Invention Grant
- Patent Title: Secure 3D printing
-
Application No.: US17244826Application Date: 2021-04-29
-
Publication No.: US11263296B2Publication Date: 2022-03-01
- Inventor: Barrett Veldsman
- Applicant: WIPPIT LTD.
- Applicant Address: GB London
- Assignee: WIPPIT LTD.
- Current Assignee: WIPPIT LTD.
- Current Assignee Address: GB London
- Agency: Cooley LLP
- Priority: GB1803311 20180228
- Main IPC: G06Q20/00
- IPC: G06Q20/00 ; G06F21/14 ; B33Y30/00 ; B33Y50/02 ; B29C64/393 ; G06F21/60 ; G05B19/4099 ; G06Q30/06

Abstract:
A computer-implemented method for controlling reproduction of an item represented by a digital asset stored in a trusted computing environment using a reproduction device in an untrusted computing environment, in which a succession of data seg¬ments is transmitted from the trusted computing environment to the untrusted computing environment, the succession of data segments comprising segments of reproduction data, each of which includes at least one instruction for controlling the reproduction device to reproduce a portion of the item, and at least one segment of obfuscation data which has a structure identical the reproduction data but is incapable of controlling the reproduction device to reproduce a portion of the item, the method comprising: a) determining whether the next segment of data in the succession should be a segment of reproduction data or a segment of obfuscation data; b) where the next segment of data should be a segment of reproduction data, selecting and extracting an unprocessed segment of data from the digital asset to form the next segment of data; c) where the next segment of data should be a segment of obfuscation data, providing a segment of obfuscation data to form the next segment of data; d) generating a unique encryption key and encrypting the next segment of data using the unique encryption key; e) transmitting the encrypted next segment of data from the trusted computing environment; f) decrypting the encrypted next segment of data received at the untrusted computing environment; g) attempting to control the reproduction device using the decrypted data segment such that where the next segment of data is reproduction data, the reproduction device reproduces the portion of the item at the untrusted computing environment in accordance with the instructions included with the data segment, and where the next segment of data is obfuscation data, the reproduction device is unresponsive; and h) iterating steps (a) to (g) until the entire digital asset, or a desired portion of it, has been processed.
Public/Granted literature
- US20210279347A1 SECURE 3D PRINTING Public/Granted day:2021-09-09
Information query