CN104484584B - A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment - Google Patents

A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment Download PDF

Info

Publication number
CN104484584B
CN104484584B CN201410695478.0A CN201410695478A CN104484584B CN 104484584 B CN104484584 B CN 104484584B CN 201410695478 A CN201410695478 A CN 201410695478A CN 104484584 B CN104484584 B CN 104484584B
Authority
CN
China
Prior art keywords
printing
model
certificate
printing equipment
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410695478.0A
Other languages
Chinese (zh)
Other versions
CN104484584A (en
Inventor
耿得力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Hengrui Electronic Technology Co ltd
Original Assignee
XIAMEN DATIAN ELECTRONIC SCIENCE & TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XIAMEN DATIAN ELECTRONIC SCIENCE & TECHNOLOGY Co Ltd filed Critical XIAMEN DATIAN ELECTRONIC SCIENCE & TECHNOLOGY Co Ltd
Priority to CN201410695478.0A priority Critical patent/CN104484584B/en
Publication of CN104484584A publication Critical patent/CN104484584A/en
Application granted granted Critical
Publication of CN104484584B publication Critical patent/CN104484584B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Graphics (AREA)
  • Geometry (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment, including the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;Computer or server the generation model certificate of authority after encryption by the decruption key of the three-dimensional modeling data of the encryption and model authorized content;The microprocessor system of 3 D-printing equipment receives the model certificate of authority sent by the computer or server and the three-dimensional modeling data of the encryption;The microprocessor system of 3 D-printing equipment decrypts the model certificate of authority, obtains the decruption key and the model authorized content of the three-dimensional modeling data of the encryption;The microprocessor system of 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and prints threedimensional model according to the model authorized content.The rights and interests for making three-dimensional modeling data supplier using this method are effectively guaranteed, and the protection to three-dimensional modeling data has simply, reliably, completely.

