US20180035013A1 - 3d printer interface lockout - Google Patents

3d printer interface lockout Download PDF

Info

Publication number
US20180035013A1
US20180035013A1 US15/724,364 US201715724364A US2018035013A1 US 20180035013 A1 US20180035013 A1 US 20180035013A1 US 201715724364 A US201715724364 A US 201715724364A US 2018035013 A1 US2018035013 A1 US 2018035013A1
Authority
US
United States
Prior art keywords
user
pin
printer
match
digit number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/724,364
Inventor
Eli Charles Share
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch Tool Corp
Original Assignee
Robert Bosch Tool Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch Tool Corp filed Critical Robert Bosch Tool Corp
Priority to US15/724,364 priority Critical patent/US20180035013A1/en
Assigned to ROBERT BOSCH TOOL CORPORATION reassignment ROBERT BOSCH TOOL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHARE, ELI CHARLES
Publication of US20180035013A1 publication Critical patent/US20180035013A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B29WORKING OF PLASTICS; WORKING OF SUBSTANCES IN A PLASTIC STATE IN GENERAL
    • B29CSHAPING OR JOINING OF PLASTICS; SHAPING OF MATERIAL IN A PLASTIC STATE, NOT OTHERWISE PROVIDED FOR; AFTER-TREATMENT OF THE SHAPED PRODUCTS, e.g. REPAIRING
    • B29C64/00Additive manufacturing, i.e. manufacturing of three-dimensional [3D] objects by additive deposition, additive agglomeration or additive layering, e.g. by 3D printing, stereolithography or selective laser sintering
    • B29C64/20Apparatus for additive manufacturing; Details thereof or accessories therefor
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B33ADDITIVE MANUFACTURING TECHNOLOGY
    • B33YADDITIVE MANUFACTURING, i.e. MANUFACTURING OF THREE-DIMENSIONAL [3-D] OBJECTS BY ADDITIVE DEPOSITION, ADDITIVE AGGLOMERATION OR ADDITIVE LAYERING, e.g. BY 3-D PRINTING, STEREOLITHOGRAPHY OR SELECTIVE LASER SINTERING
    • B33Y30/00Apparatus for additive manufacturing; Details thereof or accessories therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server
    • G06F3/1286Remote printer device, e.g. being remote from client or server via local network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/0035User-machine interface; Control console
    • H04N1/00405Output means
    • H04N1/00408Display of information to the user, e.g. menus
    • H04N1/00411Display of information to the user, e.g. menus the display also being used for user input, e.g. touch screen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4433Restricting access, e.g. according to user identity to an apparatus, part of an apparatus or an apparatus function

