CN107133523A - Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system - Google Patents
Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system Download PDFInfo
- Publication number
- CN107133523A CN107133523A CN201710244842.5A CN201710244842A CN107133523A CN 107133523 A CN107133523 A CN 107133523A CN 201710244842 A CN201710244842 A CN 201710244842A CN 107133523 A CN107133523 A CN 107133523A
- Authority
- CN
- China
- Prior art keywords
- printing
- model file
- printing equipment
- print service
- management method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Abstract
The invention is related to 3D printing burglary-resisting system and wherein 3D printing equipment, further relate to the cloud print service management method in system, this method can be by setting up functional module, it is combined into functional module construction, implemented by storing computer program in a computer-readable storage medium, wherein it is encrypted after obtaining 3D printing model file for 3D printing cloud platform, the 3D printing model file after encryption is transferred in 3D printing equipment by web again and is decrypted, 3D printing equipment is printed according to the 3D printing model file after decryption, during printing, 3D printing cloud platform monitors the trend particularly data flow of the 3D printing model file in 3D printing equipment in real time, so as to learn the risk that 3D printing model file is stolen during transmission or printing.
Description
Technical field
The invention is related to 3D printing burglary-resisting system and wherein 3D printing equipment, further relates to the cloud print service in system
Management method, this method can be combined into functional module construction by setting up functional module, by being stored in computer-readable storage
Computer program in medium is implemented.
Background technology
At present, because the cost of large-scale 3D printing equipment is higher, generally user need to use third-party 3D printing
Factory or facility carry out 3D printing making, and this has just derived 3D printing cloud platform.In 3D printing cloud platform, user uploads 3D
Printer model file or by pay expense obtain 3D model libraries in 3D printing model file after, 3D printing cloud platform will be controlled
3D printing equipment processed is printed to the 3D printing model file that user selects, but this mode is transmitted in 3D printing cloud platform
3D printing model file is to during 3D printing equipment, or even during 3D printing equipment is printed, 3D printing model text
Part is easy to be stolen by people.As long as and anyone gets 3D printing model file, it is possible to other people original setting of complete copy
Meter, causes the cost for plagiarizing fraud very cheap, plagiarizes the phenomenon faked frequent.
The content of the invention
The purpose of the invention is the wind for learning that 3D printing model file is stolen during transmission or printing
Danger.
The purpose of the invention is achieved through the following technical solutions:
A kind of cloud print service management method is provided, including:
Receive step, receive the print request of user;
3D printing model file to be printed, is issued 3D printing equipment by dispatch step;Also include:
The encrypting step run before dispatch step, the 3D printing model file is encrypted;
Order step, order 3D printing equipment is printed after decrypting the 3D printing model file;
The monitoring step run after step of ordering, monitors the decrypting process and/or print procedure of 3D printing equipment.
For the file theft preventing method of 3D printing cloud platform, functional module structure can be combined into by setting up functional module
Frame, is implemented by storing computer program in a computer-readable storage medium.
A kind of 3D printing equipment, including 3D printer, in addition to the camera electrically connected with 3D printer are also provided, imaged
Real Time Effect is simultaneously transferred to 3D printer by the Real Time Effect of head intake 3D printer, and 3D printer is by web Real Time Effect
It is uploaded to high in the clouds.The 3D printing equipment has computer program, and running the computer program makes this 3D printing device perform such as lower section
Method:Printed after the 3D printing model file for decrypting the encryption from high in the clouds, and by the decrypting process of 3D printing model file
And/or print procedure is uploaded to high in the clouds.The 3D printing equipment absorbs 3D printing by the camera electrically connected with 3D printer
Real Time Effect is uploaded to high in the clouds or 3D printing cloud platform by the Real Time Effect of machine, 3D printer by web, makes user or work people
Member can be to 3D printer in 3D printing model file print procedure external environment condition monitor.
A kind of 3D printing burglary-resisting system is also provided, including above-mentioned cloud print service managing device and above-mentioned 3D printing are set
It is standby.
In the invention, it is encrypted after obtaining 3D printing model file for 3D printing cloud platform, then encryption
3D printing model file afterwards is transferred in 3D printing equipment by web and is decrypted, and 3D printing equipment is by 3D printing cloud platform
Control according to the 3D printing model file after decryption so as to be printed, and during printing, 3D printing cloud platform is supervised in real time
Depending on the trend particularly data flow of the 3D printing model file in 3D printing equipment, so as to learn 3D printing model file in biography
The risk being stolen during defeated or printing.