Description

A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment
Technical field
The present invention relates to three-dimensional printing technology field, and in particular to a kind of threedimensional model copyright based on 3 D-printing equipment The method of protection.
Background technology
With the development of three-dimensional printing technology, three-dimensional software designer only prints three in the 3 D-printing equipment of oneself Tieing up article, oneself can not meet requirement.Now commonplace electronic bits of data access method can by network online access, but its by It is limited to the security limitation of network transmission, is not easy to print three-dimensional article whenever and wherever possible.There are some 3 D-printing terminals now Equipment, due to not applicable three-dimensional modeling data, can not be downloaded, its reason is that can not be for electricity directly from network again The copyright of sub- data is effectively protected and managed.
Digital copyright management (Digital Rights Management, DRM) concept is occurred in that in this case. Mainstream media's propagation and the application of security product being applied to current digital copyright management, it is impossible to meet single hardware terminal more Demand of all kinds of three-dimensional modeling datas to protection and the management of copyright is downloaded and accessed to (such as 3 D-printing equipment).
Electronic bits of data supplier and copyright owner of today, do not have oneself effective copy-right protection method, with Ensure that the electronic bits of data three-dimensional modeling data of oneself is stolen, therefore need a kind of system and method for digital copyright management badly.
Now with the development and popularization of three-dimensional printing technology, increasing three-dimensional modeling data (abbreviation threedimensional model) It is transmitted and prints.For example, online mode is sold by way of downloading or charge opening for free.Wherein threedimensional model The charge of data is sold mainly by protocol, lacks objective copyright protection regime so that three-dimensional modeling data is easy to non- Method spreads, and designer or supplier to model data cause damage, and be unfavorable for setting up reliable business model can Developer is allowed to obtain economic feedback, it is difficult to form benign development circulation.
The content of the invention
Present invention aims at overcoming defect of the prior art, there is provided a kind of copyright protection machine of three-dimensional modeling data System, the mechanism allows the copyright of three-dimensional modeling data to be obtained during 3 D-printing is carried out by 3 D-printing equipment can Lean on, complete protection, on this basis threedimensional model supplier can also be allowed to control the mandate of three-dimensional modeling data.
To achieve the above object, the technical solution adopted by the present invention is:A kind of three-dimensional based on 3 D-printing equipment is provided The method of model copyright protection, the 3 D-printing equipment, which is included, can be encrypted and decrypted the microprocessor system of operation, Following operating procedure is pressed in the guard method:
Step 1, the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;
Step 2, the computer or server award the decruption key and model of the three-dimensional modeling data of the encryption Weigh content generation model certificate of authority after encryption;
Step 3, the microprocessor system of the 3 D-printing equipment receives the institute sent by the computer or server State the three-dimensional modeling data of the model certificate of authority and the encryption;
Step 4, the microprocessor system of the 3 D-printing equipment decrypts the model certificate of authority, obtains described add The decruption key of close three-dimensional modeling data and the model authorized content;
Step 5, the microprocessor system of the 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and root Threedimensional model is printed according to the model authorized content.
It is preferred that technical scheme also have, carry out 3 D-printing as follows before the step 2 generation model certificate of authority The identification of equipment, the 3 D-printing equipment is by continuing model licensing process with the generation model certificate of authority after identification, otherwise Refusal is authorized:
Step 2.1, the computer or server of the three-dimensional modeling data provider is sent to the 3 D-printing equipment 3 D-printing device authorization is asked;
Step 2.2, the microprocessor system of the 3 D-printing equipment receives the 3 D-printing device authorization request;
Step 2.3, the microprocessor system of the 3 D-printing equipment is asked according to the 3 D-printing device authorization, will 3 D-printing device identification is encrypted or generates 3 D-printing device authorization after signing;
Step 2.4, the 3 D-printing device authorization by the three-dimensional modeling data provider computer or server Receive;
Step 2.5, the computer or server of the three-dimensional modeling data provider is by the 3 D-printing device authorization Decryption is verified, obtains the 3 D-printing device identification;
Step 2.6, the computer or server of the three-dimensional modeling data provider is according to the 3 D-printing equipment mark The 3 D-printing equipment is identified for knowledge.
Further optimal technical scheme also has, and the 3 D-printing device authorization in the step 2.1 is asked by three Third party's generation that printing device manufacturer or manufacturer authorize is tieed up, and is supplied to three-dimensional modeling data provider, institute is stored in State in the computer or server of three-dimensional modeling data provider;The 3 D-printing device authorization request is one group of data, bag The three-dimensional modeling data provider containing the third party's encryption authorized by the 3 D-printing equipment manufacturers or manufacturer Encryption key;The 3 D-printing equipment is provided with the 3rd that the 3 D-printing equipment manufacturers or manufacturer authorize in advance The decruption key of side, can decrypt adding for the three-dimensional modeling data provider from 3 D-printing device authorization request Key;Ciphering process in the step 2.3 uses the encryption key of the three-dimensional modeling data provider.
Threedimensional model mandate causes 3 D-printing equipment to decrypt threedimensional model in printing, and according to threedimensional model provider The content of mandate printed.But the side of cracking can pretend equipment, model mandate is gained, so as to decrypt threedimensional model, so by cheating Do not operated afterwards by authorized content, it might even be possible to will be published after the model decryption of encryption.Then equipment is identified and (set It is standby to authorize), that is to say, that it is not really camouflage that three-dimensional modeling data provider, which first has to determine that this 3 D-printing equipment is, Then model mandate (model decruption key is included in model mandate) could be sent to it.But, the side of cracking can also disguise oneself as Three-dimensional modeling data provider, sends device authorization request to real 3 D-printing equipment, gains real equipment mandate by cheating, then Disguise oneself as 3 D-printing equipment again, the true mandate is transmitted into true three-dimension model data provider, so as to gain three-dimensional mould by cheating The mandate of type data.Then there is further model provider to authorize, be actually " request of 3 D-printing device authorization " This group of data.The data are that decruption key is by manufacturer by manufacturer (or third party of manufacturer's mandate) encryption generation (or third party of manufacturer's mandate) is pre-installed in printing device, when using asymmetric encryption, even if equipment is cracked, Cause decruption key to leak, can not also obtain encryption key, it is raw not become effective " request of 3 D-printing device authorization ", so that Manufacturer can not be pretended to be, that is to say, that the encryption key of three-dimensional modeling data provider can not be sent to three-dimensional and beaten by the side of cracking Printing apparatus, 3 D-printing equipment also can not just generate correct 3 D-printing device authorization so that three-dimensional modeling data provider Model mandate can not be provided.