Definitions

  • the present invention relates generally to authenticating a user of a 3D printer, and more specifically, to preventing unauthorized use of a 3D printer.
  • 3D printing is a process of making three dimensional solid objects based on blueprints provided by digital files.
  • the synthesis of the desired 3D solid object is achieved by strategically generating successive layers of an additive material in a pattern on a platform of a 3D printer until the entire object is created.
  • the synthesis of the 3D object is driven by the digital files that provide the specifications that describe how to create the pattern of layers and the materials used to generate the object.
  • the digital files specifying the design are provided by the user, and examples of the digital files read by the 3D printer include G-code files, computer-aided design (“CAD”) files, STereoLithography (“STL”) CAD files, and other file types generally used in additive manufacturing processes.
  • the digital files refer to a 3D model of a new object, but alternatively, the digital files can refer to a copy of an object derived from the usage of a 3D scanner.
  • the generation of the successive layers of the additive material can be performed, for example, according to any one of: (1) Vat Photopolymerisation, (2) Material Jetting, (3) Binder Jetting, (4) Direction Energy Deposition, (5) Powder Bed Fusion, (6) Sheet Lamination, or (7) Material Extrusion.
  • Specific processes of Material Extrusion used to generate the successive layers can involve making sequential deposits using fused deposition modeling (“FDM”), fused filament fabrication (“FFF”), or Direct Ink Writing (“DIW”).
  • FDM fused deposition modeling
  • FFF fused filament fabrication
  • DIW Direct Ink Writing
  • the materials used as the “ink” of the 3D printer to generate the 3D object can include, for example, any of: powder material, polymer material, thermoplastics, eutectic metals, edible materials, rubbers, modeling clay, plasticine, metal clay, ceramic materials, metal alloys, papers, composite materials composed of ceramics and metallic materials (“cermet”), metal matrix composites, ceramic matrix composites, photopolymers, plaster, stainless steel, aluminum, plastic film, and metal foil.
  • 3D printers are generally protected from external influences by a build cage, and, within the build cage, the 3-D printer typically includes the following: (1) at least one extruder, (2) a guide rail system, (3) a build platform, (4) at least one filament spool, (5) and at least one motor for maneuvering the at least one extruder.
  • the extruder can include a cooling system to regulate the temperature of the extruder.
  • a plastic filament is unwound from a filament spool and supplied to an extruder.
  • the extruder applies heat at a specific temperature to the filament, which melts the plastic filament to start material flow.
  • the motor for maneuvering the extruder uses the guide rail system to position (both horizontally and vertically) the extruder relative to the build platform to apply a first layer of the 3D object to the build platform. Due the characteristics of the filament and the cooling system of the extruder, the filament cools shortly after it has been extruded. Once the first layer has been applied, the extruder is repositioned, and a second layer is applied on the surface of the first layer. This process is repeated until the 3D object is fully constructed.
  • Some 3D printers include a touch screen interface, which allows users to easily interact with the 3D printer.
  • the touch screen interface typically includes a touch sensor panel, which may be a clear panel with a touch-sensitive surface, a display device that can be positioned behind the panel so that the touch-sensitive surface substantially covers the viewable area of the display device, and a computer processor to interpret signals from the touch-sensitive surface.
  • the touch screen interface allow a user to provide various types of input to the 3D printer by touching the touch sensor panel using a finger, stylus, or other object at a location dictated by a user interface being displayed by a display device. This interaction can include, for example, inputting commands, adjusting settings, viewing information, etc.
  • the touch screen interface can recognize a touch event (i.e., user interaction) and the position of the touch event on the touch sensor panel, can then interpret the touch event in accordance with the display appearing at the time of the touch event,and thereafter can perform one or more actions based on the touch event.
  • a touch event i.e., user interaction
  • the touch screen interface can interpret the touch event in accordance with the display appearing at the time of the touch event,and thereafter can perform one or more actions based on the touch event.
  • Example embodiments of the present invention provide methods and systems to prevent unauthorized use of a 3D printer and to verify that an adult is operating the 3D printer.
  • 3D printing requires precision during the printing process, since each layer must be precisely positioned relative to other, e.g., previously printed, layers. Therefore, it is desirable to prevent a user from interfering with the 3D printer during the printing process. Specifically, it is important that no external forces interfere with the motor, guiderail system, extruder, or the build platform as a 3D objected is printed.
  • a 3D printer Furthermore, operating a 3D printer requires adult supervision. Therefore, it is desirable for a 3D printer to have the capabilities to prevent an unsupervised child from operating the 3D printer. In particular, it is desirable for a 3D printer to be capable of differentiating between a child user and an adult user.
  • a method for authenticating a user of a 3D printer to prevent unauthorized use of the 3D printer includes, responsive to user manipulation of a touch screen interface for operating the 3D printer, obtaining a user profile from a set of user profiles, each user profile corresponding to a respective user and including a stored multi-digit number; prompting the user, by the touch screen interface of the 3D printer, to input a personal identification number (PIN); preventing use of the 3D printer if the PIN does not match the stored multi-digit number; and proceeding with an authentication procedure for authenticating the user if the PIN does match the stored multi-digit number.
  • PIN personal identification number
  • the user profile includes at least one of contact information of the user and an answer to at least one verification question.
  • the method includes notifying the user of the incorrectly input PIN, using the contact information; and updating the user profile with an updated stored multi-digit number.
  • the method proceeds with the authentication procedure, which, in an example embodiment, includes prompting the user to input a response to the at least one verification question, where, if the response matches the stored answer to the at least one verification question, the user is authenticated and a processor allows the user to operate the 3D printer, but, if the response does not match the stored answer to the at least one verification question, the method locks the user out from using the 3D printer.
  • the authentication procedure includes prompting the user to input a response to the at least one verification question, where, if the response matches the stored answer to the at least one verification question, the user is authenticated and a processor allows the user to operate the 3D printer, but, if the response does not match the stored answer to the at least one verification question, the method locks the user out from using the 3D printer.
  • the processor uses the stored contact information, e.g., e-mail address, e.g., by transmitting an e-mail to the stored e-mail address, to notify the user that there has been an incident in which the 3D printer was attempted to be used with entry of an incorrect answer to the stored security question, that the previously stored PIN has been disabled, and that a temporary PIN has been assigned (and stored in the user profile).
  • stored contact information e.g., e-mail address
  • the user can then access an interface, e.g., via a computer terminal, to modify the user profile, e.g., by setting a new PIN, setting a new security question, and/or setting a new answer to the security question.
  • the processor in the case of the lockout of the user from using the 3D printer due to entry of an incorrect answer to the security question, the processor also displays on the touch screen interface a message noting that the user has been locked out from use of the 3D printer and/or that a new PIN has been reassigned.
  • that a new PIN has been reassigned is displayed on the touchscreen without display of the new PIN, so that user access to the new PIN is via the contact medium of the stored contact information.
  • the authentication procedure even following correct input of the PIN is particularly advantageous because it can occur that a person with a relationship to the user to whom the PIN is assigned, e.g., a child, obtains access to the user's PIN, e.g., based on intimate knowledge of the user's life, characteristics, etc., but despite the relationship should not operate the printer due to safety reasons, e.g., a minor child.
  • the authentication procedure can function as a precaution to lockout such a person, e.g., the minor child, and provide the user with an opportunity to reset the PIN to one unknown to the unauthorized person.
  • the method includes detecting, by the touch screen interface, a force applied to the touch screen interface to operate the 3D printer; comparing the applied force to a force threshold value; and preventing use of the 3D printer if the applied force is less than the force threshold value. Furthermore, the method includes detecting, by the touch screen interface, a number of inputs used to apply the applied force; preventing use of the 3D printer if the number of inputs used to apply the applied force is greater than one, where the respectively applied forces of each of the individual inputs not meeting the force threshold value; and authenticating the user as an adult if 1) the applied force is greater than or equal to the force threshold value and 2) the number of inputs used to apply the applied force is equal to one.
  • the force threshold value corresponds to an average force that an adult user can apply using a single input.
  • the force threshold value corresponds to a value greater than an average force that a child can apply using a single input.
  • the authentication procedure is particularly advantageous because it prevents a child, for whom it is unsafe to operate the 3D printer, from using the 3D printer, for example, even if authenticating a particular user is not required for using the 3D printer.
  • the touch screen interface includes one or more pressure sensors (i.e., force sensors), configured to detect a force signal corresponding to an object exerting a force on the surface of the touch screen. In this manner, the touch screen interface can determine whether the touch event is creating a large force or a small force.
  • the touch screen interface includes a plurality of force sensors arranged behind the touch sensor panel, with each sensor providing an electric signal based on the deflection of the touch sensor panel when a touch event occurs.
  • FIG. 1 is a diagram corresponding to a method of generating a PIN according to an example embodiment of the present invention.
  • FIG. 2 is a flowchart depicting a method of creating a user profile according to an example embodiment of the present invention.
  • FIG. 3 is a flowchart depicting a method of authenticating a user according to an example embodiment of the present invention.
  • FIG. 4 is a flowchart depicting a method of authenticating a user according to an example embodiment of the present invention.
  • FIG. 1 shows a PIN generation method 100 for generating a PIN using a touch screen interface 101 of a 3D printer.
  • touch screen interface 101 operates under control of a processor and a non-transitory storage medium on which are stored program instructions that are executable by the processor, and that, when executed by the processor, cause the process to perform methods of operating the touch screen interface 101 , such as the example methods depicted in and described below with respect to FIGS. 1-4 .
