3D model encryption transmission method and decryption method

An encryption transmission and model technology, applied in transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc. Good protection, too simple design, etc., to achieve the effect of high anti-cracking ability

Inactive Publication Date: 2020-10-20
QINGDAO HAIER SMART TECH R & D CO LTD +2
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing traditional file encryption technology adopts a file protection scheme based on a single-mode encryption algorithm, and the design is too simple, which makes the confidentiality of files and the integrity of data cannot be well protected
Some encryption programs do not have any restrictions on the length of the key entered by the user, and the key is directly used for encryption without any processing after reading the key
If the key length entered by the user is too short, it will be difficult to resist malicious attacks, and it is easy to expose the specific information of the key by directly encrypting with the original key
In addition, most file encryption technologies only support local encryption and decryption, and some programs even have certain loopholes in their implementation. Such algorithms are easy to crack when time and resources are sufficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3D model encryption transmission method and decryption method
  • 3D model encryption transmission method and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the purpose, technical solution and advantages of the application more clear, the technical solution in the embodiment of the application will be described in more detail below in conjunction with the drawings in the embodiment of the application. In the drawings, the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The described embodiments are some, but not all, embodiments of the application. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application. Embodiments of the present application will be described in detail below in conjunction with th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a 3D model encryption transmission method and decryption method. The 3D model encryption transmission method comprises the steps that a user side obtains a first public key generated by a server side; the user side generates a first secret key; the user side performs digital signature on the G code file to be transmitted; the user side carries out slicing out-of-order processing on the G code file with the digital signature to generate a G code file group and combination sequence information; the user side encrypts the G code file group through a first secret key to generate a first ciphertext; the user side encrypts the first secret key through the first public key to generate a second secret key; the user side generates a first information file; the user side encrypts the first information file through the first public key so as to generate a second ciphertext; and the user side sends the first ciphertext and the second ciphertext. According to the 3D model encryption transmission method provided by the invention, the first ciphertext and the second ciphertext transmitted by the invention have relatively high anti-cracking capability.

Description

technical field [0001] The invention relates to the field of 3D model encryption, in particular to a 3D model encryption transmission method, a 3D model decryption method, a user terminal and a client terminal. Background technique [0002] As an incremental manufacturing technology, 3D printing technology is widely used in the processing and manufacturing industry, and has broad development prospects in aerospace, medical equipment and construction industries. With the rise of cloud service platforms, the trend of "Internet +" 3D printing socialization and network services is becoming more and more obvious. Therefore, the protection of online 3D printing manufacturing model data is the key to realize the protection of intellectual property rights under the online 3D printing manufacturing mode for open crowd creation. [0003] The existing traditional file encryption technology adopts a file protection scheme based on a single-mode encryption algorithm, and the design is t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/32H04L9/06G06F21/62G06F21/60
CPCH04L9/0863H04L63/0442H04L9/3247H04L9/0631G06F21/602G06F21/6209
Inventor 李生魏志强周义龙殷波房子琪
Owner QINGDAO HAIER SMART TECH R & D CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products