Brief description of the drawings
The invention is described further using accompanying drawing, but the embodiment in accompanying drawing is not constituted to the invention
Any limitation, on the premise of not paying creative work, can also be according to following attached for one of ordinary skill in the art
Figure obtains other accompanying drawings.
Fig. 1 is the structural representation of 3D printing system.
Fig. 2 is the Organization Chart of 3D printing cloud platform.
Flow chart when Fig. 3 is encryption submodule operation.
Fig. 4 carries out flow chart during monitoring feedback for feedback submodule.
Embodiment
The invention is described in further detail with the following Examples.
Embodiment 1
Fig. 1 is the structural representation of the 3D printing system based on web.User is in mobile terminal 1s such as mobile phone, computer, tablet personal computers
Upper to log in 3D printing cloud platform 2 by web, 3D printing equipment 3 logs in 3D printing cloud platform 2,3D printing cloud center also by web
2 are encrypted and communicated with mobile terminal 1 and 3D printing equipment 3 respectively by web.For convenience of description, herein, mobile terminal
1 by taking mobile phone as an example.
Fig. 2 is the Organization Chart of 3D printing cloud platform 2, and it is divided into line module 21, management and control module 22, printing device insertion mould
24 4 parts of block 23 and database, wherein:
--- database 24 mainly stores user profile, 3D printing facility information and 3D printing model file etc..
--- line module 21 is mainly divided into five submodules, including:User management submodule 211, for user's pipe
Manage and monitor all print progress, including ongoing print progress and history print progress etc..Submodule 212 is logged in, is used
In user or keeper's login, registration.Submodule 213 is uploaded, the 3D printing model file for user to be selected locally is uploaded
To 3D printing cloud platform 2.Submodule 214 is printed, print request is carried out for user and printing is configured.Submodule 215 is paid, is used
Carry out paying printing expense in user.
--- printing device insertion module 23 is embedded into the 3D printing equipment 3 for having logged in 3D printing cloud platform 2, main to draw
It is divided into three submodules, including:Print management submodule 231, for managing the printing configuration flow of 3D printing cloud platform 2 and beating
Print operation etc..Submodule 232 is monitored, the flow direction of data, printing after the decrypting process of monitoring 3D printing model file, decryption in real time
Process and the institute of 3D printing equipment 3 is obtained by the camera being embedded in 3D printing equipment 3 that equipment utilization data are printed
Locate the Real Time Effect of environment(Herein to the data of decrypting process, the flow direction of data, the data of print procedure and Real Time Effect
Set referred to as monitoring data), and timing will monitor data to be sent in the form of heartbeat packet in management and control module 22.Decrypt submodule
233, the 3D printing model file after encryption is transferred in 3D printing equipment 3 by web, and to 3D in 3D printing equipment 3
Operation is decrypted in printer model file.
--- management and control module 22 is mainly divided into four submodules, including:Local management submodule 221, for managing 3D
Print printing flow and print queue of cloud platform 2 etc..Submodule 222 is fed back, is confirmed whether that receiving printing sets for timing
The heartbeat packet that standby embedded module 23 is sended over(That is monitoring data of 3D printing model file), judge the monitoring in print procedure
Whether data occur abnormal and abnormal conditions are fed back into mobile phone, so that user checks.Submodule 223 is encrypted, it is local to user
The 3D printing model file of upload is encrypted, and AES includes symmetry encryption and asymmetry encryption, wherein symmetry
AES can generate unique key for 3D printing each time according to current time stamp, and then 3D is beaten according to unique key
Print model file is encrypted or decrypted;And asymmetry AES is then carried out plus solved to 3D printing model file according to key
It is close, 3D printing model file is encrypted by public-key cryptography, is decrypted by private cipher key pair 3D printing model file,
Key is every to be regenerated once to prevent from being cracked at regular intervals.File submodule 224, for showing 3D printing model
3D printing model file on file or downloading data storehouse 24.