  • touch screen interface 101 includes pressure sensors, which are configured to detect a force signal corresponding to a force exerted by an object on the surface of the touch screen interface 101 .
  • PIN Generation method 100 includes displaying, by touch screen interface 101 , Home Screen 102 , which includes, for example, user selectable options 103 , 104 , 105 , and 106 .
  • Options 103 , 104 , 105 , and 106 include, for example, a “Build” option, a “Filament” option, a “Level” option, and a “Tool” option.
  • Option 106 can, for example, correspond to the “Tool” option, in response to selection of which touch screen interface 101 displays Tool Screen 107 .
  • Tool Screen 107 includes, for example, user selectable options 108 , 109 , 110 , 111 , 112 , 113 , 114 , and 115 .
  • Options 108 , 109 , 110 , 111 , 112 , 113 , 114 , and 115 include, for example, a “Service” option, a “Wi-Fi” option, a “Calibrate” option, a “Jog Mode” option, a “Settings” option, a “Preheat” option, an “About” option, and a “Back” option.
  • option 112 can correspond to the “Settings” option
  • option 115 can correspond to the “Back” option, in response to selection of which touch screen interface 101 displays Home Screen 102 . If a user selects “Settings” option 112 , touch screen interface 101 displays Settings Screen 116 .
  • Settings Screen 116 includes, for example, user selectable options 117 , 118 , 119 , 115 , and 120 , where option 115 corresponds to “Back” option in response to selection of which Tool Screen 107 is displayed.
  • Options 117 , 118 , 119 , and 120 can include, for example, a “Set Pin Code” option, a “Lock After Minutes” option, a “Renew Token” option, and a “Home” option.
  • option 117 can correspond to the “Set Pin Code” option
  • option 120 can correspond to the “Home” option, in response to selection of the latter of which touch screen interface 101 displays Home Screen 102 .
  • touch screen interface 101 displays Pin Creation Screen 121 via which a user can set a PIN to, going forward, require entry thereof for use of the 3D printer.
  • Pin Creation Screen 121 includes, for example, numeric keypad 122 , which allows a user to generate PIN 123 .
  • PIN 123 can be, for example, a multi-digit number.
  • Alternative example embodiments support an alpha-numeric PIN.
  • Pin Creation Screen 121 also includes, for example, “Back” option 115 (for re-display of Settings Screen 116 ) and “Home” option 120 (for redisplay of Home Screen 102 ).
  • Pin creation Screen 121 also includes, for example, “Enter” option 124 , which allows a user to set the theretofore entered number as the selected PIN 123 .
  • touch screen interface 101 displays, for example, Pin Verification Screen 125 .
  • Pin Verification Screen 125 includes a numeric keypad 122 , “Back” option 115 for redisplay of PIN Creation Screen 121 , “Home” Option 120 for redisplay of Home Screen 102 , and option 126 , which is, for example, a “Done” option.
  • Pin Verification Screen 125 prompts a user to, using numeric keypad 122 , enter PIN 127 that had previously been set in PIN Creation Screen 121 . Once the user has entered PIN 127 and selected “Done” option 126 , touch screen interface 101 verifies whether PIN 127 matches PIN 123 at step 128 .
  • touch screen interface 101 confirms that a user has properly entered PIN 123 and, for example, redisplays Home Screen 102 , e.g., with a notification of success of setting the PIN.
  • the method redisplays PIN Creation Screen 121 to a new entry of PIN 123 .
  • FIG. 2 is a flowchart that illustrates a method 200 for creating a User Profile 204 using touch screen interface 101 of a 3D printer, according to an example embodiment of the present invention. Method 200 beings at step 201 .
  • touch screen interface 101 prompts a user to input information of User Profile 204 , e.g., user's email address 205 , multi-digit number 206 , answer to a verification question 207 , and other user credential information 207 .
  • the touch screen interface 101 can prompt the creation of the profile, including setting of access information by which to limit future use of the printer to a particular user.
  • the system permits use of an administrator profile by which to set multiple user profiles, each with respective access credentials.
  • one or more of these informational elements can be entered by separate input methods instead of or in addition to by way of this illustrated flow.
  • a method for generating a multi-digit number as a PIN has been described with respect to FIG. 1 .
  • a modified version of the method described with respect to FIG. 1 can be used for the flow described with respect to FIG. 2 , whereby screen 121 is a user profile generation screen, by which the PIN can be generated in addition to other user profile information.
  • Other user credential information 207 may include, for example, the user's telephone number, birthdate, etc.
  • FIG. 3 is a flowchart for a user authentication method 300 using a touch screen interface 101 of a 3D printer, according to an example embodiment of the present invention. The method beings at step 301 .
  • touch screen interface 101 obtains one or more User Profile(s) 204 .
  • touch screen interface 101 prompts a user to enter PIN 209 .
  • authentication method 300 determines if PIN 209 matches multi-digit number 206 . If PIN 209 does not match multi-digit number 206 , authentication method 300 proceeds to step 307 .
  • authentication method 300 disables multi-digit number 206 and notifies the user associated with User Profile 204 , for example, by using user email address 205 .
  • authentication method 300 prompts the user to enter an updated multi-digit number with which the User Profile 204 had been automatically updated and which had been indicated in the notification sent at step 307 or to enter an updated multi-digit number with which USER Profile 204 had been manually updated, e.g., in response to the notification sent 307 .
  • the notification is an e-mail that includes a link in response to selection of which an interface is displayed, e.g., on a screen of a remote terminal, e.g., at which the e-mail is displayed, which interface includes input fields for updating the multi-digit number 206 of User Profile 204 .
  • authentication method 300 proceeds to step 305 at which touch screen interface 101 prompts the user to provide response 210 to one or more of the at least one verification question. If response 210 does not match the stored answer to verification question 207 , authentication method 300 proceeds to step 307 , which disables multi-digit number 206 and notifies the user of the disablement.
  • authentication method 300 proceeds to step 308 , which authenticates the user as being permitted to operate the 3D printer. Method 300 ends at step 308 .
  • authentication method 300 proceeds to step 308 without asking the user to input response 210 to a verification question.
  • FIG. 4 is a flowchart that illustrates a user authentication method 400 for preventing use of a 3D printer by a minor, using touch screen interface 101 of a 3D printer, according to an example embodiment of the present invention, which authentication method can be used in combination with requiring entry of a PIN code or even where operation of the 3D printer is not limited to only specifically identified persons by way of PIN or other identification methods.
  • User authentication method 400 begins at step 401 .
  • authentication method 400 prompts a user to apply pressure to touch screen interface 101 .
  • authentication method 400 detects applied force 404 applied by the user.
  • pressure applied by a user when selecting an option, via touch screen interface 101 , requesting operation of the 3D printer is detected, the user-selection of the option beginning the authentication method 400 with step 403 .
  • authentication method 400 determines if applied force 404 is greater than or equal to force threshold value 406 .
  • force threshold value 406 is set to a force that an average adult can exert on touch screen interface 101 with one input, e.g., with a press of a single finger. Therefore, if applied force 405 is less than force threshold value 406 , authentication method 400 determines that an adult is not applying pressure to the touch screen interface 101 , and authentication method 400 returns to step 401 .
  • authentication method 400 determines if the user is using more than one input to apply applied force 404 . If more than one input is used to apply applied force 404 , then authentication method 400 determines that the user is not authenticated as an adult. In an example embodiment, where more than one pressure point is detected, the sensor detects whether pressure at any single one of the pressure points meets the threshold, in which case the user is authenticated but is otherwise not authenticated. The authentication method then returns to step 401 .
  • authentication method 400 authenticates the user who has applied force 404 as an adult. Authentication method 400 ends at step 409 .
  • the sensor for detecting the force includes a capacitor arrangement, where an external layer of the touch screen interface 101 is flexible and can be bent downward towards an underlying layer, where the distance between the external and underlying layers varies depending on the amount of pressure applied, which distance can be detected based on a change in capacitance in response to a change in distance between electrodes integrated in the external and underlying layers, respectively.
  • a plurality of electrode pairs can be arranged, e.g., in a grid, so that a pattern of distance values are detectable by which to ascertain the number of pressure points used to apply pressure.
  • a single pressure point is expected to match to a stored gradient of pressure over an applied area, e.g., with greatest pressure at the center of an applied pressure and gradually lower pressure in a direction that extends radially outward from the center. If a pressure pattern includes a center of greatest pressure, followed by gradually lower pressure, and then continuing further away from the initial center with a gradual increase in pressure to another center point of high pressure, such a pattern indicates presence of two pressure points.
  • the external layer of the touch screen interface 101 can be formed of a glass or a flexible shape conforming polymer.
  • An example embodiment of the present invention is directed to processing circuitry, e.g., including one or more processors, which may be implemented using any conventional processing circuit and device or combination thereof, e.g., a Central Processing Unit (CPU) of a Personal Computer (PC) or other workstation processor, to execute code provided, e.g., on a non-transitory computer-readable medium including any conventional memory device, to perform any of the methods described herein, alone or in combination.
  • the one or more processors can be embodied in a server or user terminal or combination thereof.
  • the user terminal can be embodied, for example, as a desktop, laptop, hand-held device, Personal Digital Assistant (PDA), television set-top Internet appliance, mobile telephone, smart phone, etc., or as a combination of one or more thereof.
  • the memory device can include any conventional permanent and/or temporary memory circuits or combination thereof, a non-exhaustive list of which includes Random Access Memory (RAM), Read Only Memory (ROM), Compact Disks (CD), Digital Versatile Disk (DVD), and magnetic tape.
  • An example embodiment of the present invention is directed to one or more non-transitory computer-readable media, e.g., as described above, on which are stored instructions that are executable by a processor and that, when executed by the processor, perform the various methods described herein, each alone or in combination or sub-steps thereof in isolation or in other combinations.
  • An example embodiment of the present invention is directed to a method, e.g., of a hardware component or machine, of transmitting instructions executable by a processor to perform the various methods described herein, each alone or in combination or sub-steps thereof in isolation or in other combinations.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Chemical & Material Sciences (AREA)
  • Materials Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Manufacturing & Machinery (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Mechanical Engineering (AREA)
  • Optics & Photonics (AREA)
  • Social Psychology (AREA)
  • User Interface Of Digital Computer (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

