EP3818459A1 - Method and system for authenticating the computer-aided manufacturing of a three-dimensional part - Google Patents
Method and system for authenticating the computer-aided manufacturing of a three-dimensional partInfo
- Publication number
- EP3818459A1 EP3818459A1 EP19733827.0A EP19733827A EP3818459A1 EP 3818459 A1 EP3818459 A1 EP 3818459A1 EP 19733827 A EP19733827 A EP 19733827A EP 3818459 A1 EP3818459 A1 EP 3818459A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- manufacturing
- parameters
- watermark
- dimensional
- dimensional model
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 225
- 238000000034 method Methods 0.000 title claims abstract description 68
- 239000000463 material Substances 0.000 claims abstract description 47
- 238000011960 computer-aided design Methods 0.000 claims abstract description 18
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 15
- 238000001514 detection method Methods 0.000 claims abstract description 11
- 238000003780 insertion Methods 0.000 claims description 36
- 230000037431 insertion Effects 0.000 claims description 35
- 230000006870 function Effects 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 10
- 238000003860 storage Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims 1
- 230000005764 inhibitory process Effects 0.000 claims 1
- 238000004891 communication Methods 0.000 description 12
- 238000007781 pre-processing Methods 0.000 description 9
- 238000012423 maintenance Methods 0.000 description 7
- 238000010146 3D printing Methods 0.000 description 5
- 239000000654 additive Substances 0.000 description 4
- 230000000996 additive effect Effects 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 3
- 238000000151 deposition Methods 0.000 description 3
- 238000012966 insertion method Methods 0.000 description 3
- 230000008018 melting Effects 0.000 description 3
- 238000002844 melting Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 239000000843 powder Substances 0.000 description 2
- 238000007639 printing Methods 0.000 description 2
- 241000270295 Serpentes Species 0.000 description 1
- 241001441724 Tetraodontidae Species 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 230000008021 deposition Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000001033 granulometry Methods 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 238000009776 industrial production Methods 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 238000003801 milling Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003647 oxidation Effects 0.000 description 1
- 238000007254 oxidation reaction Methods 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 238000005498 polishing Methods 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 238000002203 pretreatment Methods 0.000 description 1
- 229910052704 radon Inorganic materials 0.000 description 1
- SYUHGPGVQRZVTB-UHFFFAOYSA-N radon atom Chemical compound [Rn] SYUHGPGVQRZVTB-UHFFFAOYSA-N 0.000 description 1
- 238000005295 random walk Methods 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000004381 surface treatment Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Definitions
- the present invention relates to a method and a system for authentication of computer-aided manufacturing of three-dimensional parts.
- the invention is in the field of computer-aided manufacturing, using three-dimensional models obtained by computer-aided design.
- additive manufacturing for example 3D printing, which consists of manufacturing a part by depositing successive layers of one or more predetermined materials, and d on the other hand, subtractive manufacturing, in which a 3D part is made by removing material from a block of material.
- computer-aided manufacturing includes the physical manufacturing of physical objects and so-called virtual manufacturing, which involves generating a digital twin of a physical object.
- the digital twin of a physical object is an object, simulated in a computer system, having the same shape and the same physical properties, and is used in simulation phases, for example to test performance and robustness properties of the object before its actual physical manufacture, or to perform predictive maintenance of the part manufactured or to be manufactured itself, or of the manufacturing device.
- Virtual manufacturing is advantageous especially in industrial prototyping phases, where it makes it possible to reduce manufacturing costs by avoiding the manufacture of multiple expensive prototypes. It is also advantageous for predictive maintenance purposes, under which it makes it possible to anticipate the occurrence of faults or failures, and therefore the need for maintenance interventions, of the part manufactured or to be manufactured itself, or of the manufacturing device.
- computer-aided manufacturing is carried out according to a manufacturing process, on the one hand from a three-dimensional model obtained by computer-aided design and represented in a predetermined file format, and on the other part by using a global set of manufacturing parameters which includes a set of parameters relating to the manufacturing process, a set of parameters relating to the materials used, and a set of configuration parameters of the device for manufacturing the part.
- the manufacturing process designates the technique used for the formation of a layer of material. It can for example be selective laser melting, or “Selective Laser Melting” (SLM), in which a laser beam is directed towards a bed of powder. previously deposited, or powder projection, or “Directed Energy Deposition” (DED), in which a laser beam is directed towards a jet of material to melt it as it is deposited.