Model mandate and device authorization (identification) are substantially on-line automatic progress, easily camouflage and deception;Manufacturer pair It is that party discusses face-to-face that model provider, which authorizes, it is not easy to camouflage and deception.
It is preferred that technical scheme also have, the 3 D-printing device authorization in the step 2.3 is beaten comprising the three-dimensional The encryption key of printing apparatus;Computer or server the decryption institute of the three-dimensional modeling data provider in the step 2.5 The encryption key of the 3 D-printing equipment is obtained when stating 3 D-printing device authorization;The threedimensional model in the step 2 Ciphering process of the computer or server of data providing when generating the model certificate of authority uses the 3 D-printing The encryption key of equipment.
It is preferred that technical scheme also have, the model authorized content include specified three-dimensional printing device, threedimensional model are beaten The restriction data of printing amount, time-write interval or threedimensional model version.
It is preferred that technical scheme also have, the storage inside of the 3 D-printing equipment has 3 D-printing device certificate, described The third party that 3 D-printing device certificate is authorized by the manufacturer of 3 D-printing equipment or manufacturer provides.
Further preferred technical scheme is that the 3 D-printing device certificate includes the mark of 3 D-printing device certificate Know, the private key and public key of 3 D-printing device certificate, the mark of 3 D-printing equipment, the description and offer of 3 D-printing equipment Third-party mark and public key that the manufacturer of 3 D-printing device certificate or manufacturer authorize.
Further preferred technical scheme is that the storage inside of the 3 D-printing equipment has the more than one three-dimensional Printing device certificate, the 3 D-printing device certificate of first storage is main device certificate, and the main equipment certificate is by institute The manufacturer for stating 3 D-printing equipment is provided, and other described 3 D-printing device certificate are slave certificate, and the subordinate is set Standby certificate has to pass through the private key signature of the main equipment certificate, and the microprocessor system of the 3 D-printing equipment is successfully being tested Demonstrate,prove just can arrive the 3 D-printing equipment after the signature of the main equipment certificate by slave certificate storage.That is Third-party 3 D-printing device certificate will authorize (signature) could store and arrive the 3 D-printing equipment by manufacturer.
Further preferred technical scheme is that the 3 D-printing device certificate with identical content is stored in some In the 3 D-printing equipment.
Advantages of the present invention and beneficial effect are to carry out copyright protection using 3 D-printing equipment printing threedimensional model Method, the rights and interests of three-dimensional modeling data supplier can be made to be effectively guaranteed.Methods described is for threedimensional model simultaneously The features such as protection of data has simple, reliable, complete, practical.
Brief description of the drawings
Fig. 1 prints the schematic diagram that threedimensional model carries out copy-right protection method with 3 D-printing equipment for the present invention.
Embodiment
As shown in figure 1, the present invention is a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment, described three Dimension printing device is comprising that can be encrypted and decrypted the microprocessor system of operation, and the guard method is by following operation step Suddenly:
Step 1, the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;
Step 2, the computer or server award the decruption key and model of the three-dimensional modeling data of the encryption Weigh content generation model certificate of authority after encryption;
Step 3, the microprocessor system of the 3 D-printing equipment receives the institute sent by the computer or server State the three-dimensional modeling data of the model certificate of authority and the encryption;
Step 4, the microprocessor system of the 3 D-printing equipment decrypts the model certificate of authority, obtains described add The decruption key of close three-dimensional modeling data and the model authorized content;
Step 5, the microprocessor system of the 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and root Threedimensional model is printed according to the model authorized content.
It is preferred that technical scheme also have, carry out 3 D-printing as follows before the step 2 generation model certificate of authority The identification of equipment, the 3 D-printing equipment then continues model licensing process by identification with the generation model certificate of authority, otherwise Refusal is authorized:
Step 2.1, the computer or server of the three-dimensional modeling data provider is sent to the 3 D-printing equipment 3 D-printing device authorization is asked;
Step 2.2, the microprocessor system of the 3 D-printing equipment receives the 3 D-printing device authorization request;
Step 2.3, the microprocessor system of the 3 D-printing equipment is asked according to the 3 D-printing device authorization, will 3 D-printing device identification is encrypted or generates 3 D-printing device authorization after signing;
Step 2.4, the 3 D-printing device authorization by the three-dimensional modeling data provider computer or server Receive;
Step 2.5, the computer or server of the three-dimensional modeling data provider is by the 3 D-printing device authorization Decryption is verified, obtains the 3 D-printing device identification;
Step 2.6, the computer or server of the three-dimensional modeling data provider is according to the 3 D-printing equipment mark The 3 D-printing equipment is identified for knowledge.
Further optimal technical scheme also has, and the 3 D-printing device authorization in the step 2.1 is asked by three Third party's generation that printing device manufacturer or manufacturer authorize is tieed up, and is supplied to three-dimensional modeling data provider, institute is stored in State in the computer or server of three-dimensional modeling data provider;The 3 D-printing device authorization request is one group of data, bag The three-dimensional modeling data provider containing the third party's encryption authorized by the 3 D-printing equipment manufacturers or manufacturer Encryption key;The 3 D-printing equipment is provided with the 3rd that the 3 D-printing equipment manufacturers or manufacturer authorize in advance The decruption key of side, can decrypt adding for the three-dimensional modeling data provider from 3 D-printing device authorization request Key;Ciphering process in the step 2.3 uses the encryption key of the three-dimensional modeling data provider.