A method for authenticating a user of a 3D printer to prevent unauthorized use of the 3D printer includes obtaining a user profile from a set of user profiles, each user profile corresponding to a user and including a stored multi-digit number; prompting the user, by a touch screen interface of the 3D printer, to input a personal identification number (PIN); preventing use of the 3D printer if the PIN does not match the stored multi-digit number; and authenticating the user if the PIN does match the stored multi-digit number. The method includes prompting the user to apply a force to the touch screen interface; detecting an applied force; comparing the applied force to a force threshold value; and preventing use of the 3D printer if the applied force is less than the force threshold value.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • The present application is a divisional application of U.S. patent application Ser. No. 15/223,679, filed on Jul. 29, 2016, the content of which is hereby incorporated by reference herein in its entirety.
  • FIELD OF THE INVENTION
  • The present invention relates generally to authenticating a user of a 3D printer, and more specifically, to preventing unauthorized use of a 3D printer.
  • BACKGROUND
  • 3D printing, or additive manufacturing, is a process of making three dimensional solid objects based on blueprints provided by digital files. The synthesis of the desired 3D solid object is achieved by strategically generating successive layers of an additive material in a pattern on a platform of a 3D printer until the entire object is created. The synthesis of the 3D object is driven by the digital files that provide the specifications that describe how to create the pattern of layers and the materials used to generate the object. The digital files specifying the design are provided by the user, and examples of the digital files read by the 3D printer include G-code files, computer-aided design (“CAD”) files, STereoLithography (“STL”) CAD files, and other file types generally used in additive manufacturing processes. In some instances, the digital files refer to a 3D model of a new object, but alternatively, the digital files can refer to a copy of an object derived from the usage of a 3D scanner.
  • The generation of the successive layers of the additive material can be performed, for example, according to any one of: (1) Vat Photopolymerisation, (2) Material Jetting, (3) Binder Jetting, (4) Direction Energy Deposition, (5) Powder Bed Fusion, (6) Sheet Lamination, or (7) Material Extrusion. Specific processes of Material Extrusion used to generate the successive layers can involve making sequential deposits using fused deposition modeling (“FDM”), fused filament fabrication (“FFF”), or Direct Ink Writing (“DIW”).
  • The materials used as the “ink” of the 3D printer to generate the 3D object can include, for example, any of: powder material, polymer material, thermoplastics, eutectic metals, edible materials, rubbers, modeling clay, plasticine, metal clay, ceramic materials, metal alloys, papers, composite materials composed of ceramics and metallic materials (“cermet”), metal matrix composites, ceramic matrix composites, photopolymers, plaster, stainless steel, aluminum, plastic film, and metal foil.
  • 3D printers are generally protected from external influences by a build cage, and, within the build cage, the 3-D printer typically includes the following: (1) at least one extruder, (2) a guide rail system, (3) a build platform, (4) at least one filament spool, (5) and at least one motor for maneuvering the at least one extruder. In addition, the extruder can include a cooling system to regulate the temperature of the extruder.
  • Typically, during the operation of an FFF 3D printer, a plastic filament is unwound from a filament spool and supplied to an extruder. The extruder applies heat at a specific temperature to the filament, which melts the plastic filament to start material flow. Once the plastic filament has begun to flow, the motor for maneuvering the extruder uses the guide rail system to position (both horizontally and vertically) the extruder relative to the build platform to apply a first layer of the 3D object to the build platform. Due the characteristics of the filament and the cooling system of the extruder, the filament cools shortly after it has been extruded. Once the first layer has been applied, the extruder is repositioned, and a second layer is applied on the surface of the first layer. This process is repeated until the 3D object is fully constructed.
  • Some 3D printers include a touch screen interface, which allows users to easily interact with the 3D printer. The touch screen interface typically includes a touch sensor panel, which may be a clear panel with a touch-sensitive surface, a display device that can be positioned behind the panel so that the touch-sensitive surface substantially covers the viewable area of the display device, and a computer processor to interpret signals from the touch-sensitive surface. The touch screen interface allow a user to provide various types of input to the 3D printer by touching the touch sensor panel using a finger, stylus, or other object at a location dictated by a user interface being displayed by a display device. This interaction can include, for example, inputting commands, adjusting settings, viewing information, etc.
  • In general, the touch screen interface can recognize a touch event (i.e., user interaction) and the position of the touch event on the touch sensor panel, can then interpret the touch event in accordance with the display appearing at the time of the touch event,and thereafter can perform one or more actions based on the touch event.
  • SUMMARY
  • Example embodiments of the present invention provide methods and systems to prevent unauthorized use of a 3D printer and to verify that an adult is operating the 3D printer.
  • 3D printing requires precision during the printing process, since each layer must be precisely positioned relative to other, e.g., previously printed, layers. Therefore, it is desirable to prevent a user from interfering with the 3D printer during the printing process. Specifically, it is important that no external forces interfere with the motor, guiderail system, extruder, or the build platform as a 3D objected is printed.
  • Furthermore, it is advantageous to protect a user from dangerous conditions that occur during the printing process, since the operating temperature of the extruder can reach upwards of 397° F., which can cause serious injury to the user. Therefore, it is desirable for a 3D printer to prevent a user from inadvertently contacting the motor, guiderail system, extruder, or the build platform during the printing process.
  • Furthermore, operating a 3D printer requires adult supervision. Therefore, it is desirable for a 3D printer to have the capabilities to prevent an unsupervised child from operating the 3D printer. In particular, it is desirable for a 3D printer to be capable of differentiating between a child user and an adult user.
  • According to an example embodiment of the present invention, a method for authenticating a user of a 3D printer to prevent unauthorized use of the 3D printer includes, responsive to user manipulation of a touch screen interface for operating the 3D printer, obtaining a user profile from a set of user profiles, each user profile corresponding to a respective user and including a stored multi-digit number; prompting the user, by the touch screen interface of the 3D printer, to input a personal identification number (PIN); preventing use of the 3D printer if the PIN does not match the stored multi-digit number; and proceeding with an authentication procedure for authenticating the user if the PIN does match the stored multi-digit number.
  • In an example embodiment, the user profile includes at least one of contact information of the user and an answer to at least one verification question. In an example embodiment, if the PIN does not match the stored multi-digit number, the method includes notifying the user of the incorrectly input PIN, using the contact information; and updating the user profile with an updated stored multi-digit number. Additionally, if the PIN matches the stored multi-digit number, in an example embodiment, the method proceeds with the authentication procedure, which, in an example embodiment, includes prompting the user to input a response to the at least one verification question, where, if the response matches the stored answer to the at least one verification question, the user is authenticated and a processor allows the user to operate the 3D printer, but, if the response does not match the stored answer to the at least one verification question, the method locks the user out from using the 3D printer.
  • In an example embodiment, in the case of the lockout of the user from using the 3D printer due to entry of an incorrect answer to the security question, the processor uses the stored contact information, e.g., e-mail address, e.g., by transmitting an e-mail to the stored e-mail address, to notify the user that there has been an incident in which the 3D printer was attempted to be used with entry of an incorrect answer to the stored security question, that the previously stored PIN has been disabled, and that a temporary PIN has been assigned (and stored in the user profile). The user can then access an interface, e.g., via a computer terminal, to modify the user profile, e.g., by setting a new PIN, setting a new security question, and/or setting a new answer to the security question. In an example embodiment, in the case of the lockout of the user from using the 3D printer due to entry of an incorrect answer to the security question, the processor also displays on the touch screen interface a message noting that the user has been locked out from use of the 3D printer and/or that a new PIN has been reassigned. In an example embodiment, that a new PIN has been reassigned is displayed on the touchscreen without display of the new PIN, so that user access to the new PIN is via the contact medium of the stored contact information. The authentication procedure even following correct input of the PIN is particularly advantageous because it can occur that a person with a relationship to the user to whom the PIN is assigned, e.g., a child, obtains access to the user's PIN, e.g., based on intimate knowledge of the user's life, characteristics, etc., but despite the relationship should not operate the printer due to safety reasons, e.g., a minor child. The authentication procedure can function as a precaution to lockout such a person, e.g., the minor child, and provide the user with an opportunity to reset the PIN to one unknown to the unauthorized person.
  • In an example embodiment, the method includes detecting, by the touch screen interface, a force applied to the touch screen interface to operate the 3D printer; comparing the applied force to a force threshold value; and preventing use of the 3D printer if the applied force is less than the force threshold value. Furthermore, the method includes detecting, by the touch screen interface, a number of inputs used to apply the applied force; preventing use of the 3D printer if the number of inputs used to apply the applied force is greater than one, where the respectively applied forces of each of the individual inputs not meeting the force threshold value; and authenticating the user as an adult if 1) the applied force is greater than or equal to the force threshold value and 2) the number of inputs used to apply the applied force is equal to one. For example, the force threshold value corresponds to an average force that an adult user can apply using a single input. In another example, the force threshold value corresponds to a value greater than an average force that a child can apply using a single input. The authentication procedure is particularly advantageous because it prevents a child, for whom it is unsafe to operate the 3D printer, from using the 3D printer, for example, even if authenticating a particular user is not required for using the 3D printer.
  • According to an example embodiment, the touch screen interface includes one or more pressure sensors (i.e., force sensors), configured to detect a force signal corresponding to an object exerting a force on the surface of the touch screen. In this manner, the touch screen interface can determine whether the touch event is creating a large force or a small force. For example, in an example embodiment, the touch screen interface includes a plurality of force sensors arranged behind the touch sensor panel, with each sensor providing an electric signal based on the deflection of the touch sensor panel when a touch event occurs.
  • These and other features, aspects, and advantages of the present invention are described in the following detailed description in connection with certain exemplary embodiments and in view of the accompanying drawings, throughout which like characters represent like parts. However, the detailed description and the appended drawings describe and illustrate only particular example embodiments of the invention and are therefore not to be considered limiting of its scope, for the invention may encompass other equally effective embodiments.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram corresponding to a method of generating a PIN according to an example embodiment of the present invention.
  • FIG. 2 is a flowchart depicting a method of creating a user profile according to an example embodiment of the present invention.
  • FIG. 3 is a flowchart depicting a method of authenticating a user according to an example embodiment of the present invention.
  • FIG. 4 is a flowchart depicting a method of authenticating a user according to an example embodiment of the present invention.
  • DETAILED DESCRIPTION
  • FIG. 1 shows a PIN generation method 100 for generating a PIN using a touch screen interface 101 of a 3D printer. In an example embodiment, touch screen interface 101 operates under control of a processor and a non-transitory storage medium on which are stored program instructions that are executable by the processor, and that, when executed by the processor, cause the process to perform methods of operating the touch screen interface 101, such as the example methods depicted in and described below with respect to FIGS. 1-4.