- SLM Selective Laser Melting
- DED Directed Energy Deposition
- Other methods are known, and the invention applies in their contexts. For each of these processes, corresponding parameters are to be set.
- the values of the parameters of the global set of manufacturing parameters contribute to the final properties of the manufactured object, in terms of robustness and more generally, compliance with the specifications of the part to be manufactured.
- the authenticity of the manufacturing process is used here to denote the authenticity of the association of the three-dimensional model and at least one non-empty subset of the global set of parameters.
- One of the objectives of the invention is to improve the security of computer-aided manufacturing of three-dimensional parts, in particular for the industrial manufacture of such parts.
- the invention proposes a method of authentication of computer-aided manufacturing of a three-dimensional part by a manufacturing device, using at least one predetermined manufacturing material, said three-dimensional part to be manufactured being defined by a three-dimensional model obtained by computer-aided design and represented in a predetermined file format, said manufacturing device being adapted to be controlled to manufacture said part from said three-dimensional model and from a global set of manufacturing parameters.
- This process includes steps of: generation of a cryptographic key as a function of the values of the parameters of a non-empty subset of parameters of the global set of manufacturing parameters of said three-dimensional part, said non-empty subset of parameters comprising at least one parameter a set of configuration parameters of the manufacturing device, or at least one parameter of a set of parameters relating to the manufacturing process or at least one parameter of a set of parameters characteristic of the at least one manufacturing material,
- the method of the invention makes it possible to authenticate the computer-aided manufacture of three-dimensional parts by validating in a linked manner the three-dimensional model defining the part and a non-empty subset of the global set of parameters comprising at least one parameter. of a set of configuration parameters of the manufacturing device, and / or at least one parameter of a set of parameters relating to the manufacturing process and / or at least one parameter of a set of parameters characteristic of the at least one material Manufacturing,
- the computer-aided manufacturing authentication method for a three-dimensional part according to the invention may have one or more of the characteristics below, taken independently or according to any acceptable combination.
- the method further includes inhibiting a step of manufacturing said three-dimensional part in the event of a negative comparison.
- the non-empty subset of parameters is determined prior to the generation of a cryptographic key and comprises said set of parameters relating to the manufacturing process, and a predetermined subset of configuration parameters of the manufacturing device and a predetermined subset characteristic parameters of the at least one manufacturing material.
- the generation of a cryptographic key is also dependent on a secret key.
- the method further comprises extracting said set of parameters relating to the method for manufacturing metadata associated with the received three-dimensional model.
- the method further comprises receiving said set of configuration parameters from the manufacturing device, from a man-machine interface of the manufacturing device, or from an external control device.
- the detected watermark is formed from a series of N bits, N being a non-zero positive integer, the method comprising a step of obtaining the expected watermark from a memory.
- the invention relates to a method of inserting a digital watermark for the authentication of computer-aided manufacturing of three-dimensional parts by a manufacturing device using at least one predetermined manufacturing material, said three-dimensional part to be manufactured being defined by a three-dimensional model obtained by computer-aided design and represented in a predetermined file format, said manufacturing device being adapted to be controlled to manufacture said part from said three-dimensional model, the method comprising a step of obtaining a three-dimensional model of a three-dimensional part to be manufactured.
- This digital watermark insertion process includes steps of:
- non-empty subset of a global set of manufacturing parameters for said part to be manufactured said non-empty subset of parameters comprising at least one parameter from a subset of device configuration parameters manufacturing, or at least one parameter from a set of parameters relating to the manufacturing process or at least one parameter from a subset of parameters characteristic of the at least one manufacturing material
- the method of inserting a digital watermark for the authentication of computer-aided manufacturing of a three-dimensional part according to the invention may have one or more of the characteristics below, taken independently or according to any acceptable combination.
- the generation of a cryptographic key is also dependent on a secret key.
- the non-empty subset of parameters includes the manufacturing device configuration parameter subset, and the parameter set relating to the manufacturing process and the subset of parameters characteristic of the at least one manufacturing material,
- the method includes storing watermark data associated with the watermark inserted into said three-dimensional model.