In use, user is logged on mobile phone and using after 3D printing cloud platform 2, user just can be by using family module 21
Upload submodule 213 its 3D printing model file selected is locally uploaded to 3D printing cloud platform 2, then upload submodule
213 initiate print request to printing submodule 214, and printing submodule 214 is received to be responded after print request, and returns to blank
Printing configuration form give user complete.User is completed after printing configuration information by printing submodule 214, prints submodule
214 send the request in the background data base for uploading files to 3D printing cloud platform 2 to upload submodule 213(Referred to as upload text
Part is asked), and send payment information to submodule 215 is paid.Upload submodule 213 to receive after upload file request, first
File encryption request is initiated to management and control module 22, the file uploaded by management and control module 22 to user is carried out again after being encrypted
Upload operation.Specifically, with reference to Fig. 3, upload encryption submodule 223 of the submodule 213 to management and control module 22 of line module 21
Initiation file encryption request, encrypts return encryption completion information after file is encrypted submodule 223 and gives upload submodule
213.Wherein, AES can be that symmetry encryption can also be asymmetry encryption, and symmetry AES is each time
Obtained during 3D printing the current time stamp of 3D printing cloud platform 2, generated using timestamp and a Fixed constant unique
New key, symmetric cryptography then is carried out to transmission file using new key and obtains ciphertext, then by Xinmi City after ciphertext and encryption
Key is transferred to Terminal Server Client(Decryption side), 3D printing model file is decrypted according to new key Terminal Server Client.Rather than
Though symmetry AES is also then to carry out encryption and decryption to 3D printing model file according to key, it is by private cipher key pair
3D printing model file, which is encrypted, obtains ciphertext, and ciphertext then is transferred into Terminal Server Client(Decryption side), Terminal Server Client
3D printing model file is decrypted according to the public-key cryptography corresponding with private cipher key, it is every to public-key cryptography and private cipher key
It can regenerate once to prevent from being cracked at regular intervals.The initial default of 3D printing cloud platform 2 adds from symmetry at random
A kind of AES is selected in the encryption of close and asymmetry, administrative staff can be set using symmetry encryption by management and control module 22
Algorithm or asymmetry AES.It is worth noting that ciphering process is nontransparent for user, i.e., user can not obtain
Know the idiographic flow of encryption.
Encrypt successfully and pay after submodule 215 confirms that user pays successfully, configuration information will be printed by printing submodule 214
It is sent to management and control module 22 and carries out 3D printing preparation.After printing starts, user can check 3D by user management submodule 211
The monitoring data of printing device 3.Specifically, the printing submodule 214 of line module 21 is sent to management and control by configuration information is printed
The local management submodule 221 of module 22, local management submodule 221 is received the 3D printing of encryption after printing configuration information
Model file is sent to the printing device insertion module 23 being embedded into 3D printing equipment 3.Printing device insertion module 23 is correct
After the 3D printing model file for receiving encryption, then decoding request is sent to printing device insertion module by management and control module 22 again
23 decryption submodule 233, the 3D printing model file in 3D printing equipment 3 is decrypted by decryption submodule 233.Decryption
After the completion of decryption submodule 233 to management and control module 22 return decryption complete information.After the completion of decryption, management and control module 22 is set to printing
The print management submodule 231 of standby embedded module 23 initiates printing and starts request, and 3D is proceeded by by print management submodule 231
Printing.From printing device be embedded in module 23 receive the 3D printing model file of encryption completes to 3D printing this during,
The monitoring submodule 232 of printing device insertion module 23 monitors the decrypting process and print procedure of 3D printing model file in real time,
And the image of the residing external environment condition of 3D printing equipment 3 is obtained by the camera being embedded in 3D printing equipment 3(It is referred to as real
When influence), so as to obtain monitoring data, then timing is sent out in the form of heartbeat packet to the feedback submodule 222 of management and control module 22
Send monitoring data.It is worth noting that, receiving the 3D printing model file of encryption to 3D being embedded in module 23 from printing device
During this of printing completion, if the behavior being stolen without generation 3D printing model file, the processor of 3D printing equipment 3
The task of middle execution should be task of decryption, print out task and shooting task three, if there occurs, 3D printing model file is stolen
The behavior taken, then the processor of 3D printing equipment 3 will be in extra one data theft of increase on the basis of three tasks originally
Task.In addition, obtain the image of the external environment condition of 3D printing equipment 3 by the camera that is embedded in 3D printing equipment 3, from
Printing device insertion module 23 receive the 3D printing model file of encryption completed to 3D printing this during, monitor whether
Someone carries out digital independent from the hardware of 3D printing equipment 3, so that user or administrative staff trace.
