CN107133523A - Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system - Google Patents

Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system Download PDF

Info

Publication number
CN107133523A
CN107133523A CN201710244842.5A CN201710244842A CN107133523A CN 107133523 A CN107133523 A CN 107133523A CN 201710244842 A CN201710244842 A CN 201710244842A CN 107133523 A CN107133523 A CN 107133523A
Authority
CN
China
Prior art keywords
printing
model file
printing equipment
print service
management method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710244842.5A
Other languages
Chinese (zh)
Inventor
杨放春
林荣恒
李静林
王红熳
王尚广
孙其博
傅轶
洪浩然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG SILVERAGE HOLDINGS Ltd
Original Assignee
GUANGDONG SILVERAGE HOLDINGS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG SILVERAGE HOLDINGS Ltd filed Critical GUANGDONG SILVERAGE HOLDINGS Ltd
Priority to CN201710244842.5A priority Critical patent/CN107133523A/en
Publication of CN107133523A publication Critical patent/CN107133523A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention is related to 3D printing burglary-resisting system and wherein 3D printing equipment, further relate to the cloud print service management method in system, this method can be by setting up functional module, it is combined into functional module construction, implemented by storing computer program in a computer-readable storage medium, wherein it is encrypted after obtaining 3D printing model file for 3D printing cloud platform, the 3D printing model file after encryption is transferred in 3D printing equipment by web again and is decrypted, 3D printing equipment is printed according to the 3D printing model file after decryption, during printing, 3D printing cloud platform monitors the trend particularly data flow of the 3D printing model file in 3D printing equipment in real time, so as to learn the risk that 3D printing model file is stolen during transmission or printing.