- the method includes storing all of the manufacturing parameters in association with the watermarked model in a file in predetermined file format, said set of manufacturing parameters being stored in the form of metadata.
- the invention relates to a digital watermark insertion device for the authentication of computer-aided manufacturing of three-dimensional parts by a manufacturing device using at least one predetermined manufacturing material, said three-dimensional part to be manufactured being defined by a three-dimensional model obtained by computer-aided design and represented in a predetermined file format, said manufacturing device being adapted to be controlled to manufacture said part from said three-dimensional model, said device comprising a module adapted to receive a three-dimensional model of a three-dimensional part to be manufactured.
- This device includes modules adapted to:
- non-empty subset of a global set of manufacturing parameters for said part to be manufactured said non-empty subset of parameters comprising at least one parameter from a subset of configuration parameters of the manufacturing device , or at least one parameter from a set of parameters relating to the manufacturing process or at least one parameter from a subset of parameters characteristic of the at least one manufacturing material
- the invention relates to a computer-assisted manufacturing authentication system for a three-dimensional part by a manufacturing device, using at least one predetermined manufacturing material, said three-dimensional part to be manufactured being defined by a three-dimensional model obtained. by computer-aided design and represented in a predetermined file format, the system comprising a device suitable for controlling said manufacturing device to fabricate said part from said three-dimensional model and a global set of manufacturing parameters.
- This system includes modules adapted to:
- a cryptographic key as a function of the values of the parameters of a non-empty subset of parameters of the global set of manufacturing parameters of said three-dimensional part, said non-empty subset of parameters comprising at least one parameter of a set of configuration parameters of the manufacturing device, or at least one parameter of a set of parameters relating to the manufacturing process or at least one parameter of a set of parameters characteristic of the at least one manufacturing material,
- the system comprises a module adapted to inhibit a step of manufacturing said three-dimensional part in the event of a negative comparison.
- FIG. 1 schematically illustrates the main steps of a computer-aided manufacturing process of three-dimensional part according to an embodiment of the invention
- FIG. 2 is a block diagram of the main steps of inserting a watermark according to one embodiment
- FIG. 3 is a block diagram of the main steps of authentication of computer-aided manufacturing
- FIG. 4 schematically illustrates a computer-assisted manufacturing authentication system of three-dimensional part according to one embodiment.
- the invention will be more particularly described in detail in the case of additive manufacturing of three-dimensional parts by 3D printing, from predetermined materials. However, as already explained, the invention also applies to a computer-aided manufacturing of a digital twin of a real 3D part, for example for the purposes of prototyping or predictive maintenance.
- the invention also applies in the case of computer-aided subtractive manufacturing.
- FIG. 1 illustrates the main steps involved in a process 1 of computer-aided production of three-dimensional part in which the invention applies.
- this process implements 3D printing of a part, for example an industrial part or a part intended for the consumer market.
- This process includes a first step 2 of computer-aided design (acronym CAD), conventionally implemented using software dedicated to computer-aided design making it possible to obtain a model of the part to be produced expressed in a predetermined format.
- CAD computer-aided design
- the design is carried out by a first player, for example a design office or an industrialist.
- 3D CAD Computer Aided Design
- 3D CAD Computer Aided Design
- the parts to be manufactured have complex shapes, expressed from geometric shapes: lines, arcs, B-spline curves.
- the design step 2 receives as input an initial specification C relating to the part to be manufactured, comprising physical, thermal and mechanical properties.
- these specifications include the desired shape of the part, the mass, the resistance, the temperature range of use.
- step 2 there are a few manufacturing parameters: the manufacturing device, for example the type of 3D printer that will be used for manufacturing, as well as the characteristics of the printing process and the parameters of the material (s).
- the values of these parameters are obtained from the initial specifications C or from one or more external databases.
- a file is obtained in selected format comprising an initial Modjnit model of the 3D part to be manufactured.
- the initial Modjnit model is provided at the input of a step 6 of preprocessing of this initial model, which includes a last watermark insertion operation specific to the invention.
- the initial Modjnit model is stored on a non-volatile electronic recording medium, readable by a computer, this electronic recording medium being supplied to a device which implements step 6 of preprocessing.
- the initial Modjnit model is stored in a file and transmitted via a communications network, according to a chosen communications protocol, to a device which implements step 6 of preprocessing.