  • In an example embodiment, touch screen interface 101 includes pressure sensors, which are configured to detect a force signal corresponding to a force exerted by an object on the surface of the touch screen interface 101.
  • In an example embodiment, PIN Generation method 100 includes displaying, by touch screen interface 101, Home Screen 102, which includes, for example, user selectable options 103, 104, 105, and 106. Options 103, 104, 105, and 106 include, for example, a “Build” option, a “Filament” option, a “Level” option, and a “Tool” option. Option 106 can, for example, correspond to the “Tool” option, in response to selection of which touch screen interface 101 displays Tool Screen 107.
  • Tool Screen 107 includes, for example, user selectable options 108, 109, 110, 111, 112, 113, 114, and 115. Options 108, 109, 110, 111, 112, 113, 114, and 115 include, for example, a “Service” option, a “Wi-Fi” option, a “Calibrate” option, a “Jog Mode” option, a “Settings” option, a “Preheat” option, an “About” option, and a “Back” option. For example, option 112 can correspond to the “Settings” option, and option 115 can correspond to the “Back” option, in response to selection of which touch screen interface 101 displays Home Screen 102. If a user selects “Settings” option 112, touch screen interface 101 displays Settings Screen 116.
  • Settings Screen 116 includes, for example, user selectable options 117, 118, 119, 115, and 120, where option 115 corresponds to “Back” option in response to selection of which Tool Screen 107 is displayed. Options 117, 118, 119, and 120 can include, for example, a “Set Pin Code” option, a “Lock After Minutes” option, a “Renew Token” option, and a “Home” option. For example, option 117 can correspond to the “Set Pin Code” option, and option 120 can correspond to the “Home” option, in response to selection of the latter of which touch screen interface 101 displays Home Screen 102. In an example embodiment, if a user selects “Set Pin Code” option 117, touch screen interface 101 displays Pin Creation Screen 121 via which a user can set a PIN to, going forward, require entry thereof for use of the 3D printer.
  • In an example embodiment, Pin Creation Screen 121 includes, for example, numeric keypad 122, which allows a user to generate PIN 123. PIN 123 can be, for example, a multi-digit number. Alternative example embodiments support an alpha-numeric PIN. Pin Creation Screen 121 also includes, for example, “Back” option 115 (for re-display of Settings Screen 116) and “Home” option 120 (for redisplay of Home Screen 102). Pin creation Screen 121 also includes, for example, “Enter” option 124, which allows a user to set the theretofore entered number as the selected PIN 123. In an example embodiment, once a user has entered PIN 123, touch screen interface 101 displays, for example, Pin Verification Screen 125.
  • In an example embodiment, Pin Verification Screen 125 includes a numeric keypad 122, “Back” option 115 for redisplay of PIN Creation Screen 121, “Home” Option 120 for redisplay of Home Screen 102, and option 126, which is, for example, a “Done” option. Pin Verification Screen 125, for example, prompts a user to, using numeric keypad 122, enter PIN 127 that had previously been set in PIN Creation Screen 121. Once the user has entered PIN 127 and selected “Done” option 126, touch screen interface 101 verifies whether PIN 127 matches PIN 123 at step 128. If PIN 127 matches PIN 123, touch screen interface 101 confirms that a user has properly entered PIN 123 and, for example, redisplays Home Screen 102, e.g., with a notification of success of setting the PIN. On the other hand, if the compared PINs do not match, the method redisplays PIN Creation Screen 121 to a new entry of PIN 123.
  • FIG. 2 is a flowchart that illustrates a method 200 for creating a User Profile 204 using touch screen interface 101 of a 3D printer, according to an example embodiment of the present invention. Method 200 beings at step 201.
  • At step 202, touch screen interface 101 prompts a user to input information of User Profile 204, e.g., user's email address 205, multi-digit number 206, answer to a verification question 207, and other user credential information 207. For example, upon first use of the printer, the touch screen interface 101 can prompt the creation of the profile, including setting of access information by which to limit future use of the printer to a particular user. In an example embodiment, the system permits use of an administrator profile by which to set multiple user profiles, each with respective access credentials. According to alternative example embodiments, one or more of these informational elements can be entered by separate input methods instead of or in addition to by way of this illustrated flow. For example, a method for generating a multi-digit number as a PIN has been described with respect to FIG. 1. In an example embodiment, a modified version of the method described with respect to FIG. 1 can be used for the flow described with respect to FIG. 2, whereby screen 121 is a user profile generation screen, by which the PIN can be generated in addition to other user profile information. Other user credential information 207 may include, for example, the user's telephone number, birthdate, etc. Once the user has entered all required information for the creation of User Profile 204, method 200 ends at step 203. In an alternative example embodiment, the PIN and/or other user profile information can be set remotely at a user terminal that is communicatively coupled to the 3D printer that includes its touch screen interface 101. For example, the communicatively coupled terminals are assigned to respective users who have been given permission to use the 3D printer.
  • FIG. 3 is a flowchart for a user authentication method 300 using a touch screen interface 101 of a 3D printer, according to an example embodiment of the present invention. The method beings at step 301.
  • At step 302, e.g., in response to a user input to begin operation of the 3D printer, touch screen interface 101 obtains one or more User Profile(s) 204. At step 303, touch screen interface 101 prompts a user to enter PIN 209. At step 304, authentication method 300 determines if PIN 209 matches multi-digit number 206. If PIN 209 does not match multi-digit number 206, authentication method 300 proceeds to step 307. At step 307, authentication method 300 disables multi-digit number 206 and notifies the user associated with User Profile 204, for example, by using user email address 205. After multi-digit number 206 has been disabled, authentication method 300 prompts the user to enter an updated multi-digit number with which the User Profile 204 had been automatically updated and which had been indicated in the notification sent at step 307 or to enter an updated multi-digit number with which USER Profile 204 had been manually updated, e.g., in response to the notification sent 307. For example, according to an example embodiment, the notification is an e-mail that includes a link in response to selection of which an interface is displayed, e.g., on a screen of a remote terminal, e.g., at which the e-mail is displayed, which interface includes input fields for updating the multi-digit number 206 of User Profile 204.
  • If PIN 209 matches multi-digit number 206, then authentication method 300 proceeds to step 305 at which touch screen interface 101 prompts the user to provide response 210 to one or more of the at least one verification question. If response 210 does not match the stored answer to verification question 207, authentication method 300 proceeds to step 307, which disables multi-digit number 206 and notifies the user of the disablement.
  • If response 210 matches answer to verification question 207, authentication method 300 proceeds to step 308, which authenticates the user as being permitted to operate the 3D printer. Method 300 ends at step 308.
  • In an alternative example embodiment, if, at step 304, PIN 209 matches multi-digit number 206, authentication method 300 proceeds to step 308 without asking the user to input response 210 to a verification question.
  • FIG. 4 is a flowchart that illustrates a user authentication method 400 for preventing use of a 3D printer by a minor, using touch screen interface 101 of a 3D printer, according to an example embodiment of the present invention, which authentication method can be used in combination with requiring entry of a PIN code or even where operation of the 3D printer is not limited to only specifically identified persons by way of PIN or other identification methods. User authentication method 400 begins at step 401.
  • At step 402, authentication method 400 prompts a user to apply pressure to touch screen interface 101. At step 403, authentication method 400 detects applied force 404 applied by the user. Alternatively, instead of a dedicated prompt for application of pressure and subsequent detection of pressure applied in response to the prompt, pressure applied by a user when selecting an option, via touch screen interface 101, requesting operation of the 3D printer, is detected, the user-selection of the option beginning the authentication method 400 with step 403. Next, at step 405, authentication method 400 determines if applied force 404 is greater than or equal to force threshold value 406. For example, in an example embodiment, force threshold value 406 is set to a force that an average adult can exert on touch screen interface 101 with one input, e.g., with a press of a single finger. Therefore, if applied force 405 is less than force threshold value 406, authentication method 400 determines that an adult is not applying pressure to the touch screen interface 101, and authentication method 400 returns to step 401.
  • If applied force 405 is greater than or equal to force threshold value 406, then authentication method 400 proceeds to step 407. At step 407, authentication method 400 determines if the user is using more than one input to apply applied force 404. If more than one input is used to apply applied force 404, then authentication method 400 determines that the user is not authenticated as an adult. In an example embodiment, where more than one pressure point is detected, the sensor detects whether pressure at any single one of the pressure points meets the threshold, in which case the user is authenticated but is otherwise not authenticated. The authentication method then returns to step 401.
  • If force 404 is sensed as having been applied by a single input, e.g., a single finger, then, at step 408, authentication method 400 authenticates the user who has applied force 404 as an adult. Authentication method 400 ends at step 409.
  • In an example embodiment, the sensor for detecting the force includes a capacitor arrangement, where an external layer of the touch screen interface 101 is flexible and can be bent downward towards an underlying layer, where the distance between the external and underlying layers varies depending on the amount of pressure applied, which distance can be detected based on a change in capacitance in response to a change in distance between electrodes integrated in the external and underlying layers, respectively. A plurality of electrode pairs can be arranged, e.g., in a grid, so that a pattern of distance values are detectable by which to ascertain the number of pressure points used to apply pressure. For example, a single pressure point is expected to match to a stored gradient of pressure over an applied area, e.g., with greatest pressure at the center of an applied pressure and gradually lower pressure in a direction that extends radially outward from the center. If a pressure pattern includes a center of greatest pressure, followed by gradually lower pressure, and then continuing further away from the initial center with a gradual increase in pressure to another center point of high pressure, such a pattern indicates presence of two pressure points.
  • In an example embodiment, the external layer of the touch screen interface 101 can be formed of a glass or a flexible shape conforming polymer.
  • An example embodiment of the present invention is directed to processing circuitry, e.g., including one or more processors, which may be implemented using any conventional processing circuit and device or combination thereof, e.g., a Central Processing Unit (CPU) of a Personal Computer (PC) or other workstation processor, to execute code provided, e.g., on a non-transitory computer-readable medium including any conventional memory device, to perform any of the methods described herein, alone or in combination. The one or more processors can be embodied in a server or user terminal or combination thereof. The user terminal can be embodied, for example, as a desktop, laptop, hand-held device, Personal Digital Assistant (PDA), television set-top Internet appliance, mobile telephone, smart phone, etc., or as a combination of one or more thereof. The memory device can include any conventional permanent and/or temporary memory circuits or combination thereof, a non-exhaustive list of which includes Random Access Memory (RAM), Read Only Memory (ROM), Compact Disks (CD), Digital Versatile Disk (DVD), and magnetic tape.
  • An example embodiment of the present invention is directed to one or more non-transitory computer-readable media, e.g., as described above, on which are stored instructions that are executable by a processor and that, when executed by the processor, perform the various methods described herein, each alone or in combination or sub-steps thereof in isolation or in other combinations.
  • An example embodiment of the present invention is directed to a method, e.g., of a hardware component or machine, of transmitting instructions executable by a processor to perform the various methods described herein, each alone or in combination or sub-steps thereof in isolation or in other combinations.
  • The above description is intended to be illustrative, and not restrictive. Those skilled in the art can appreciate from the foregoing description that the present invention can be implemented in a variety of forms, and that the various embodiments can be implemented alone or in combination. Therefore, while the embodiments of the present invention have been described in connection with particular examples thereof, the true scope of the embodiments and/or methods of the present invention should not be so limited since other modifications will become apparent to the skilled practitioner upon a study of the drawings, specification, and following claims.