It is preferred that technical scheme also have, the 3 D-printing device authorization in the step 2.3 is beaten comprising the three-dimensional The encryption key of printing apparatus;Computer or server the decryption institute of the three-dimensional modeling data provider in the step 2.5 The encryption key of the 3 D-printing equipment is obtained when stating 3 D-printing device authorization;The threedimensional model in the step 2 Ciphering process of the computer or server of data providing when generating the model certificate of authority uses the 3 D-printing The encryption key of equipment.
It is preferred that technical scheme also have, the model authorized content include specified three-dimensional printing device, threedimensional model are beaten The restriction data of printing amount, time-write interval or threedimensional model version.
It is preferred that technical scheme also have, the storage inside of the 3 D-printing equipment has 3 D-printing device certificate, described The third party that 3 D-printing device certificate is authorized by the manufacturer of 3 D-printing equipment or manufacturer provides.
Further preferred technical scheme is that the 3 D-printing device certificate includes the mark of 3 D-printing device certificate Know, the private key and public key of 3 D-printing device certificate, the mark of 3 D-printing equipment, the description and offer of 3 D-printing equipment Third-party mark and public key that the manufacturer of 3 D-printing device certificate or manufacturer authorize.
Further preferred technical scheme also has, and the storage inside of the 3 D-printing equipment has more than one described three Tie up printing device certificate, first storage the 3 D-printing device certificate be main device certificate, the main equipment certificate by The manufacturer of the 3 D-printing equipment provides, and other described 3 D-printing device certificate are slave certificate, the subordinate Device certificate has to pass through the private key signature of the main equipment certificate, and the microprocessor system of the 3 D-printing equipment is in success Verify just can arrive the 3 D-printing equipment after the signature of the main equipment certificate by slave certificate storage.
It is preferred that technical scheme also have, the 3 D-printing device certificate with identical content is stored in described in some In 3 D-printing equipment.
Embodiment
It is that the theory diagram that threedimensional model carries out the method for copyright protection is printed with 3 D-printing equipment shown in Fig. 1, uses After methods described, 3 D-printing equipment (hereinafter referred to as equipment) realizes the mechanism to three-dimensional modeling data copyright protection.For just Solid box in understanding, figure is data, and circle is processing procedure, provider and reciever of the thick dashed line frame for threedimensional model The different field of (equipment side), fine dotted line frame represents the flow direction of option content, arrows show data or operation.
Three-dimensional modeling data copyright protection (hereinafter referred to as copyright protection) described here refers to only when the three-dimensional mould The computer of data (hereinafter referred to as model) side of being provided of type or server mandate, and the mandate is effective by device authentication The equipment just can be by the threedimensional model " printing " into 3D solid afterwards, it is ensured that three-dimensional modeling data will not be printed arbitrarily, By the method for encryption three bit model data will not be leaked in itself simultaneously.
In computer or server, copyright protection is realized by multi-enciphering.Model is in computer or server Storage and carried out in the way of encryption during being transferred to equipment, symmetric cryptography, such as AES encryption, after encryption can be used Model can be transmitted by carriers such as network or USB flash disks, using after reliable AES, third party can not be not The content of model is cracked out when obtaining decruption key, so model will not be stolen during transmission in itself.Model The request and authorization data that provider and equipment room are exchanged are also that, by encryption, can also use asymmetrical AES, such as RSA Algorithm.Unless stated otherwise, present patent application use AES and relational language, for example private key, public key, Encryption, decryption, signature etc., are all known disclosed canonical algorithm and definition, and its details refers to books disclosed in correlation or money Material, is not repeated herein.
Every equipment at least one device certificate.Device certificate is stored in device interior, and device certificate is not right in itself Outer transmission, third party's (being generally called producer in figure) that device certificate is authorized by the manufacturer of equipment or manufacturer provides.Equipment Certificate includes device certificate mark, the private key and public key of equipment, device identification, the mark of equipment description and device certificate supplier Know and public key.Device identification is the unique numeral for representing equipment, further, and the device identification numeral has specific number According to structure or verification, it can be used for judging the true and false of equipment;Manufacturer is the unique numeral for representing manufacturer.Equipment is retouched Stating the type for providing equipment, print capacity (material, speed, size etc.), number of devices (allows the public card of one group of equipment Book), the device-dependent detailed information such as license type (such as commercialization, individual, education, scientific research, charity organization).Device authorization will The public information of equipment is supplied to the computer or server of model provider, and for generation model mandate, it is by device certificate The equipment generation at place, the part that discloses comprising the device certificate, i.e. device certificate mark, the public key of equipment, equipment mark Know, equipment is described.Device authorization is encrypted when generating by AES, and the encryption key needed for it is led to by computer or server Cross device request and be supplied to equipment.
Device request is one group of data, the public affairs of the model provider comprising manufacturer and by manufacturer's private key encryption Key, it is previously generated by manufacturer for the computer or server of model provider, and is stored in the computer of model provider Or in server.The computer or server of model provider will propose to set when requiring that equipment provides device authorization to equipment Standby request.As long as saved device request is transferred to equipment by the computer or server of model provider, it is not necessary to again Do the encryption process.The device request sent by computer or server is carried the public key of model provider with a kind of reliable way Supply arrangement, it is to avoid the hacker model provider that disguises oneself as gains the information of equipment by cheating.