- the pretreatment step 6 is implemented by a second actor, for example a methods office, which may be different from the first actor, and which uses, for the insertion of watermark, a trusted third party for assisted manufacturing by computer.
- This trusted third party ensures the sharing of secrets, as described in more detail below, and provides the algorithm for calculating the cryptographic keys K and K ’, as described below, from shared secrets.
- Step 6 includes, before the watermark is inserted, an operation to transform the initial Modjnit model, into a final model, and a set of metadata.
- this operation takes as input a set P fab of parameters of the manufacturing process, and subsets P mat 'and P ⁇ nf ' of the sets P mat and P mac , respectively parameters relating to the materials and configuration parameters of the manufacturing device used in the actual manufacturing phase 8 described below.
- the values of the parameters of the set P fab of parameters of the manufacturing process are obtained from experts in the methods office via a man-machine interface, or an external control device, from the device which implements step 6 of pretreatment.
- the values of the parameters of the subsets P mat 'and P cont ' of the sets P mat and P mac are obtained from one or more external databases.
- the set P mat of characteristic parameters of the manufacturing material (s) comprises for example physical characteristics of the materials, for example polymer or metal, particle size, humidity and oxidation rate, melting temperature.
- the parameters of size (granulometry) or of shape of the material are known during step 6, and therefore belong to the subset P mat 'of P mat .
- the moisture content of the material, or the fact of knowing whether the material (its possible excess) is or cannot be reused are examples of parameters of P mat which do not belong to the subset P mat ' .
- the set of configuration parameters of the manufacturing device P mac includes all the parameters to be set for the device to operate, that is to say both physical parameters (eg physical characteristics of the laser rays), and environmental parameters (atmosphere, humidity).
- the temperature parameter of the laser beam must also be known during step 6, and therefore belongs to the subset P ⁇ nf 'of P mac ⁇
- the parameters relating to the manufacturing environment such as the oxygen or radon level in the manufacturing enclosure, are examples of parameters of P mac which do not belong to the subset R ⁇ h L
- the set P fab of parameters relating to the manufacturing process includes information relating to the manufacture of the desired part, according to the specifications, for example information relating to the positioning of the part, to the support (s) to use when depositing material or the laser strategy (scanning direction, etc.) to be implemented for each layer to be manufactured. They also include controls of the manufacturing device for each layer of material to be deposited.
- the set of parameters P fab depends on the manufacturing process S LM, DED.
- the final model is a 3D model, describing the geometry of the part to be manufactured, but in a format, called exchange, different from that of the initial model, such as, for example, IGES (“Initial Graphics Exchange Specification”), STEP (“Standard for Exchange of ProducT Model Data”), STL (“Stereolitography”) or AMF (“Additive Manufacturing File Format”).
- IGES Initial Graphics Exchange Specification
- STEP Standard for Exchange of ProducT Model Data
- STL Stereolitography
- AMF Additional Manufacturing File Format
- the geometry of the part is very slightly modified as a function of some of the parameters taken into account of the overall set of manufacturing parameters.
- the metadata produced by the transformation operation includes the manufacturing parameters P fab .
- Step 6 of preprocessing ends with a watermark insertion operation in this model, according to a non-empty subset of the global set of manufacturing parameters, in the 3D model to obtain a watermarked model Mod_WM of the 3D part to be manufactured.
- a watermarked model is stored in a file of given format, and the associated manufacturing parameters P fab are also stored in this file in the form of metadata.
- Process 1 also includes a manufacturing step 8 implemented by a computer-aided manufacturing device, for example a 3D printer.
- a computer-aided manufacturing device for example a 3D printer.
- the manufacturer receives the material (s) 4 to be used and all of the characteristic parameters of the materials P mat , the watermarked model Mod_WM obtained in step 6 pre-treatment, as well as the expected values of the parameters relating to the manufacturing process P fab .
- the manufacturing device also receives, for example by means of a man-machine interface which it comprises or an external control device, a complete set of configuration parameters P mac , that is to say say values for all of the configuration parameters to operate the manufacturing device.
- the manufacturer does not receive the material (s) 4, but only the set of parameters characteristic of the materials P mat and l set of parameters from sets P fab and P mac .
- the manufacturing step implements an authentication according to the invention implementing a detection of the watermark inserted in the model watermarked Mod_WM.