Claims (12)

What is claimed is:
1. A method for authenticating a user of a 3D printer to prevent unauthorized use of the 3D printer, the method comprising:
obtaining, by processing circuitry, a user profile corresponding to a user and including a stored multi-digit number;
obtaining, via a touch screen interface of the 3D printer, input of a personal identification number (PIN);
comparing, by the processing circuitry, the input PIN to the multi-digit number of the obtained user profile; and
executing, by the processing circuitry, an algorithm according to which use of the 3D printer is prevented if the PIN does not match the stored multi-digit number, and the user is authenticated if the PIN does match the stored multi-digit number.
2. The method of claim 1, wherein:
the user profile further includes an answer to at least one verification question; and
the authentication of the user if the PIN matches the stored multi-digit number includes:
prompting the user to input a response to the at least one verification question;
if the response matches the answer to the at least one verification question, enabling the user to operate the 3D printer; and
if the response does not match the answer to the at least one verification question, preventing use of the 3D printer.
3. The method of claim 2, wherein the user profile further includes user contact information, and, if the response does not match the answer to the at least one verification question, the algorithm causes the processing circuitry to disable the PIN and transmit a communication using the contact information of the user profile informing of the disablement of the PIN.
4. The method of claim 3, wherein, if the response does not match the answer to the at least one verification question, the algorithm causes the processing circuitry to generate a new PIN and include an identification of the new PIN in the transmitted communication.
5. The method of claim 3, wherein, if the response does not match the answer to the at least one verification question, the algorithm causes the processing circuitry to include in the transmitted communication a link to an electronic location via which a new PIN and multi-digit number are settable.
6. The method of claim 5, wherein the electronic location is a webpage, settings set at the webpage being updated in a central server communicatively coupled to the 3D printer.
7. A non-transitory, machine-readable storage medium on which are stored program instructions that are executable by a processor and that, when executed by the processor, cause the processor to perform a method for authenticating a user of a 3D printer to prevent unauthorized use of the 3D printer, the method comprising:
obtaining a user profile corresponding to a user and including a stored multi-digit number;
obtaining, via a touch screen interface of the 3D printer, input of a personal identification number (PIN);
comparing the input PIN to the multi-digit number of the obtained user profile; and
executing an algorithm according to which use of the 3D printer is prevented if the PIN does not match the stored multi-digit number, and the user is authenticated if the PIN does match the stored multi-digit number.
8. The machine-readable storage medium of claim 7, wherein:
the user profile further includes an answer to at least one verification question; and
the authentication of the user if the PIN matches the stored multi-digit number includes:
prompting the user to input a response to the at least one verification question;
if the response matches the answer to the at least one verification question, enabling the user to operate the 3D printer; and
if the response does not match the answer to the at least one verification question, preventing use of the 3D printer.
9. The machine-readable storage medium of claim 8, wherein the user profile further includes user contact information, and, if the response does not match the answer to the at least one verification question, the algorithm causes the processing circuitry to disable the PIN and transmit a communication using the contact information of the user profile informing of the disablement of the PIN.
10. The machine-readable storage medium of claim 9, wherein, if the response does not match the answer to the at least one verification question, the algorithm causes the processing circuitry to generate a new PIN and include an identification of the new PIN in the transmitted communication.
11. The machine-readable storage medium of claim 9 wherein, if the response does not match the answer to the at least one verification question, the algorithm causes the processing circuitry to include in the transmitted communication a link to an electronic location via which a new PIN and multi-digit number are settable.
12. The machine-readable storage medium of claim 11, wherein the electronic location is a webpage, settings set at the webpage being updated in a central server communicatively coupled to the 3D printer.
US15/724,364 2016-07-29 2017-10-04 3d printer interface lockout Abandoned US20180035013A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/724,364 US20180035013A1 (en) 2016-07-29 2017-10-04 3d printer interface lockout