With reference to Fig. 4, the feedback timing of submodule 222 is confirmed whether to receive the heartbeat packet that printing device insertion module 23 is sent
(That is monitoring data of 3D printing model file), then judge whether the monitoring data received occur exception, will be different if having
Reason condition feeds back to mobile phone, and is shown by file submodule 224 so that user checks, if the attonity without if.Specifically,
Feedback submodule 222 is opened and resetted after the timer built in it, and used timer carries out timing, then regularly checks whether to connect
Heartbeat packet is received, implements alarm operation if time-out is received, i.e., sends abnormal verification data bag to monitoring submodule 232, then
Alarmed to line module 21, Off Timer finally receives and preserved the Real Time Effect of 3D printing equipment 3, for management
Personnel trace.Timer resets reclocking if heartbeat packet is received on time, then counts in heartbeat packet in the set time
Data volume(Ping values), judge whether data volume is abnormal, if then implementing alarm operation, if otherwise further obtaining in heartbeat packet
3D printing equipment 3 Real Time Effect, Real Time Effect is contrasted with historical influence, alarmed if Real Time Effect is abnormal, it is no
Then send to monitoring submodule 232 and send normal verification packet, it is normal to explain the situation.It should be noted that 3D printing is set
Standby 3 in normal print(3D printing model file is not sent to be stolen)When, the task quantity of its computing device is fixed
, therefore the amount of monitoring data in the set time in heartbeat packet is namely fixed, when taking and carring away occurs, processor by
Virus or other reasonses influence, additionally increase can steal task, this adds increased the task quantity of computing device so that fixed
The amount of monitoring data in time in heartbeat packet is changed, and is for example illustrated here, it is assumed that processor is in the unit interval
Inside only carry out two tasks of A ~ B(Each task execution time decile), wherein A tasks are task of decryption, and now A tasks are held
The row time be 1/2, if additionally having added C tasks, now the execution time of A tasks just shorten to 1/3, the execution time shortens,
Its data volume decrypted also just is reduced, and is ultimately resulted in the data volume in heartbeat packet in the set time and is also reduced, as long as therefore sentencing
Data volume in disconnected heartbeat packet in the set time(Ping values)Whether change can judge whether there is abnormal conditions.
It is of course also possible to use judging to print the mode that whether changes of duration to determine whether abnormal conditions.Also need
Bright, in print procedure, camera is being recorded a video always, is stopped if monitoring submodule 232 receives abnormal verification data bag
Print job, and control the video recording in camera to be uploaded.By such monitoring feedback means, whole monitoring in real time is realized
3D printing equipment 3, it is ensured that the safety of 3D printing model file during 3D printing.
Embodiment 2
Embodiment 2 is that on the basis of embodiment 1, the mode that 3D printing cloud center is obtained into 3D printing model file becomes user
3D printing cloud platform 2 is manipulated on mobile phone, 3D printing cloud platform 2 is downloaded user in the database 24 of its own by web
Selected 3D printing model file.Specifically, user initiates print request to printing submodule 214, and printing submodule 214 is received
Responded after to print request, and return to the printing configuration form of blank and completed to user.User is by printing submodule 214
Complete after printing configuration information, printing submodule 214 sends payment information to submodule 215 is paid.Pay submodule 215 true
Recognize after user pays successfully, printing submodule 214, which will print configuration information and be sent to management and control module 22, carries out 3D printing preparation.Pipe
Control the 3D printing model file that module 22 asks user to select by file submodule 224 to database 24, file submodule 224
Downloaded from database 24 after 3D printing model file, sent file encryption request to encryption submodule 223, encrypt submodule
223 pairs of files return to encryption and complete information to file submodule 224 after being encrypted.
The method used for the invention, can be combined into functional module construction, by depositing by setting up functional module
Computer program in a computer-readable storage medium is stored up to implement.