- the manufacturing step 8 is implemented by the manufacturer, in cooperation with the trusted third party who contributed to the pretreatment step, more precisely by ensuring the watermark insertion operation.
- the production is not interrupted but the parts produced are not approved because they do not correspond to the manufacturing conditions provided for to satisfy the initial specifications.
- the production process 1 optionally includes a post-treatment step 10, comprising for example an operation for finishing the 3D part, for example by milling, sanding, polishing, electropolishing, heat treatment, surface treatment, removal of supports, as well as 'a 3D part test operation.
- This post-processing step is carried out according to methods known in the state of the art.
- the process includes the supply 12 of the parts to a final recipient, who applies, for example, tests of conformity with the initial specifications.
- the supply 12 of the part is for example the supply of the digital twin of a 3D part to be manufactured to a software application which performs tests and / or predictive maintenance .
- FIG. 2 is a block diagram of an embodiment of the insertion of a watermark in the pretreatment step 6 described above.
- the watermark insertion is performed by an executable program code instruction module implemented by a programmable electronic device.
- the watermark insertion module is saved and executed in a secure memory and by a processor, such as for example existing in a smart card.
- the insertion of the watermark comprises a first step 20 of receiving a final 3D model of the part to be manufactured, resulting from all of the pre-processing operations of a initial 3D model, except for watermark insertion.
- Step 20 is followed by a step 22 of determining at least one non-empty subset SP of the global set of manufacturing parameters.
- this step forming part of the preprocessing 6 we have the set of preprocessing parameters consisting of the set P fa b of parameters relating to the manufacturing process, and sub-assemblies P mat 'and P ⁇ nf ' of the sets P mat and P mac , respectively parameters relating to the materials and configuration parameters of the manufacturing device.
- the determination 22 consists in determining a non-empty subset SP of the set of preprocessing parameters.
- the non-empty subset SP consists of the set of parameters P mat 'and / or P ⁇ nf ' and / or P fab
- the non-empty subset SP consists of all the parameters of the sets P mat 'and P conf ' and P fab .
- the non-empty SP subset consists of only one of the P mat ', P conf ' and P fab subsets.
- the non-empty SP subset is formed by the P fab subset. .
- the non-empty subset SP consists of a predetermined number P of parameters of each of the subsets P mat ', P conf ' and P fab
- the method also includes a step 24 of obtaining a secret key K 0 .
- the secret key K 0 is shared between the methods office and the manufacturer. This sharing is ensured by the trusted third party.
- the secret key K 0 is associated with an identifier of the initial 3D model Modjnit and shared by all the manufacturers, if there are several, of the part defined by the 3D model Modjnit.
- a cryptographic key calculation K is performed in step 26, by applying a cryptographic function parameterized by the secret key K 0 and the non-empty subset SP of parameters chosen in step 22.
- a hash function is first applied to the set of concatenated values of the parameters of the chosen subset, to obtain a fingerprint.
- Any known hash function such as MD5 (Message Digest 5), SHA-1 or SHA-256 (Secure Hash Algorithm 1 or 256), RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest 160) or Whirlpool is applicable here.
- the fingerprint obtained is then encrypted using a symmetric encryption algorithm and the key K 0 , to obtain the cryptographic key K.
- Any known algorithm such as AES (Advanced Encryption Standard), MARS, RC6, Serpent , Twofish or Blowfish is applicable here.
- the cryptographic key K is calculated as a key fingerprint message authentication code, or HMAC, for "keyed-hash message authentication code", that is to say using a cryptographic hash function. in combination with the key K 0 .
- HMAC key fingerprint message authentication code
- Any iterative hash function can be used to calculate an HMAC. This is for example the case of MD5 or SHA-1, the algorithm resulting from the calculation of HMAC being respectively noted HMAC-MD5 or HMAC-SHA1.
- the step 26 of generating a cryptographic key K is followed by a step of inserting a watermark 28 in the final 3D model, the insertion of the watermark being dependent on the cryptographic key K.
- the watermark is formed from a series of N bits ⁇ wi, ..., w N ⁇ , each w, being equal to 0 or 1, N being a predetermined number or dependent on the final 3D model.