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/223,679 US11070703B2 (en) 2016-07-29 2016-07-29 3D printer touchscreen interface lockout
US15/724,364 US20180035013A1 (en) 2016-07-29 2017-10-04 3d printer interface lockout

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/223,679 Division US11070703B2 (en) 2016-07-29 2016-07-29 3D printer touchscreen interface lockout

Publications (1)

Publication Number Publication Date
US20180035013A1 true US20180035013A1 (en) 2018-02-01

Family

ID=59506245

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/223,679 Active 2038-04-14 US11070703B2 (en) 2016-07-29 2016-07-29 3D printer touchscreen interface lockout
US15/724,364 Abandoned US20180035013A1 (en) 2016-07-29 2017-10-04 3d printer interface lockout

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/223,679 Active 2038-04-14 US11070703B2 (en) 2016-07-29 2016-07-29 3D printer touchscreen interface lockout

Country Status (4)

Country Link
US (2) US11070703B2 (en)
EP (1) EP3491563B1 (en)
CN (1) CN109791580B (en)
WO (1) WO2018019750A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170218660A1 (en) * 2016-01-29 2017-08-03 Y Soft Corporation Secure 3d printer and 3d printer management network
CN108616501A (en) * 2018-03-09 2018-10-02 海尔集团技术研发中心 The data guard method and system of threedimensional model under a kind of cloud manufacturing environment
US11615171B2 (en) * 2019-07-31 2023-03-28 Masaaki Tokuyama Terminal device, information processing method, and computer-readable recording medium storing program for authentication

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013217422A1 (en) 2013-09-02 2015-03-05 Carl Zeiss Industrielle Messtechnik Gmbh Coordinate measuring machine and method for measuring and at least partially producing a workpiece
WO2019206903A1 (en) 2018-04-23 2019-10-31 Carl Zeiss Industrial Metrology, Llc Method and arrangement for producing a workpiece by using adaptive closed-loop control of additive manufacturing techniques

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060230286A1 (en) * 2005-03-30 2006-10-12 Hiroshi Kitada System and method for authenticating a user of an image processing system
US20070002368A1 (en) * 2005-06-30 2007-01-04 Fatima Corona System and method for sending a stored scanned job to printers or group of printers from a multi-function peripheral device
US20070245153A1 (en) * 2006-04-18 2007-10-18 Brent Richtsmeier System and method for user authentication in a multi-function printer with a biometric scanning device
US20080103972A1 (en) * 2006-10-25 2008-05-01 Payfont Limited Secure authentication and payment system
US20080288996A1 (en) * 2007-05-15 2008-11-20 At&T Knowledge Ventures, Lp Method and apparatus for provisioning media content in a multi-user environment
US20120166533A1 (en) * 2010-12-23 2012-06-28 Yigal Dan Rubinstein Predicting real-world connections based on interactions in social networking system
US20150286790A1 (en) * 2013-07-02 2015-10-08 Anthelio Healthcare Solutions Inc. System and method for secure messaging
US20160295037A1 (en) * 2015-03-31 2016-10-06 Brother Kogyo Kabushiki Kaisha Server and Communication System Including the Same
US20160301533A1 (en) * 2015-04-13 2016-10-13 Ilantus Technologies Pvt. Ltd. System and method for password recovery using fuzzy logic
US20170002392A1 (en) * 1999-09-28 2017-01-05 Baxalta Innovations Gmbh Medium for the protein-free and serum-free cultivation of cells
US9805187B1 (en) * 2007-12-12 2017-10-31 Wells Fargo Bank, N.A. Password reset system
US9954867B1 (en) * 2015-12-15 2018-04-24 Amazon Technologies, Inc. Verification of credential reset

