Validity.
In addition, as in figure fine dotted line mark.One equipment can have more than one device certificate.Different equipment cards
Book is identified by different device certificate and represented.Device request is determined uses for which device certificate.Determine after device certificate, no
What the operation being applicable with device certificate was just as.So, same equipment, difference can be showed by distinct device certificate
Equipment description, so as to there is different model mandates.For example, an equipment, it has a device certificate, and its license type is individual
People, number of devices is 1, and this printer can carry out model printing with personal identity Acceptance Model mandate;In addition, it also has
Second device certificate, its license type is education, and number of devices is 10, the user of actual printer or the thing of certain school
Teacher is managed, he can print the authorized model of school on said device;In addition, this second device certificate is described
The device certificate of school, installed in 10 different printing devices, every model to the device certificate mandate can be at it
In print in any one equipment, while model provider component knows that the number of devices of the certificate is 10 by device authorization, make
It is education type with license, is easy to the model provider component to be kept accounts or charged.In addition, representing the device certificate of multiple equipment
It can be installed in multiple equipment.
Every equipment is mounted on device certificate, and device certificate includes model authorized transmissions key, side of the model to encrypt
Formula is by computer or server transport to equipment, and the model decryption key packet in computer or server is contained in model mandate,
Model mandate is encrypted and is transferred in the way of encryption with the model authorized transmissions key of equipment by computer or server and is set
Standby, if the model of the model decryption key pair encryption in reserved type module mandate is decrypted, the model of decryption is printed as by equipment
3D solid.
Equipment produces device authorization according to device certificate, and device authorization, which is included, is used for the key that model authorized transmissions are encrypted,
Device authorization, which does not include, is used for the key that model authorized transmissions are decrypted.
Model authorization packets access right containing model, device authentication model access right, equipment is only by the model right to use
The model of limit checking validity is printed as 3D solid.
Device authorization certificate includes device identifying information, and model authorized person verifies that device authorization is demonstrate,proved by device identifying information
Book, model authorized person only gives the effective device generating model mandate of device authorization certification authentication of equipment.
Model access right is comprising usage quantity information is allowed, and equipment records the quantity of the model printed, if
Access right is verified for the quantity printed recorded according to the permission usage quantity information and equipment of model access right
Validity.
Model access right is comprising use time information is allowed, and there is equipment real-time clock to obtain current time, equipment root
The validity of access right is verified according to the permission use time information of model access right and the current time of equipment.
Model access right, which is included, to be allowed to use version information, and model includes version information, and equipment is according to the model right to use
The validity for allowing to verify access right using the version information of version information and model of limit.
Device authorization certificate is described comprising equipment.
Equipment includes more than one device certificate.
Represent that the device certificate of multiple equipment is installed in multiple equipment.
The invention is not restricted to above-mentioned embodiment, made any to above-mentioned embodiment aobvious of those skilled in the art and
The improvement or change being clear to, all without the design beyond the present invention and the protection domain of appended claims.
Claims (8)
1. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment, the 3 D-printing equipment includes to enter
The microprocessor system of row encrypt and decrypt operation, the operating procedure of the guard method is as follows:
Step 1, the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;
Step 2, the computer or server are by the decruption key of the three-dimensional modeling data of the encryption and model mandate
Hold the generation model certificate of authority after encryption;
Step 3, the microprocessor system of the 3 D-printing equipment receives the mould sent by the computer or server
The type certificate of authority and the three-dimensional modeling data of the encryption;
Step 4, the microprocessor system of the 3 D-printing equipment decrypts the model certificate of authority, obtains the encryption
The decruption key of three-dimensional modeling data and the model authorized content;
Step 5, the microprocessor system of the 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and according to institute
State model authorized content printing threedimensional model;
The identification of 3 D-printing equipment, the three-dimensional are carried out before the step 2 generation model certificate of authority as follows
Printing device is by continuing model licensing process with the generation model certificate of authority, otherwise refusal mandate after identification:
Step 2.1, the computer or server of the three-dimensional modeling data provider sends three-dimensional to the 3 D-printing equipment
Printing device authorization requests;
Step 2.2, the microprocessor system of the 3 D-printing equipment receives the 3 D-printing device authorization request;
Step 2.3, the microprocessor system of the 3 D-printing equipment is asked according to the 3 D-printing device authorization, by three-dimensional
3 D-printing device authorization is generated after the encryption of printing device mark or signature;
Step 2.4, the 3 D-printing device authorization is received by the computer or server of the three-dimensional modeling data provider;
Step 2.5, the computer or server of the three-dimensional modeling data provider decrypts the 3 D-printing device authorization
Or checking, obtain the 3 D-printing device identification;
Step 2.6, the computer or server of the three-dimensional modeling data provider is according to the 3 D-printing device identification pair
The 3 D-printing equipment is identified.
2. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists
In what the 3 D-printing device authorization request in the step 2.1 was authorized by 3 D-printing equipment manufacturers or manufacturer
Third party generates, and is supplied to three-dimensional modeling data provider, be stored in the three-dimensional modeling data provider computer or
In server;3 D-printing device authorization request is one group of data, comprising by the 3 D-printing equipment manufacturers or
The encryption key of the three-dimensional modeling data provider for third party's encryption that manufacturer authorizes;The 3 D-printing equipment is advance
The third-party decruption key that the 3 D-printing equipment manufacturers or manufacturer authorize is installed, can be from the 3 D-printing
The encryption key of the three-dimensional modeling data provider is decrypted in device authorization request;Ciphering process in the step 2.3
Use the encryption key of the three-dimensional modeling data provider.
3. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists
In the 3 D-printing device authorization in the step 2.3 includes the encryption key of the 3 D-printing equipment;The step
The computer or server of the three-dimensional modeling data provider in 2.5 obtains institute when decrypting the 3 D-printing device authorization
State the encryption key of 3 D-printing equipment;The computer or server of the three-dimensional modeling data provider in the step 2
Ciphering process when generating the model certificate of authority uses the encryption key of the 3 D-printing equipment.
4. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists
In the model authorized content is included to specified three-dimensional printing device, three dimensional model printing quantity, time-write interval or threedimensional model
The restriction data of version.
5. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists
In the storage inside of the 3 D-printing equipment has 3 D-printing device certificate, and the 3 D-printing device certificate is beaten by three-dimensional
The third party that the manufacturer of printing apparatus or manufacturer authorize provides.
6. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 5, its feature exists
In the 3 D-printing device certificate includes the mark of 3 D-printing device certificate, the private key and public affairs of 3 D-printing device certificate
Key, the mark of 3 D-printing equipment, the description of 3 D-printing equipment and provide 3 D-printing device certificate manufacturer or
Third-party mark and public key that manufacturer authorizes.
7. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 5, its feature exists
In the storage inside of the 3 D-printing equipment has the more than one 3 D-printing device certificate, the institute of first storage
3 D-printing device certificate is stated for main device certificate, the main equipment certificate is provided by the manufacturer of the 3 D-printing equipment,
Other described 3 D-printing device certificate are slave certificate, and the slave certificate has to pass through the main equipment certificate
Private key signature, the microprocessor system of the 3 D-printing equipment just can after the signature of main equipment certificate described in good authentication
The 3 D-printing equipment is arrived into slave certificate storage.
8. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 5, its feature exists
In the 3 D-printing device certificate with identical content is stored in some 3 D-printing equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410695478.0A CN104484584B (en) | 2014-11-26 | 2014-11-26 | A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410695478.0A CN104484584B (en) | 2014-11-26 | 2014-11-26 | A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104484584A CN104484584A (en) | 2015-04-01 |
CN104484584B true CN104484584B (en) | 2017-10-10 |
Family
ID=52759125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410695478.0A Expired - Fee Related CN104484584B (en) | 2014-11-26 | 2014-11-26 | A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104484584B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107037991A (en) | 2016-02-04 | 2017-08-11 | 索尼公司 | Message processing device, information processing method and distributed elements |
US11107168B2 (en) | 2016-05-20 | 2021-08-31 | Moog Inc. | Secure and traceable manufactured parts |
US11204597B2 (en) | 2016-05-20 | 2021-12-21 | Moog Inc. | Outer space digital logistics system |
CN106113494A (en) * | 2016-06-07 | 2016-11-16 | 广州紫苑智能科技有限公司 | 3D Method of printing and 3D printing equipment |
CN106079438B (en) * | 2016-06-07 | 2019-05-10 | 广州紫苑智能科技有限公司 | 3D printer |
CN107506650A (en) * | 2016-06-14 | 2017-12-22 | 索尼公司 | Message processing device and information processing method |
CN106127762B (en) * | 2016-06-22 | 2019-02-19 | 北京小米移动软件有限公司 | 3D printing drawing creation and encryption method and device |