- the series of N bits is predetermined or randomly generated. It can also include both a predetermined series of bits and a randomly generated series of bits. In known manner, when it comprises a predetermined series of bits, this may for example include an identifier of a methods office, of a manufacturer, or of a manufacturing device.
- the watermark insertion method used is the method described in the article "Digital Watermark of 3D CAD Product Model” by X. Feng et al, published in International Journal of Security and Its Applications “, vol. 9, n ° 9, 2015. This method consists in modifying certain coordinates of geometric entities defining the 3D model, while preserving the final geometry of the part.
- the points whose coordinates are modified which are randomly selected being initialized by the cryptographic key K.
- the series of N bits ⁇ -, ..., ⁇ n ⁇ forming the inserted watermark it is the points whose coordinates are modified which are selected randomly ,.
- the watermark generated is a hazard generated using the cryptographic key K.
- the watermark insertion is an example of an embodiment of the watermark insertion.
- blind that is to say in which the watermark is detectable from the watermarked model, without the need to use the initial 3D model.
- Any known method of inserting a watermark in a 3D model of this type can be used.
- the calculated cryptographic key K is used as a cryptographic hazard in the insertion of the watermark.
- the method also includes a step 30 of storing the watermark data F, for example of the series of N bits ⁇ -, ..., ⁇ n ⁇ forming the watermark in the case where the watermark is predetermined.
- the watermark data F are stored by the trusted third party, for example in a file.
- the watermark data is also inserted into the metadata of the file in which the 3D model is stored.
- the storage step 30 is omitted.
- FIG. 3 is a block diagram of the main steps of a manufacturing process authentication method, implemented by a computer controlling a manufacturing device, typically of 3D printing.
- the authentication method comprises, in this manufacturing phase, a first step 40 of receiving a 3D model comprising code instructions for the manufacture of a 3D part by a manufacturing device.
- this 3D model is received as a file in exchange format as described above, comprising metadata.
- a legitimate file is a file with a watermark inserted by a method as described above with reference to Figure 2.
- the method also includes a step 42 of receiving a global set of parameters and of determining a non-empty subset SP ’of parameters.
- the global set of parameters includes the set P fab of parameters relating to the manufacturing process, obtained for example by extracting these parameters from the metadata of the file received, the set P mat of parameters characteristic of the material (s) provided by the supplier of raw materials, and the set P mac of configuration parameters of the manufacturing device itself, received from a man-machine interface of this device, or from an external control device.
- the set of parameters P mat characteristic of the material (s) is a superset of the parameters P mat 'used in the pretreatment step.
- the set of parameters P mac for configuring the manufacturing device is a superset of the parameters P conf ′ used in the pretreatment step.
- the determination 42 of the non-empty subset SP ′ comprises the determination of the parameters which are homologous to those determined in step 22 implemented during the insertion of the watermark, from the sets of parameters P fab , P mat and P mac .
- the non-empty subset SP of parameters of step 22 was composed of a concatenation of the parameters P mat 'and P conf ' and P fab
- the subset of parameters SP ' is formed from the parameters , corresponding to the parameters P mat 'and P conf ' and P fab , extracts from P mat , P mac and P, ab .
- the watermark data used for its insertion is equal to that of the watermark extracted from the watermarked model during the manufacturing phase.
- the authentication process involves obtaining the key K 0 44 used for the insertion of the watermark.
- the secret key K 0 is a shared secret in order to improve the confidence level of the authentication.
- the secret key is obtained from the trusted third party.
- a secure device such as a secure smart card, provided by the trusted third party.
- a cryptographic key K ' is calculated by applying the same algorithm as that used in step 26, that is to say the same cryptographic function parameterized by the secret key K 0 , to the concatenated values of the SP 'subset of the set of parameters received homologous to the non-empty SP subset of the global set of parameters chosen for watermark insertion.
- a watermark F ' is detected or extracted in the watermark detection step 48 from the watermark model received using the cryptographic key K', by applying a detection method associated with the watermark insertion method applied to the watermark insertion step 28.
- the cryptographic key K ' is used analogously to the use of the cryptographic key K during the insertion.
- the cryptographic key K ’ is used to determine the points whose coordinates are supposed to be modified by the insertion of a watermark.
- the cryptographic key K ’ is used to generate the expected watermark data.
- a series of N binary values (0 or 1) is extracted from the watermarked model.
- the expected watermark data F is obtained in step 50.