Description

Cloud print service pipe in 3D printing burglary-resisting system and wherein 3D printing equipment, system Manage method and apparatus
Technical field
The invention is related to 3D printing burglary-resisting system and wherein 3D printing equipment, further relates to the cloud print service in system Management method, this method can be combined into functional module construction by setting up functional module, by being stored in computer-readable storage Computer program in medium is implemented.
Background technology
At present, because the cost of large-scale 3D printing equipment is higher, generally user need to use third-party 3D printing Factory or facility carry out 3D printing making, and this has just derived 3D printing cloud platform.In 3D printing cloud platform, user uploads 3D Printer model file or by pay expense obtain 3D model libraries in 3D printing model file after, 3D printing cloud platform will be controlled 3D printing equipment processed is printed to the 3D printing model file that user selects, but this mode is transmitted in 3D printing cloud platform 3D printing model file is to during 3D printing equipment, or even during 3D printing equipment is printed, 3D printing model text Part is easy to be stolen by people.As long as and anyone gets 3D printing model file, it is possible to other people original setting of complete copy Meter, causes the cost for plagiarizing fraud very cheap, plagiarizes the phenomenon faked frequent.
The content of the invention
The purpose of the invention is the wind for learning that 3D printing model file is stolen during transmission or printing Danger.
The purpose of the invention is achieved through the following technical solutions:
A kind of cloud print service management method is provided, including:
Receive step, receive the print request of user;
3D printing model file to be printed, is issued 3D printing equipment by dispatch step;Also include:
The encrypting step run before dispatch step, the 3D printing model file is encrypted;
Order step, order 3D printing equipment is printed after decrypting the 3D printing model file;
The monitoring step run after step of ordering, monitors the decrypting process and/or print procedure of 3D printing equipment.
For the file theft preventing method of 3D printing cloud platform, functional module structure can be combined into by setting up functional module Frame, is implemented by storing computer program in a computer-readable storage medium.
A kind of 3D printing equipment, including 3D printer, in addition to the camera electrically connected with 3D printer are also provided, imaged Real Time Effect is simultaneously transferred to 3D printer by the Real Time Effect of head intake 3D printer, and 3D printer is by web Real Time Effect It is uploaded to high in the clouds.The 3D printing equipment has computer program, and running the computer program makes this 3D printing device perform such as lower section Method:Printed after the 3D printing model file for decrypting the encryption from high in the clouds, and by the decrypting process of 3D printing model file And/or print procedure is uploaded to high in the clouds.The 3D printing equipment absorbs 3D printing by the camera electrically connected with 3D printer Real Time Effect is uploaded to high in the clouds or 3D printing cloud platform by the Real Time Effect of machine, 3D printer by web, makes user or work people Member can be to 3D printer in 3D printing model file print procedure external environment condition monitor.
A kind of 3D printing burglary-resisting system is also provided, including above-mentioned cloud print service managing device and above-mentioned 3D printing are set It is standby.
In the invention, it is encrypted after obtaining 3D printing model file for 3D printing cloud platform, then encryption 3D printing model file afterwards is transferred in 3D printing equipment by web and is decrypted, and 3D printing equipment is by 3D printing cloud platform Control according to the 3D printing model file after decryption so as to be printed, and during printing, 3D printing cloud platform is supervised in real time Depending on the trend particularly data flow of the 3D printing model file in 3D printing equipment, so as to learn 3D printing model file in biography The risk being stolen during defeated or printing.
Brief description of the drawings
The invention is described further using accompanying drawing, but the embodiment in accompanying drawing is not constituted to the invention Any limitation, on the premise of not paying creative work, can also be according to following attached for one of ordinary skill in the art Figure obtains other accompanying drawings.
Fig. 1 is the structural representation of 3D printing system.
Fig. 2 is the Organization Chart of 3D printing cloud platform.
Flow chart when Fig. 3 is encryption submodule operation.
Fig. 4 carries out flow chart during monitoring feedback for feedback submodule.
Embodiment
The invention is described in further detail with the following Examples.
Embodiment 1
Fig. 1 is the structural representation of the 3D printing system based on web.User is in mobile terminal 1s such as mobile phone, computer, tablet personal computers Upper to log in 3D printing cloud platform 2 by web, 3D printing equipment 3 logs in 3D printing cloud platform 2,3D printing cloud center also by web 2 are encrypted and communicated with mobile terminal 1 and 3D printing equipment 3 respectively by web.For convenience of description, herein, mobile terminal 1 by taking mobile phone as an example.
Fig. 2 is the Organization Chart of 3D printing cloud platform 2, and it is divided into line module 21, management and control module 22, printing device insertion mould 24 4 parts of block 23 and database, wherein:
--- database 24 mainly stores user profile, 3D printing facility information and 3D printing model file etc..
--- line module 21 is mainly divided into five submodules, including:User management submodule 211, for user's pipe Manage and monitor all print progress, including ongoing print progress and history print progress etc..Submodule 212 is logged in, is used In user or keeper's login, registration.Submodule 213 is uploaded, the 3D printing model file for user to be selected locally is uploaded To 3D printing cloud platform 2.Submodule 214 is printed, print request is carried out for user and printing is configured.Submodule 215 is paid, is used Carry out paying printing expense in user.
