Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Geometry Based Object Security for 3D Printing Applications

IP.com Disclosure Number: IPCOM000249062D
Publication Date: 2017-Jan-31
Document File: 2 page(s) / 45K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed are a system and method that check a three-dimensional print request against a database of restrictions in order to prevent the printing of dangerous or illegal items.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 58% of the total text.

1

Geometry Based Object Security for 3D Printing Applications

The increasing popularity of three-dimensional (3D) printers, especially in home use, is generating a number of creative uses of this new technology. These printers can use a multitude of different materials, so the range of objects that can be printed is increasing at a rapid pace; however, some designs or output, can be dangerous or illegal (e.g., weaponry, copyrighted material, etc.) A system or method is needed to protect the public from printing items that are potentially detrimental.

The novel contribution is a system that checks a 3D print request against a database of restrictions in order to prevent the printing of dangerous or illegal items.

A user designs an object and sends it to a 3D printer. Before the printer begins the job, it requests that the object be compared against the Protected Objects Database. The Protected Objects Database contains dangerous, copyright protected, or otherwise prohibited objects. Further restrictions can include material, scale, printer tolerance, etc. This comparison includes full or partial geometry, printer tolerance for the job, desired material, and scale. Only after receiving assurance that the object does not share sufficient similarities with the restricted database does printing begin. Furthermore, users with appropriate authority may use credentials to authorize restricted jobs on a case-by-case basis.

The implementation process follows: 1. User requests/initiate...