- the expected watermark data is the watermark data inserted in the authentic file during step 6 of pre-processing of the initial model, which was stored in the watermark insertion step 30.
- the methods office For example, they are obtained on request from the methods office based on a unique identifier of the watermarked model received, or are supplied with it by the methods office.
- the watermark data F are therefore obtained in step 50 by request from a memory where they have been stored by the office. methods, or on a removable medium where they were provided by him in conjunction with the watermarked model.
- This watermark F data is compared in the comparison step 52 with the watermark F data extracted from the received file.
- step 52 In the event of a negative comparison in step 52, it is deduced that the overall manufacturing process is not authenticated. As a security measure, it is then possible to inhibit, that is to say not to trigger, the step of manufacturing the 3D part in step 54.
- FIG. 4 schematically illustrates an authentication system for manufacturing 3D parts according to one embodiment.
- the system 60 includes a watermark insertion device 62 and a 3D part manufacturing subsystem 64, both of which are connected to a communications network 66.
- the insertion device 62 is a programmable electronic device, for example a computer, or an electronic device produced in the form of programmable logic components, such as an FPGA (from the English Field-Programmable Gate Array), or also in the form dedicated integrated circuits, type ASIC (from the English Appiication- Specific Integrated Circuit).
- the device 62 is typically integrated into a device for preparing the manufacturing of the methods office, not shown.
- central computing unit 68 comprising one or more electronic processors, capable of executing computer program instructions when the device 62 is powered up.
- the device 62 also includes an electronic memory unit 70 adapted to store information, in particular registers. In particular, executable code instructions able to implement the methods according to the invention are stored.
- the device 62 includes a control interface 72 making it possible to update parameters and to receive commands from an operator, as well as a communication module 74 making it possible to receive and communicate data via the network 66 according to communication protocols. communication given.
- the various functional blocks of the device 62 described above are connected via a communication bus.
- the device 62 is suitable for implementing the insertion of a watermark in a file representing an initial model of a 3D part to be manufactured, making it possible to obtain a file with watermark 76.
- the file 76 is transmitted via the communication network 66 or via an electronic non-volatile data storage medium to a watermark authentication device 80 forming part of a manufacturing subsystem 64.
- the device 80 is also suitable for controlling a device 82 for manufacturing 3D parts, for example a 3D printer.
- the device 80 is a programmable electronic device, for example a computer, or an electronic device produced in the form of programmable logic components, such as an FPGA (from the English Field-Programmable Gâte Arra ⁇ ), or also in the form of integrated circuits. dedicated, type ASIC (from the English Application -Specifies Integrated Circuit).
- FPGA field-Programmable Gâte Arra ⁇
- ASIC application-Specifies Integrated Circuit
- It comprises in particular a central computing unit 84, or CPU, comprising one or more electronic processors, capable of executing computer program instructions when the device 80 is powered up.
- CPU central computing unit 84, or CPU, comprising one or more electronic processors, capable of executing computer program instructions when the device 80 is powered up.
- the device 80 also includes an electronic memory unit 86 adapted to store information, in particular registers. In particular, executable code instructions able to implement the authentication method according to the invention are stored.
- the device 80 comprises a control interface 88 making it possible to update parameters and to receive commands from an operator, as well as a communication module 90 making it possible to receive and communicate data via the network 66 according to a communication protocol. communication given.