Finally it should be noted that above example is only to the technical scheme for illustrating the invention, rather than to this hair
It is bright create protection domain limitation, although being explained with reference to preferred embodiment to the invention, this area it is general
Lead to it will be appreciated by the skilled person that can be modified to the technical scheme of the invention or equivalent substitution, without departing from this
The spirit and scope of innovation and creation technical scheme.
Claims (10)
1. cloud print service management method, including:
Receive step, receive the print request of user;
3D printing model file to be printed, is issued 3D printing equipment by dispatch step;
It is characterized in that also including:
The encrypting step performed before dispatch step, the 3D printing model file is encrypted;
Order step, order 3D printing equipment is printed after decrypting the 3D printing model file;
Step is monitored, the decrypting process and/or print procedure of 3D printing equipment is monitored.
2. cloud print service management method as claimed in claim 1, it is characterized in that:Monitor in step, monitor 3D printing equipment
Decrypting process and/or print procedure be specially monitoring 3D printing equipment itself in the process running situation.
3. cloud print service management method as claimed in claim 1, it is characterized in that:Monitor in step, monitor 3D printing equipment
Decrypting process and/or print procedure be specially monitoring 3D printing equipment local environment in the process real-time imaging.
4. cloud print service management method as claimed in claim 1, it is characterized in that:Also include feedback step, if it finds quilt
The process of monitoring occurs that the exception of 3D printing model file may be leaked, then sends alarm.
5. cloud print service management method as claimed in claim 4, it is characterized in that:In feedback step, abnormal judgement is specific
To analyze the amount that the data acquired in 3D printing model file are monitored within the set time, sentence if the amount changes more in the past
Break to have exception.
6. cloud print service management method as claimed in claim 5, it is characterized in that:In feedback step, the mode of change is specific
It is to monitor that the amount of the data acquired in 3D printing model file was fewer within the set time.
7. cloud print service managing device, it is characterized in that including:Computer-readable recording medium, has computer program, operation
The computer program makes system perform claim require the cloud print service management method described in 1~6 any one.
8.3D printing devices, including 3D printer, it is characterized in that:Also include the camera electrically connected with 3D printer, camera
Absorb the real-time imaging of 3D printer local environment and Real Time Effect is transferred to 3D printer, 3D printer passes through web handles
Real Time Effect is uploaded to high in the clouds.
9.3D printing devices, it is characterized in that there being computer program, running the computer program makes the execution of this 3D printing device as follows
Method:Printed after the 3D printing model file for decrypting the encryption from high in the clouds, and by the decrypted of 3D printing model file
Journey and/or print procedure are uploaded to high in the clouds.
10.3D prints burglary-resisting system, including described in cloud print service managing device and claim 8 or 9 described in claim 7
3D printing equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710244842.5A CN107133523A (en) | 2017-04-14 | 2017-04-14 | Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710244842.5A CN107133523A (en) | 2017-04-14 | 2017-04-14 | Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107133523A true CN107133523A (en) | 2017-09-05 |
Family
ID=59716267
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710244842.5A Pending CN107133523A (en) | 2017-04-14 | 2017-04-14 | Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107133523A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108132761A (en) * | 2017-10-30 | 2018-06-08 | 广州康科信息科技有限公司 | A kind of system and method for realizing 3D scanning modelings and remote printing |
CN108650208A (en) * | 2018-03-05 | 2018-10-12 | 西安理工大学 | A kind of construction method of the cloud print service platform of personal document's safe transmission |
CN108638505A (en) * | 2018-04-23 | 2018-10-12 | 天津市志捷科技股份有限公司 | A kind of 3D printer with remote auto warning function |
CN108848128A (en) * | 2018-05-19 | 2018-11-20 | 济南浪潮高新科技投资发展有限公司 | A kind of system remotely controlling intelligent 3D printer equipment by platform of internet of things |