EP3431287A1 (en) * | 2017-07-17 | 2019-01-23 | Covestro Deutschland AG | Method for cryptologically securing an additive manufacturing process |
GB2566317A (en) * | 2017-09-11 | 2019-03-13 | Videojet Technologies Inc | Method and apparatus for securing peripheral devices |
CN110378140B (en) * | 2019-07-26 | 2021-05-18 | 武汉轻工大学 | Method, device and system for verifying attribution of deep neural network model |
CN116910707B (en) * | 2023-09-12 | 2023-12-26 | 深圳市智能派科技有限公司 | Model copyright management method and system based on equipment history record |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1937495A (en) * | 2006-09-29 | 2007-03-28 | 清华大学深圳研究生院 | Digital copyright protection method and system for media network application |
CN101714195A (en) * | 2009-07-22 | 2010-05-26 | 北京创原天地科技有限公司 | Digital certificate-based novel digital copyright protection method and device |
CN103885733A (en) * | 2014-03-10 | 2014-06-25 | 亿赞普(北京)科技有限公司 | Three-dimensional printing method and system |
CN103902237A (en) * | 2012-12-28 | 2014-07-02 | 上海格尔软件股份有限公司 | File printing control method based on digital certificate |
CN103942748A (en) * | 2014-05-13 | 2014-07-23 | 英华达(上海)科技有限公司 | Protection method and system for three-dimensional model file |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007005862A (en) * | 2005-06-21 | 2007-01-11 | Casio Electronics Co Ltd | Printing system |
-
2014
- 2014-11-26 CN CN201410695478.0A patent/CN104484584B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1937495A (en) * | 2006-09-29 | 2007-03-28 | 清华大学深圳研究生院 | Digital copyright protection method and system for media network application |
CN101714195A (en) * | 2009-07-22 | 2010-05-26 | 北京创原天地科技有限公司 | Digital certificate-based novel digital copyright protection method and device |
CN103902237A (en) * | 2012-12-28 | 2014-07-02 | 上海格尔软件股份有限公司 | File printing control method based on digital certificate |
CN103885733A (en) * | 2014-03-10 | 2014-06-25 | 亿赞普(北京)科技有限公司 | Three-dimensional printing method and system |
CN103942748A (en) * | 2014-05-13 | 2014-07-23 | 英华达(上海)科技有限公司 | Protection method and system for three-dimensional model file |
Also Published As
Publication number | Publication date |
---|---|
CN104484584A (en) | 2015-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104484584B (en) | A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment | |
CN110474898B (en) | Data encryption and decryption and key distribution method, device, equipment and readable storage medium | |
Zhaofeng et al. | Blockchain-enabled decentralized trust management and secure usage control of IoT big data | |
EP3590223B1 (en) | Integrated method and device for storing and sharing data | |
CN107566116B (en) | Method and apparatus for digital asset weight registration | |
CN107810617A (en) | Secret certification and supply | |
JP2020145733A (en) | Method for managing a trusted identity | |
CN101872399B (en) | Dynamic digital copyright protection method based on dual identity authentication | |
CN100552793C (en) | Method and apparatus and pocket memory based on the Digital Right Management playback of content | |
CN112528250B (en) | System and method for realizing data privacy and digital identity through block chain | |
US20040088541A1 (en) | Digital-rights management system | |
CN106953732B (en) | Key management system and method for chip card | |
US20160294553A1 (en) | Information delivery system | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
CN102413132A (en) | Two-way-security-authentication-based data downloading method and system | |
CN105553662A (en) | Dynamic digital right management method and system based on identification password | |
MXPA06010776A (en) | Authentication between device and portable storage. | |
CN103974255B (en) | A kind of vehicle access system and method | |
CN106487765A (en) | Authorize access method and the equipment using the method | |
CN106571951A (en) | Audit log obtaining, generating and verifying method and system and device | |
CN111740995B (en) | Authorization authentication method and related device | |
Win et al. | Privacy enabled digital rights management without trusted third party assumption | |
CN114692218A (en) | Electronic signature method, equipment and system for individual user | |
Abraham et al. | SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance. | |
CN106712938A (en) | Quantum whiteboard communication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210127 Address after: Room 401, 248-3 Zengcheng Avenue, Licheng street, Zengcheng District, Guangzhou, Guangdong 511300 Patentee after: Guangzhou Hengrui Electronic Technology Co.,Ltd. Address before: Room 606, No. 70 Longshan South Road, Siming District, Xiamen City, Fujian Province Patentee before: XIAMEN DATIAN ELECTRONIC TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171010 |
|
CF01 | Termination of patent right due to non-payment of annual fee |