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004297468A (en) * 2003-03-27 2004-10-21 Lg Electronics Inc Remote control unit
JP4303746B2 (en) * 2006-11-22 2009-07-29 株式会社シーイーシー Secure print system and method
US9159179B2 (en) 2007-05-31 2015-10-13 Ricoh Company, Ltd. Common access card security and document security enhancement
US20100097324A1 (en) * 2008-10-20 2010-04-22 Dell Products L.P. Parental Controls Based on Touchscreen Input
US8988191B2 (en) * 2009-08-27 2015-03-24 Symbol Technologies, Inc. Systems and methods for pressure-based authentication of an input on a touch screen
GB201011146D0 (en) * 2010-07-02 2010-08-18 Vodafone Ip Licensing Ltd Mobile computing device
US20120126941A1 (en) * 2010-11-19 2012-05-24 Research In Motion Limited Pressure password for a touchscreen device
EP2463798A1 (en) * 2010-11-19 2012-06-13 Research In Motion Limited Pressure password for a touchscreen device
US9526006B2 (en) * 2010-11-29 2016-12-20 Biocatch Ltd. System, method, and device of detecting identity of a user of an electronic device
CN102203794A (en) * 2011-06-01 2011-09-28 华为终端有限公司 A terminal authentication method and a device thereof
US9354731B1 (en) * 2012-06-20 2016-05-31 Amazon Technologies, Inc. Multi-dimension touch input
US9483628B2 (en) * 2013-08-29 2016-11-01 Paypal, Inc. Methods and systems for altering settings or performing an action by a user device based on detecting or authenticating a user of the user device
US9594893B2 (en) * 2014-01-15 2017-03-14 Lenovo (Singapore) Pte. Ltd. Multi-touch local device authentication
JP2015207034A (en) * 2014-04-17 2015-11-19 アルパイン株式会社 information input device and information input method
US9389708B2 (en) * 2014-05-08 2016-07-12 Atmel Corporation Active stylus with force sensor
DE202015006142U1 (en) * 2014-09-02 2015-12-09 Apple Inc. Electronic touch communication
CN105635422A (en) * 2014-11-07 2016-06-01 中兴通讯股份有限公司 Intelligent terminal and state control method thereof
US20160328065A1 (en) * 2015-01-12 2016-11-10 Rockwell Collins, Inc. Touchscreen with Dynamic Control of Activation Force
US9612685B2 (en) * 2015-04-09 2017-04-04 Microsoft Technology Licensing, Llc Force-sensitive touch sensor compensation
CN104966011B (en) * 2015-06-12 2018-07-17 西安交通大学 Mobile terminal child user non-cooperating formula judges and the method for limitation operating right
JP6525781B2 (en) * 2015-07-21 2019-06-05 キヤノン株式会社 Management system, control method of management system, and program
CN105183360A (en) * 2015-09-09 2015-12-23 魅族科技(中国)有限公司 Method and device for lighting up screen and terminal
CN105224221B (en) * 2015-09-09 2019-01-25 魅族科技(中国)有限公司 A kind of terminal device and labeling method
US10180755B2 (en) * 2016-02-29 2019-01-15 Apple Inc. Electronic device with dynamic thresholding for force detection

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170002392A1 (en) * 1999-09-28 2017-01-05 Baxalta Innovations Gmbh Medium for the protein-free and serum-free cultivation of cells
US20060230286A1 (en) * 2005-03-30 2006-10-12 Hiroshi Kitada System and method for authenticating a user of an image processing system
US20070002368A1 (en) * 2005-06-30 2007-01-04 Fatima Corona System and method for sending a stored scanned job to printers or group of printers from a multi-function peripheral device
US20070245153A1 (en) * 2006-04-18 2007-10-18 Brent Richtsmeier System and method for user authentication in a multi-function printer with a biometric scanning device
US20080103972A1 (en) * 2006-10-25 2008-05-01 Payfont Limited Secure authentication and payment system
US20080288996A1 (en) * 2007-05-15 2008-11-20 At&T Knowledge Ventures, Lp Method and apparatus for provisioning media content in a multi-user environment
US9805187B1 (en) * 2007-12-12 2017-10-31 Wells Fargo Bank, N.A. Password reset system
US20120166533A1 (en) * 2010-12-23 2012-06-28 Yigal Dan Rubinstein Predicting real-world connections based on interactions in social networking system
US20150286790A1 (en) * 2013-07-02 2015-10-08 Anthelio Healthcare Solutions Inc. System and method for secure messaging
US20160295037A1 (en) * 2015-03-31 2016-10-06 Brother Kogyo Kabushiki Kaisha Server and Communication System Including the Same
US20160301533A1 (en) * 2015-04-13 2016-10-13 Ilantus Technologies Pvt. Ltd. System and method for password recovery using fuzzy logic
US9954867B1 (en) * 2015-12-15 2018-04-24 Amazon Technologies, Inc. Verification of credential reset

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170218660A1 (en) * 2016-01-29 2017-08-03 Y Soft Corporation Secure 3d printer and 3d printer management network
US10006225B2 (en) * 2016-01-29 2018-06-26 Y Soft Corporation, A.S. Secure 3D printer and 3D printer management network
CN108616501A (en) * 2018-03-09 2018-10-02 海尔集团技术研发中心 The data guard method and system of threedimensional model under a kind of cloud manufacturing environment
US11615171B2 (en) * 2019-07-31 2023-03-28 Masaaki Tokuyama Terminal device, information processing method, and computer-readable recording medium storing program for authentication

Also Published As

Publication number Publication date
WO2018019750A1 (en) 2018-02-01
CN109791580A (en) 2019-05-21
EP3491563B1 (en) 2021-11-17
CN109791580B (en) 2023-12-12
US20180035011A1 (en) 2018-02-01
EP3491563A1 (en) 2019-06-05
US11070703B2 (en) 2021-07-20

Similar Documents

Publication Publication Date Title
EP3491563B1 (en) 3d printer interface lockout
CN115118522B (en) Method, apparatus and machine readable medium for resetting login credentials
US20180114003A1 (en) Authentication Device, Authentication Method, and Electronic Device That Reduce Password Peeking by Third Person
US8997257B2 (en) Information processing apparatus and information processing method
US8869261B1 (en) Securing access to touch-screen devices
US20060164693A1 (en) Generating a protected document image having a visible verification image
US10686798B2 (en) Information processing apparatus, method for controlling information processing apparatus, and storage medium
US20130258392A1 (en) Image processing apparatus, image processing apparatus control method, and storage medium
JP2012230543A (en) Image forming device and program
JP4623437B2 (en) Authentication system, authentication method, and authentication program
US9917962B1 (en) Multifunction peripheral with avatar based login
JP2016038758A (en) Operation apparatus and operation method
CN103605474A (en) Control method and control system of electronic equipment with touch screen and fingerprint sensor
CN105653993B (en) A kind of cipher-code input method, device and electronic equipment
CN109726529B (en) Computing device, information processing device, and control method
CN107770179B (en) Method, system, and medium for resetting unique identifier
US20180063376A1 (en) Information processing apparatus, image forming apparatus, information processing method, and non-transitory computer readable medium
CN107770409B (en) Authentication device
JP2011090634A (en) Authentication device, authentication method and authentication program
JP2018032140A (en) Information processing apparatus and program
WO2014156693A1 (en) Information terminal, lock disengage method, and lock disengage program
JP6308144B2 (en) Electronic device and authentication method in electronic device
EP4145312A1 (en) Information processing apparatus having multifactor authentication function, control method, and storage medium
JP6551748B2 (en) Electronics
US20150178027A1 (en) Printing system, printing apparatus, and control method of printing apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: ROBERT BOSCH TOOL CORPORATION, ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHARE, ELI CHARLES;REEL/FRAME:044011/0710

Effective date: 20171006

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION