Researchers turn tracking codes into 'clouds' to authenticate genuine 3-D printed parts
by Staff Writers
New York NY (SPX) Aug 23, 2018
The worldwide market for 3D-printed parts is a $5 billion business with a global supply chain involving the internet, email, and the cloud - creating a number of opportunities for counterfeiting and intellectual property theft. Flawed parts printed from stolen design files could produce dire results: experts predict that by 2021, 75 percent of new commercial and military aircraft will fly with 3D-printed engine, airframe, and other components, and the use of AM in the production of medical implants will grow by 20 percent per year over the next decade.
A team at NYU Tandon School of Engineering has found a way to prove the provenance of a part by employing QR (Quick Response) codes in an innovative way for unique device identification. In the latest issue of Advanced Engineering Materials, the researchers describe a method for converting QR codes, bar codes, and other passive tags into three-dimensional features hidden in such a way that they neither compromise the part's integrity nor announce themselves to counterfeiters who have the means to reverse engineer the part.
Noted materials researcher Nikhil Gupta, an associate professor of mechanical engineering at NYU Tandon; Fei Chen, a doctoral student under Gupta; and joint NYU Tandon and NYU Abu Dhabi researchers Nektarios Tsoutsos, Michail Maniatakos and Khaled Shahin, detail how they exploited the layer-by-layer AM printing process to turn QR codes into a game of 3D chess.
Gupta's team developed a scheme that "explodes" a QR code within a computer-assisted design (CAD) file so that it presents several false faces - dummy QR tags - to a micro-CT scanner or other scanning device. Only a trusted printer or end user would know the correct head-on orientation for the scanner to capture the legitimate QR code image.
"By converting a relatively simple two-dimensional tag into a complex 3D feature comprising hundreds of tiny elements dispersed within the printed component, we are able to create many 'false faces,' which lets us hide the correct QR code from anyone who doesn't know where to look," Gupta said.
The team tested different configurations - from distributing a code across just three layers of the object, to fragmenting the code into up to 500 tiny elements - on thermoplastics, photopolymers, and metal alloys, with several printing technologies commonly employed in the industry.
Chen, the study's lead author, said that after embedding QR codes in such simple objects as cubes, bars, and spheres, the team stress-tested the parts, finding that the embedded features had negligible impact on structural integrity.
"To create typical QR code contrasts that are readable to a scanner you have to embed the equivalent of empty spaces," she explained. "But by dispersing these tiny flaws over many layers we were able to keep the part's strength well within acceptable limits."
Tsoutsos and Maniatakos explored threat vectors to determine which AM sectors are best served by this security technology, a step that Gupta said was crucial in the research.
"You need to be cost efficient and match the solution to the threat level," he explained. "Our innovation is particularly useful for sophisticated, high-risk sectors such as biomedical and aerospace, in which the quality of even the smallest part is critical."
A 2016 article by Gupta and a team of researchers that included Maniatakos and Tsoutsos in JOM, The Journal of the Minerals, Metals and Materials Society explored how flaws caused by printing orientation and insertion of fine defects could be foci for AM cyber-attacks.
The paper was the most-read engineering research that year among Springer's over 245 engineering journals. In a paper last year in Materials and Design, Gupta detailed methods of inserting undetectable flaws within CAD files so that only a trusted printer could correctly produce the parts.
US mulls missile defense interceptors in space
Washington (Sputnik) Aug 10, 2018
The US has unveiled plans for a space-based missile defense network less than a month after the July 16 US-Russia summit in Helsinki, where President Vladimir Putin presented his American counterpart Donald Trump with a series of concrete initiatives on disarmament, nuclear arms control and a proposed ban on weapons in space. US military strategists believe that a space-based sensor layer's vantage point high above Earth would ensure persistent tracking of hostile missiles, a capability that by fa ... read more
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.|