Equipment is received after the device request that computer or server are sent, and is searched certainly according to the manufacturer of device request The device certificate of body, and go out with manufacturer's public key decryptions of relevant device certificate the public key of model provider, and use the mould The public key of type provider is encrypted for device authorization, is transferred to the computer or server of model provider.
The computer or server of model provider is received after device authorization, carries out equipment identification, the i.e. private key with itself Decrypt the content of device authorization.Device identification and equipment description in the device authorization can be for keeping accounts or charging, example Such as different device types, different number of devices has different model mandate expenses.The computer or clothes of model provider Be engaged in device authorize model in use, by authorized solution to model key and authorized content the equipment in the device authorization Public key is encrypted, and the device identification in the device authorization of additional unencryption, generation model mandate, and by computer or Server transport is to equipment.Authorized content is model access right, and it limits how the model uses, for example, limit quantity and beat Print, is printed between prescribing a time limit, limit three-dimensional modeling data version printing etc.;Other authorized content also specifies printing device, for example, it can be with , can also be by way of implicitly specifying, as used by showing the mark for including 3 D-printing equipment in authorized content The public key of 3 D-printing equipment is stated to encrypt generation model mandate.
Equipment receives the model mandate that computer or server are sent, according to the equipment of unencryption in the model mandate Identifier lookup device certificate, extraction equipment private key, and decrypt the model decruption key in model mandate with the private key and award Weigh content.The equipment authorized model of model decryption key decryption correspondence, and the right to use is being verified according to authorized content The effectively rear three-dimensional article printing for carrying out model of limit.For example, authorized content includes model usage quantity information, the equipment record The quantity of the model printed, the equipment has been printed according to the usage quantity information of authorized content and record Quantity verifies the validity of access right.For example, authorized content is comprising use time information is allowed, the equipment has real-time Clock obtains current time, and the equipment allows the current time of use time information and the equipment to test according to authorized content Demonstrate,prove the validity of access right.Allow to use version information for example, authorized content is included, the model includes version information, institute State equipment allows to verify access right using the version information of version information and the model according to the authorized content Validity.
In addition, as in figure fine dotted line mark.One equipment can have more than one device certificate.Different equipment cards Book is identified by different device certificate and represented.Device request is determined uses for which device certificate.Determine after device certificate, no What the operation being applicable with device certificate was just as.So, same equipment, difference can be showed by distinct device certificate Equipment description, so as to there is different model mandates.For example, an equipment, it has a device certificate, and its license type is individual People, number of devices is 1, and this printer can carry out model printing with personal identity Acceptance Model mandate;In addition, it also has Second device certificate, its license type is education, and number of devices is 10, the user of actual printer or the thing of certain school Teacher is managed, he can print the authorized model of school on said device;In addition, this second device certificate is described The device certificate of school, installed in 10 different printing devices, every model to the device certificate mandate can be at it In print in any one equipment, while model provider component knows that the number of devices of the certificate is 10 by device authorization, make It is education type with license, is easy to the model provider component to be kept accounts or charged.In addition, representing the device certificate of multiple equipment It can be installed in multiple equipment.
Every equipment is mounted on device certificate, and device certificate includes model authorized transmissions key, side of the model to encrypt Formula is by computer or server transport to equipment, and the model decryption key packet in computer or server is contained in model mandate, Model mandate is encrypted and is transferred in the way of encryption with the model authorized transmissions key of equipment by computer or server and is set Standby, if the model of the model decryption key pair encryption in reserved type module mandate is decrypted, the model of decryption is printed as by equipment 3D solid.
Equipment produces device authorization according to device certificate, and device authorization, which is included, is used for the key that model authorized transmissions are encrypted, Device authorization, which does not include, is used for the key that model authorized transmissions are decrypted.
Model authorization packets access right containing model, device authentication model access right, equipment is only by the model right to use The model of limit checking validity is printed as 3D solid.
Device authorization certificate includes device identifying information, and model authorized person verifies that device authorization is demonstrate,proved by device identifying information Book, model authorized person only gives the effective device generating model mandate of device authorization certification authentication of equipment.
Model access right is comprising usage quantity information is allowed, and equipment records the quantity of the model printed, if Access right is verified for the quantity printed recorded according to the permission usage quantity information and equipment of model access right Validity.
Model access right is comprising use time information is allowed, and there is equipment real-time clock to obtain current time, equipment root The validity of access right is verified according to the permission use time information of model access right and the current time of equipment.
Model access right, which is included, to be allowed to use version information, and model includes version information, and equipment is according to the model right to use The validity for allowing to verify access right using the version information of version information and model of limit.
Device authorization certificate is described comprising equipment.
Equipment includes more than one device certificate.
Represent that the device certificate of multiple equipment is installed in multiple equipment.
The invention is not restricted to above-mentioned embodiment, made any to above-mentioned embodiment aobvious of those skilled in the art and The improvement or change being clear to, all without the design beyond the present invention and the protection domain of appended claims.