- the various functional blocks of the device 80 described above are connected via a communication bus.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Geometry (AREA)
- Evolutionary Computation (AREA)
- Processing Or Creating Images (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1856131A FR3083626B1 (en) | 2018-07-03 | 2018-07-03 | PROCESS AND SYSTEM FOR COMPUTER ASSISTED MANUFACTURING AUTHENTICATION OF THREE-DIMENSIONAL PART |
PCT/EP2019/067751 WO2020007867A1 (en) | 2018-07-03 | 2019-07-02 | Method and system for authenticating the computer-aided manufacturing of a three-dimensional part |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3818459A1 true EP3818459A1 (en) | 2021-05-12 |
Family
ID=64049342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19733827.0A Pending EP3818459A1 (en) | 2018-07-03 | 2019-07-02 | Method and system for authenticating the computer-aided manufacturing of a three-dimensional part |
Country Status (5)
Country | Link |
---|---|
US (1) | US20210264041A1 (en) |
EP (1) | EP3818459A1 (en) |
CN (1) | CN112352236A (en) |
FR (1) | FR3083626B1 (en) |
WO (1) | WO2020007867A1 (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9213785B2 (en) * | 2009-02-03 | 2015-12-15 | Thomas Plewe | Systems and methods for component-based architecture design |
WO2012146943A2 (en) * | 2011-04-27 | 2012-11-01 | Within Technologies Ltd | Improvements for 3d design and manufacturing systems |
US20150170013A1 (en) * | 2013-12-14 | 2015-06-18 | Microsoft Corporation | Fabricating Information Inside Physical Objects for Imaging in the Terahertz Region |
CN106022801A (en) * | 2016-05-17 | 2016-10-12 | 长春理工大学 | 3D printing encryption method |
SG11201810306XA (en) * | 2016-05-20 | 2018-12-28 | Moog Inc | Secure and traceable manufactured parts |
US20230146931A1 (en) * | 2020-04-13 | 2023-05-11 | Hewlett-Packard Development Company, L.P. | Authentication surface feature in additive manufacturing |
-
2018
- 2018-07-03 FR FR1856131A patent/FR3083626B1/en active Active
-
2019
- 2019-07-02 CN CN201980042849.6A patent/CN112352236A/en active Pending
- 2019-07-02 US US17/254,837 patent/US20210264041A1/en active Pending
- 2019-07-02 WO PCT/EP2019/067751 patent/WO2020007867A1/en unknown
- 2019-07-02 EP EP19733827.0A patent/EP3818459A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US20210264041A1 (en) | 2021-08-26 |
CN112352236A (en) | 2021-02-09 |
WO2020007867A1 (en) | 2020-01-09 |
FR3083626A1 (en) | 2020-01-10 |
FR3083626B1 (en) | 2020-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11146381B2 (en) | Traceability of edits to digital documents via distributed ledgers | |
EP3921977A1 (en) | Method and system for the computer-aided manufacturing of a three-dimensional part | |
US20150350278A1 (en) | Secure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system | |
US11263296B2 (en) | Secure 3D printing | |
Hou et al. | Copyright protections of digital content in the age of 3d printer: Emerging issues and survey | |
WO2009156689A2 (en) | Method and system for validating a succession of events experienced by a device | |
EP3200387B1 (en) | Secure multi-party processing method protected against a malicious party | |
KR20100133373A (en) | Simple non-autonomous peering environment watermarking, authentication and binding | |
FR3082023A1 (en) | A SOFTWARE APPLICATION AND A COMPUTER SERVER TO AUTHENTICATE THE IDENTITY OF A DIGITAL CONTENT CREATOR AND THE INTEGRITY OF THE PUBLIC CREATOR CONTENT | |
Gao et al. | ThermoTag: A hidden ID of 3D printers for fingerprinting and watermarking | |
CN112003888A (en) | Block chain-based certificate management method, device, equipment and readable medium | |
EP2757736A1 (en) | Secure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system | |
EP3818459A1 (en) | Method and system for authenticating the computer-aided manufacturing of a three-dimensional part | |
EP3844739A1 (en) | Printed marking for an authentication method, and method of printing and of authenticating a printed marking | |
CN110751481A (en) | Digital asset right confirming method and device | |
Yampolskiy et al. | Crypto-steganographic validity for additive manufacturing (3D printing) design files | |
WO2023136840A1 (en) | Physical object blockchains | |
US20230410072A1 (en) | Systems and methods for enhanced non-fungible tokens | |
FR3023943A1 (en) | AUTOMATED ENGRAVING OF A MINERAL SURFACE BASED ON RELATED VISUAL REASONS THEREON | |
FR3050044B1 (en) | METHOD FOR AUTOMATICALLY CHECKING A TARGET COMPUTING FILE RELATIVE TO A REFERENCE COMPUTING FILE | |
CH699083B1 (en) | A method for digital certification of authenticity of a physical object and a recording medium for implementing such a method | |
EP2927858B1 (en) | Method for manufacturing a security device | |
McDonald et al. | Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files | |
WO2023224624A1 (en) | Permissions to produce items in physical form | |
CN113971569A (en) | Artwork anti-counterfeiting encryption and verification method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20201231 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20221018 |