--- printing device insertion module 23 is embedded into the 3D printing equipment 3 for having logged in 3D printing cloud platform 2, main to draw It is divided into three submodules, including:Print management submodule 231, for managing the printing configuration flow of 3D printing cloud platform 2 and beating Print operation etc..Submodule 232 is monitored, the flow direction of data, printing after the decrypting process of monitoring 3D printing model file, decryption in real time Process and the institute of 3D printing equipment 3 is obtained by the camera being embedded in 3D printing equipment 3 that equipment utilization data are printed Locate the Real Time Effect of environment(Herein to the data of decrypting process, the flow direction of data, the data of print procedure and Real Time Effect Set referred to as monitoring data), and timing will monitor data to be sent in the form of heartbeat packet in management and control module 22.Decrypt submodule 233, the 3D printing model file after encryption is transferred in 3D printing equipment 3 by web, and to 3D in 3D printing equipment 3 Operation is decrypted in printer model file.
--- management and control module 22 is mainly divided into four submodules, including:Local management submodule 221, for managing 3D Print printing flow and print queue of cloud platform 2 etc..Submodule 222 is fed back, is confirmed whether that receiving printing sets for timing The heartbeat packet that standby embedded module 23 is sended over(That is monitoring data of 3D printing model file), judge the monitoring in print procedure Whether data occur abnormal and abnormal conditions are fed back into mobile phone, so that user checks.Submodule 223 is encrypted, it is local to user The 3D printing model file of upload is encrypted, and AES includes symmetry encryption and asymmetry encryption, wherein symmetry AES can generate unique key for 3D printing each time according to current time stamp, and then 3D is beaten according to unique key Print model file is encrypted or decrypted;And asymmetry AES is then carried out plus solved to 3D printing model file according to key It is close, 3D printing model file is encrypted by public-key cryptography, is decrypted by private cipher key pair 3D printing model file, Key is every to be regenerated once to prevent from being cracked at regular intervals.File submodule 224, for showing 3D printing model 3D printing model file on file or downloading data storehouse 24.
In use, user is logged on mobile phone and using after 3D printing cloud platform 2, user just can be by using family module 21 Upload submodule 213 its 3D printing model file selected is locally uploaded to 3D printing cloud platform 2, then upload submodule 213 initiate print request to printing submodule 214, and printing submodule 214 is received to be responded after print request, and returns to blank Printing configuration form give user complete.User is completed after printing configuration information by printing submodule 214, prints submodule 214 send the request in the background data base for uploading files to 3D printing cloud platform 2 to upload submodule 213(Referred to as upload text Part is asked), and send payment information to submodule 215 is paid.Upload submodule 213 to receive after upload file request, first File encryption request is initiated to management and control module 22, the file uploaded by management and control module 22 to user is carried out again after being encrypted Upload operation.Specifically, with reference to Fig. 3, upload encryption submodule 223 of the submodule 213 to management and control module 22 of line module 21 Initiation file encryption request, encrypts return encryption completion information after file is encrypted submodule 223 and gives upload submodule 213.Wherein, AES can be that symmetry encryption can also be asymmetry encryption, and symmetry AES is each time Obtained during 3D printing the current time stamp of 3D printing cloud platform 2, generated using timestamp and a Fixed constant unique New key, symmetric cryptography then is carried out to transmission file using new key and obtains ciphertext, then by Xinmi City after ciphertext and encryption Key is transferred to Terminal Server Client(Decryption side), 3D printing model file is decrypted according to new key Terminal Server Client.Rather than Though symmetry AES is also then to carry out encryption and decryption to 3D printing model file according to key, it is by private cipher key pair 3D printing model file, which is encrypted, obtains ciphertext, and ciphertext then is transferred into Terminal Server Client(Decryption side), Terminal Server Client 3D printing model file is decrypted according to the public-key cryptography corresponding with private cipher key, it is every to public-key cryptography and private cipher key It can regenerate once to prevent from being cracked at regular intervals.The initial default of 3D printing cloud platform 2 adds from symmetry at random A kind of AES is selected in the encryption of close and asymmetry, administrative staff can be set using symmetry encryption by management and control module 22 Algorithm or asymmetry AES.It is worth noting that ciphering process is nontransparent for user, i.e., user can not obtain Know the idiographic flow of encryption.
Encrypt successfully and pay after submodule 215 confirms that user pays successfully, configuration information will be printed by printing submodule 214 It is sent to management and control module 22 and carries out 3D printing preparation.After printing starts, user can check 3D by user management submodule 211 The monitoring data of printing device 3.Specifically, the printing submodule 214 of line module 21 is sent to management and control by configuration information is printed The local management submodule 221 of module 22, local management submodule 221 is received the 3D printing of encryption after printing configuration information Model file is sent to the printing device insertion module 23 being embedded into 3D printing equipment 3.Printing device insertion module 23 is correct After the 3D printing model file for receiving encryption, then decoding request is sent to printing device insertion module by management and control module 22 again 23 decryption submodule 233, the 3D printing model file in 3D printing equipment 3 is decrypted by decryption submodule 233.Decryption After the completion of decryption submodule 233 to management and control module 22 return decryption complete information.After the completion of decryption, management and control module 22 is set to printing The print management submodule 231 of standby embedded module 23 initiates printing and starts request, and 3D is proceeded by by print management submodule 231 Printing.From printing device be embedded in module 23 receive the 3D printing model file of encryption completes to 3D printing this during, The