Claims (8)

1. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment, the 3 D-printing equipment includes to enter The microprocessor system of row encrypt and decrypt operation, the operating procedure of the guard method is as follows:
Step 1, the three-dimensional modeling data of encryption is stored in the computer or server of three-dimensional modeling data provider;
Step 2, the computer or server are by the decruption key of the three-dimensional modeling data of the encryption and model mandate Hold the generation model certificate of authority after encryption;
Step 3, the microprocessor system of the 3 D-printing equipment receives the mould sent by the computer or server The type certificate of authority and the three-dimensional modeling data of the encryption;
Step 4, the microprocessor system of the 3 D-printing equipment decrypts the model certificate of authority, obtains the encryption The decruption key of three-dimensional modeling data and the model authorized content;
Step 5, the microprocessor system of the 3 D-printing equipment decrypts the three-dimensional modeling data of the encryption, and according to institute State model authorized content printing threedimensional model;
The identification of 3 D-printing equipment, the three-dimensional are carried out before the step 2 generation model certificate of authority as follows Printing device is by continuing model licensing process with the generation model certificate of authority, otherwise refusal mandate after identification:
Step 2.1, the computer or server of the three-dimensional modeling data provider sends three-dimensional to the 3 D-printing equipment Printing device authorization requests;
Step 2.2, the microprocessor system of the 3 D-printing equipment receives the 3 D-printing device authorization request;
Step 2.3, the microprocessor system of the 3 D-printing equipment is asked according to the 3 D-printing device authorization, by three-dimensional 3 D-printing device authorization is generated after the encryption of printing device mark or signature;
Step 2.4, the 3 D-printing device authorization is received by the computer or server of the three-dimensional modeling data provider;
Step 2.5, the computer or server of the three-dimensional modeling data provider decrypts the 3 D-printing device authorization Or checking, obtain the 3 D-printing device identification;
Step 2.6, the computer or server of the three-dimensional modeling data provider is according to the 3 D-printing device identification pair The 3 D-printing equipment is identified.
2. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists In what the 3 D-printing device authorization request in the step 2.1 was authorized by 3 D-printing equipment manufacturers or manufacturer Third party generates, and is supplied to three-dimensional modeling data provider, be stored in the three-dimensional modeling data provider computer or In server;3 D-printing device authorization request is one group of data, comprising by the 3 D-printing equipment manufacturers or The encryption key of the three-dimensional modeling data provider for third party's encryption that manufacturer authorizes;The 3 D-printing equipment is advance The third-party decruption key that the 3 D-printing equipment manufacturers or manufacturer authorize is installed, can be from the 3 D-printing The encryption key of the three-dimensional modeling data provider is decrypted in device authorization request;Ciphering process in the step 2.3 Use the encryption key of the three-dimensional modeling data provider.
3. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists In the 3 D-printing device authorization in the step 2.3 includes the encryption key of the 3 D-printing equipment;The step The computer or server of the three-dimensional modeling data provider in 2.5 obtains institute when decrypting the 3 D-printing device authorization State the encryption key of 3 D-printing equipment;The computer or server of the three-dimensional modeling data provider in the step 2 Ciphering process when generating the model certificate of authority uses the encryption key of the 3 D-printing equipment.
4. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists In the model authorized content is included to specified three-dimensional printing device, three dimensional model printing quantity, time-write interval or threedimensional model The restriction data of version.
5. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 1, its feature exists In the storage inside of the 3 D-printing equipment has 3 D-printing device certificate, and the 3 D-printing device certificate is beaten by three-dimensional The third party that the manufacturer of printing apparatus or manufacturer authorize provides.
6. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 5, its feature exists In the 3 D-printing device certificate includes the mark of 3 D-printing device certificate, the private key and public affairs of 3 D-printing device certificate Key, the mark of 3 D-printing equipment, the description of 3 D-printing equipment and provide 3 D-printing device certificate manufacturer or Third-party mark and public key that manufacturer authorizes.
7. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 5, its feature exists In the storage inside of the 3 D-printing equipment has the more than one 3 D-printing device certificate, the institute of first storage 3 D-printing device certificate is stated for main device certificate, the main equipment certificate is provided by the manufacturer of the 3 D-printing equipment, Other described 3 D-printing device certificate are slave certificate, and the slave certificate has to pass through the main equipment certificate Private key signature, the microprocessor system of the 3 D-printing equipment just can after the signature of main equipment certificate described in good authentication The 3 D-printing equipment is arrived into slave certificate storage.
8. a kind of method of the threedimensional model copyright protection based on 3 D-printing equipment as claimed in claim 5, its feature exists In the 3 D-printing device certificate with identical content is stored in some 3 D-printing equipment.
CN201410695478.0A 2014-11-26 2014-11-26 A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment Expired - Fee Related CN104484584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410695478.0A CN104484584B (en) 2014-11-26 2014-11-26 A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410695478.0A CN104484584B (en) 2014-11-26 2014-11-26 A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment

Publications (2)

Publication Number Publication Date
CN104484584A CN104484584A (en) 2015-04-01
CN104484584B true CN104484584B (en) 2017-10-10

Family

ID=52759125

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410695478.0A Expired - Fee Related CN104484584B (en) 2014-11-26 2014-11-26 A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment

Country Status (1)

Country Link
CN (1) CN104484584B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107037991A (en) 2016-02-04 2017-08-11 索尼公司 Message processing device, information processing method and distributed elements
US11107168B2 (en) 2016-05-20 2021-08-31 Moog Inc. Secure and traceable manufactured parts
US11204597B2 (en) 2016-05-20 2021-12-21 Moog Inc. Outer space digital logistics system
CN106113494A (en) * 2016-06-07 2016-11-16 广州紫苑智能科技有限公司 3D Method of printing and 3D printing equipment
CN106079438B (en) * 2016-06-07 2019-05-10 广州紫苑智能科技有限公司 3D printer
CN107506650A (en) * 2016-06-14 2017-12-22 索尼公司 Message processing device and information processing method
CN106127762B (en) * 2016-06-22 2019-02-19 北京小米移动软件有限公司 3D printing drawing creation and encryption method and device
EP3431287A1 (en) * 2017-07-17 2019-01-23 Covestro Deutschland AG Method for cryptologically securing an additive manufacturing process
GB2566317A (en) * 2017-09-11 2019-03-13 Videojet Technologies Inc Method and apparatus for securing peripheral devices
CN110378140B (en) * 2019-07-26 2021-05-18 武汉轻工大学 Method, device and system for verifying attribution of deep neural network model
CN116910707B (en) * 2023-09-12 2023-12-26 深圳市智能派科技有限公司 Model copyright management method and system based on equipment history record