CN109634541A (en) * | 2018-12-06 | 2019-04-16 | 中国船舶重工集团公司第七0七研究所 | A kind of Printer Information method for safety monitoring based on trust computing |
CN111070662A (en) * | 2019-12-04 | 2020-04-28 | 武汉市贝恩三维科技有限公司 | 3D printing method, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103747101A (en) * | 2014-01-23 | 2014-04-23 | 上海骧远信息科技有限公司 | Cloud-based 3D (three-dimensional) printing system and method |
WO2016100126A1 (en) * | 2014-12-16 | 2016-06-23 | Ebay Inc. | Digital rights management in 3d printing |
CN105912941A (en) * | 2016-05-27 | 2016-08-31 | 海尔集团技术研发中心 | 3D (Three-dimensional) printing method and system based on stream transmission technology |
-
2017
- 2017-04-14 CN CN201710244842.5A patent/CN107133523A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103747101A (en) * | 2014-01-23 | 2014-04-23 | 上海骧远信息科技有限公司 | Cloud-based 3D (three-dimensional) printing system and method |
WO2016100126A1 (en) * | 2014-12-16 | 2016-06-23 | Ebay Inc. | Digital rights management in 3d printing |
CN105912941A (en) * | 2016-05-27 | 2016-08-31 | 海尔集团技术研发中心 | 3D (Three-dimensional) printing method and system based on stream transmission technology |
Non-Patent Citations (1)
Title |
---|
章峻等: "《3D打印》", 31 May 2016, 南京师范大学出版社 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108132761A (en) * | 2017-10-30 | 2018-06-08 | 广州康科信息科技有限公司 | A kind of system and method for realizing 3D scanning modelings and remote printing |
CN108650208A (en) * | 2018-03-05 | 2018-10-12 | 西安理工大学 | A kind of construction method of the cloud print service platform of personal document's safe transmission |
CN108638505A (en) * | 2018-04-23 | 2018-10-12 | 天津市志捷科技股份有限公司 | A kind of 3D printer with remote auto warning function |
CN108848128A (en) * | 2018-05-19 | 2018-11-20 | 济南浪潮高新科技投资发展有限公司 | A kind of system remotely controlling intelligent 3D printer equipment by platform of internet of things |
CN109634541A (en) * | 2018-12-06 | 2019-04-16 | 中国船舶重工集团公司第七0七研究所 | A kind of Printer Information method for safety monitoring based on trust computing |
CN109634541B (en) * | 2018-12-06 | 2022-06-10 | 中国船舶重工集团公司第七0七研究所 | Printer information security monitoring method based on trusted computing |
CN111070662A (en) * | 2019-12-04 | 2020-04-28 | 武汉市贝恩三维科技有限公司 | 3D printing method, equipment and storage medium |
CN111070662B (en) * | 2019-12-04 | 2022-06-21 | 武汉市贝恩三维科技有限公司 | 3D printing method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107133523A (en) | Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system | |
CN107251035B (en) | Account recovery protocol | |
US8930700B2 (en) | Remote device secure data file storage system and method | |
CN106104562B (en) | System and method for securely storing and recovering confidential data | |
EP3047601B1 (en) | Technologies for synchronizing and restoring reference templates | |
CN101430751B (en) | Data management apparatus and data management method | |
JP6976949B2 (en) | Methods and systems for key distribution between servers and medical devices | |
US20170091463A1 (en) | Secure Audit Logging | |
CN111447414B (en) | Video monitoring system and method convenient to dispatch and monitor | |
CN106790045B (en) | distributed virtual machine agent device based on cloud environment and data integrity guarantee method | |
JP2003501877A (en) | Method and apparatus for secure distribution of public / private key pairs | |
CN108521393A (en) | Data interactive method, device, system, computer equipment and storage medium | |
CN111628861A (en) | Object sharing system and method | |
CN110300287A (en) | A kind of public safety video monitoring networking camera access authentication method | |
CN110557367B (en) | Secret key updating method and system for quantum computing secure communication resistance based on certificate cryptography | |
CN112989320B (en) | User state management system and method for password equipment | |
CN112751800B (en) | Authentication method and device | |
JP2006115083A (en) | Regular content confirming method | |
KR101205738B1 (en) | Authentication method by generating and photographing image and electronic device using the same | |
CN108932425B (en) | Offline identity authentication method, authentication system and authentication equipment | |
CN114338201B (en) | Data processing method and device, electronic equipment and storage medium | |
CN110139163A (en) | A kind of method and relevant apparatus obtaining barrage | |
CN109379190A (en) | Method for distributing key, device, computer equipment and storage medium | |
CN109922042B (en) | Method and system for managing sub-keys of lost equipment | |
CN111523154B (en) | Method and system for obtaining hardware unique identifier and corresponding computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170905 |