monitoring submodule 232 of printing device insertion module 23 monitors the decrypting process and print procedure of 3D printing model file in real time, And the image of the residing external environment condition of 3D printing equipment 3 is obtained by the camera being embedded in 3D printing equipment 3(It is referred to as real When influence), so as to obtain monitoring data, then timing is sent out in the form of heartbeat packet to the feedback submodule 222 of management and control module 22 Send monitoring data.It is worth noting that, receiving the 3D printing model file of encryption to 3D being embedded in module 23 from printing device During this of printing completion, if the behavior being stolen without generation 3D printing model file, the processor of 3D printing equipment 3 The task of middle execution should be task of decryption, print out task and shooting task three, if there occurs, 3D printing model file is stolen The behavior taken, then the processor of 3D printing equipment 3 will be in extra one data theft of increase on the basis of three tasks originally Task.In addition, obtain the image of the external environment condition of 3D printing equipment 3 by the camera that is embedded in 3D printing equipment 3, from Printing device insertion module 23 receive the 3D printing model file of encryption completed to 3D printing this during, monitor whether Someone carries out digital independent from the hardware of 3D printing equipment 3, so that user or administrative staff trace.
With reference to Fig. 4, the feedback timing of submodule 222 is confirmed whether to receive the heartbeat packet that printing device insertion module 23 is sent (That is monitoring data of 3D printing model file), then judge whether the monitoring data received occur exception, will be different if having Reason condition feeds back to mobile phone, and is shown by file submodule 224 so that user checks, if the attonity without if.Specifically, Feedback submodule 222 is opened and resetted after the timer built in it, and used timer carries out timing, then regularly checks whether to connect Heartbeat packet is received, implements alarm operation if time-out is received, i.e., sends abnormal verification data bag to monitoring submodule 232, then Alarmed to line module 21, Off Timer finally receives and preserved the Real Time Effect of 3D printing equipment 3, for management Personnel trace.Timer resets reclocking if heartbeat packet is received on time, then counts in heartbeat packet in the set time Data volume(Ping values), judge whether data volume is abnormal, if then implementing alarm operation, if otherwise further obtaining in heartbeat packet 3D printing equipment 3 Real Time Effect, Real Time Effect is contrasted with historical influence, alarmed if Real Time Effect is abnormal, it is no Then send to monitoring submodule 232 and send normal verification packet, it is normal to explain the situation.It should be noted that 3D printing is set Standby 3 in normal print(3D printing model file is not sent to be stolen)When, the task quantity of its computing device is fixed , therefore the amount of monitoring data in the set time in heartbeat packet is namely fixed, when taking and carring away occurs, processor by Virus or other reasonses influence, additionally increase can steal task, this adds increased the task quantity of computing device so that fixed The amount of monitoring data in time in heartbeat packet is changed, and is for example illustrated here, it is assumed that processor is in the unit interval Inside only carry out two tasks of A ~ B(Each task execution time decile), wherein A tasks are task of decryption, and now A tasks are held The row time be 1/2, if additionally having added C tasks, now the execution time of A tasks just shorten to 1/3, the execution time shortens, Its data volume decrypted also just is reduced, and is ultimately resulted in the data volume in heartbeat packet in the set time and is also reduced, as long as therefore sentencing Data volume in disconnected heartbeat packet in the set time(Ping values)Whether change can judge whether there is abnormal conditions. It is of course also possible to use judging to print the mode that whether changes of duration to determine whether abnormal conditions.Also need Bright, in print procedure, camera is being recorded a video always, is stopped if monitoring submodule 232 receives abnormal verification data bag Print job, and control the video recording in camera to be uploaded.By such monitoring feedback means, whole monitoring in real time is realized 3D printing equipment 3, it is ensured that the safety of 3D printing model file during 3D printing.
Embodiment 2
Embodiment 2 is that on the basis of embodiment 1, the mode that 3D printing cloud center is obtained into 3D printing model file becomes user 3D printing cloud platform 2 is manipulated on mobile phone, 3D printing cloud platform 2 is downloaded user in the database 24 of its own by web Selected 3D printing model file.Specifically, user initiates print request to printing submodule 214, and printing submodule 214 is received Responded after to print request, and return to the printing configuration form of blank and completed to user.User is by printing submodule 214 Complete after printing configuration information, printing submodule 214 sends payment information to submodule 215 is paid.Pay submodule 215 true Recognize after user pays successfully, printing submodule 214, which will print configuration information and be sent to management and control module 22, carries out 3D printing preparation.Pipe Control the 3D printing model file that module 22 asks user to select by file submodule 224 to database 24, file submodule 224 Downloaded from database 24 after 3D printing model file, sent file encryption request to encryption submodule 223, encrypt submodule 223 pairs of files return to encryption and complete information to file submodule 224 after being encrypted.
The method used for the invention, can be combined into functional module construction, by depositing by setting up functional module Computer program in a computer-readable storage medium is stored up to implement.
Finally it should be noted that above example is only to the technical scheme for illustrating the invention, rather than to this hair It is bright create protection domain limitation, although being explained with reference to preferred embodiment to the invention, this area it is general Lead to it will be appreciated by the skilled person that can be modified to the technical scheme of the invention or equivalent substitution, without departing from this The spirit and scope of innovation and creation technical scheme.