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937495A (en) * 2006-09-29 2007-03-28 清华大学深圳研究生院 Digital copyright protection method and system for media network application
CN101714195A (en) * 2009-07-22 2010-05-26 北京创原天地科技有限公司 Digital certificate-based novel digital copyright protection method and device
CN103885733A (en) * 2014-03-10 2014-06-25 亿赞普(北京)科技有限公司 Three-dimensional printing method and system
CN103902237A (en) * 2012-12-28 2014-07-02 上海格尔软件股份有限公司 File printing control method based on digital certificate
CN103942748A (en) * 2014-05-13 2014-07-23 英华达(上海)科技有限公司 Protection method and system for three-dimensional model file

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007005862A (en) * 2005-06-21 2007-01-11 Casio Electronics Co Ltd Printing system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937495A (en) * 2006-09-29 2007-03-28 清华大学深圳研究生院 Digital copyright protection method and system for media network application
CN101714195A (en) * 2009-07-22 2010-05-26 北京创原天地科技有限公司 Digital certificate-based novel digital copyright protection method and device
CN103902237A (en) * 2012-12-28 2014-07-02 上海格尔软件股份有限公司 File printing control method based on digital certificate
CN103885733A (en) * 2014-03-10 2014-06-25 亿赞普(北京)科技有限公司 Three-dimensional printing method and system
CN103942748A (en) * 2014-05-13 2014-07-23 英华达(上海)科技有限公司 Protection method and system for three-dimensional model file

Also Published As

Publication number Publication date
CN104484584A (en) 2015-04-01

Similar Documents

Publication Publication Date Title
CN104484584B (en) A kind of method of the threedimensional model copyright protection based on 3 D-printing equipment
CN110474898B (en) Data encryption and decryption and key distribution method, device, equipment and readable storage medium
Zhaofeng et al. Blockchain-enabled decentralized trust management and secure usage control of IoT big data
EP3590223B1 (en) Integrated method and device for storing and sharing data
CN107566116B (en) Method and apparatus for digital asset weight registration
CN107810617A (en) Secret certification and supply
JP2020145733A (en) Method for managing a trusted identity
CN101872399B (en) Dynamic digital copyright protection method based on dual identity authentication
CN100552793C (en) Method and apparatus and pocket memory based on the Digital Right Management playback of content
CN112528250B (en) System and method for realizing data privacy and digital identity through block chain
US20040088541A1 (en) Digital-rights management system
CN106953732B (en) Key management system and method for chip card
US20160294553A1 (en) Information delivery system
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN102413132A (en) Two-way-security-authentication-based data downloading method and system
CN105553662A (en) Dynamic digital right management method and system based on identification password
MXPA06010776A (en) Authentication between device and portable storage.
CN103974255B (en) A kind of vehicle access system and method
CN106487765A (en) Authorize access method and the equipment using the method
CN106571951A (en) Audit log obtaining, generating and verifying method and system and device
CN111740995B (en) Authorization authentication method and related device
Win et al. Privacy enabled digital rights management without trusted third party assumption
CN114692218A (en) Electronic signature method, equipment and system for individual user
Abraham et al. SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance.
CN106712938A (en) Quantum whiteboard communication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210127

Address after: Room 401, 248-3 Zengcheng Avenue, Licheng street, Zengcheng District, Guangzhou, Guangdong 511300

Patentee after: Guangzhou Hengrui Electronic Technology Co.,Ltd.

Address before: Room 606, No. 70 Longshan South Road, Siming District, Xiamen City, Fujian Province

Patentee before: XIAMEN DATIAN ELECTRONIC TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171010

CF01 Termination of patent right due to non-payment of annual fee