Claims (10)

1. cloud print service management method, including:
Receive step, receive the print request of user;
3D printing model file to be printed, is issued 3D printing equipment by dispatch step;
It is characterized in that also including:
The encrypting step performed before dispatch step, the 3D printing model file is encrypted;
Order step, order 3D printing equipment is printed after decrypting the 3D printing model file;
Step is monitored, the decrypting process and/or print procedure of 3D printing equipment is monitored.
2. cloud print service management method as claimed in claim 1, it is characterized in that:Monitor in step, monitor 3D printing equipment Decrypting process and/or print procedure be specially monitoring 3D printing equipment itself in the process running situation.
3. cloud print service management method as claimed in claim 1, it is characterized in that:Monitor in step, monitor 3D printing equipment Decrypting process and/or print procedure be specially monitoring 3D printing equipment local environment in the process real-time imaging.
4. cloud print service management method as claimed in claim 1, it is characterized in that:Also include feedback step, if it finds quilt The process of monitoring occurs that the exception of 3D printing model file may be leaked, then sends alarm.
5. cloud print service management method as claimed in claim 4, it is characterized in that:In feedback step, abnormal judgement is specific To analyze the amount that the data acquired in 3D printing model file are monitored within the set time, sentence if the amount changes more in the past Break to have exception.
6. cloud print service management method as claimed in claim 5, it is characterized in that:In feedback step, the mode of change is specific It is to monitor that the amount of the data acquired in 3D printing model file was fewer within the set time.
7. cloud print service managing device, it is characterized in that including:Computer-readable recording medium, has computer program, operation The computer program makes system perform claim require the cloud print service management method described in 1~6 any one.
8.3D printing devices, including 3D printer, it is characterized in that:Also include the camera electrically connected with 3D printer, camera Absorb the real-time imaging of 3D printer local environment and Real Time Effect is transferred to 3D printer, 3D printer passes through web handles Real Time Effect is uploaded to high in the clouds.
9.3D printing devices, it is characterized in that there being computer program, running the computer program makes the execution of this 3D printing device as follows Method:Printed after the 3D printing model file for decrypting the encryption from high in the clouds, and by the decrypted of 3D printing model file Journey and/or print procedure are uploaded to high in the clouds.
10.3D prints burglary-resisting system, including described in cloud print service managing device and claim 8 or 9 described in claim 7 3D printing equipment.
CN201710244842.5A 2017-04-14 2017-04-14 Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system Pending CN107133523A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710244842.5A CN107133523A (en) 2017-04-14 2017-04-14 Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710244842.5A CN107133523A (en) 2017-04-14 2017-04-14 Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system

Publications (1)

Publication Number Publication Date
CN107133523A true CN107133523A (en) 2017-09-05

Family

ID=59716267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710244842.5A Pending CN107133523A (en) 2017-04-14 2017-04-14 Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system

Country Status (1)

Country Link
CN (1) CN107133523A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108132761A (en) * 2017-10-30 2018-06-08 广州康科信息科技有限公司 A kind of system and method for realizing 3D scanning modelings and remote printing
CN108650208A (en) * 2018-03-05 2018-10-12 西安理工大学 A kind of construction method of the cloud print service platform of personal document's safe transmission
CN108638505A (en) * 2018-04-23 2018-10-12 天津市志捷科技股份有限公司 A kind of 3D printer with remote auto warning function
CN108848128A (en) * 2018-05-19 2018-11-20 济南浪潮高新科技投资发展有限公司 A kind of system remotely controlling intelligent 3D printer equipment by platform of internet of things
CN109634541A (en) * 2018-12-06 2019-04-16 中国船舶重工集团公司第七0七研究所 A kind of Printer Information method for safety monitoring based on trust computing
CN111070662A (en) * 2019-12-04 2020-04-28 武汉市贝恩三维科技有限公司 3D printing method, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103747101A (en) * 2014-01-23 2014-04-23 上海骧远信息科技有限公司 Cloud-based 3D (three-dimensional) printing system and method
WO2016100126A1 (en) * 2014-12-16 2016-06-23 Ebay Inc. Digital rights management in 3d printing
CN105912941A (en) * 2016-05-27 2016-08-31 海尔集团技术研发中心 3D (Three-dimensional) printing method and system based on stream transmission technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103747101A (en) * 2014-01-23 2014-04-23 上海骧远信息科技有限公司 Cloud-based 3D (three-dimensional) printing system and method
WO2016100126A1 (en) * 2014-12-16 2016-06-23 Ebay Inc. Digital rights management in 3d printing
CN105912941A (en) * 2016-05-27 2016-08-31 海尔集团技术研发中心 3D (Three-dimensional) printing method and system based on stream transmission technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
章峻等: "《3D打印》", 31 May 2016, 南京师范大学出版社 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108132761A (en) * 2017-10-30 2018-06-08 广州康科信息科技有限公司 A kind of system and method for realizing 3D scanning modelings and remote printing
CN108650208A (en) * 2018-03-05 2018-10-12 西安理工大学 A kind of construction method of the cloud print service platform of personal document's safe transmission
CN108638505A (en) * 2018-04-23 2018-10-12 天津市志捷科技股份有限公司 A kind of 3D printer with remote auto warning function
CN108848128A (en) * 2018-05-19 2018-11-20 济南浪潮高新科技投资发展有限公司 A kind of system remotely controlling intelligent 3D printer equipment by platform of internet of things
CN109634541A (en) * 2018-12-06 2019-04-16 中国船舶重工集团公司第七0七研究所 A kind of Printer Information method for safety monitoring based on trust computing
CN109634541B (en) * 2018-12-06 2022-06-10 中国船舶重工集团公司第七0七研究所 Printer information security monitoring method based on trusted computing
CN111070662A (en) * 2019-12-04 2020-04-28 武汉市贝恩三维科技有限公司 3D printing method, equipment and storage medium
CN111070662B (en) * 2019-12-04 2022-06-21 武汉市贝恩三维科技有限公司 3D printing method, device and storage medium

Similar Documents

Publication Publication Date Title
CN107133523A (en) Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system
CN107251035B (en) Account recovery protocol
US8930700B2 (en) Remote device secure data file storage system and method
CN106104562B (en) System and method for securely storing and recovering confidential data
EP3047601B1 (en) Technologies for synchronizing and restoring reference templates
CN101430751B (en) Data management apparatus and data management method
JP6976949B2 (en) Methods and systems for key distribution between servers and medical devices
US20170091463A1 (en) Secure Audit Logging
CN111447414B (en) Video monitoring system and method convenient to dispatch and monitor
CN106790045B (en) distributed virtual machine agent device based on cloud environment and data integrity guarantee method
JP2003501877A (en) Method and apparatus for secure distribution of public / private key pairs
CN108521393A (en) Data interactive method, device, system, computer equipment and storage medium
CN111628861A (en) Object sharing system and method
CN110300287A (en) A kind of public safety video monitoring networking camera access authentication method
CN110557367B (en) Secret key updating method and system for quantum computing secure communication resistance based on certificate cryptography
CN112989320B (en) User state management system and method for password equipment
CN112751800B (en) Authentication method and device
JP2006115083A (en) Regular content confirming method
KR101205738B1 (en) Authentication method by generating and photographing image and electronic device using the same
CN108932425B (en) Offline identity authentication method, authentication system and authentication equipment
CN114338201B (en) Data processing method and device, electronic equipment and storage medium
CN110139163A (en) A kind of method and relevant apparatus obtaining barrage
CN109379190A (en) Method for distributing key, device, computer equipment and storage medium
CN109922042B (en) Method and system for managing sub-keys of lost equipment
CN111523154B (en) Method and system for obtaining hardware unique identifier and corresponding computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170905