2018
DOI: 10.1002/adem.201800495
|View full text |Cite
|
Sign up to set email alerts
|

Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication

Abstract: Additive manufacturing (AM) process chain relies heavily on cloud resources and software programs. Cybersecurity has become a major concern for such resources. AM produces physical components, which can be compromised for quality by many other means and can be reverse engineered for unauthorized reproduction. This work is focused on taking advantage of layer-by-layer manufacturing process of AM to embed codes inside the components and reading them using image acquisition methods. The example of a widely used Q… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(38 citation statements)
references
References 19 publications
0
38
0
Order By: Relevance
“…In this instance, it would be more favourable to include an authentication measure directly on the dosage form. Due to their relatively simple internal graphic design, codes such as data matrices and quick response (QR) codes have previously been included directly onto the surface or imbedded within small dosage forms (Chen et al, 2018;Edinger et al, 2018;Fei and Liu, 2016). Favourably, these codes can encode a host of product information, such as the drug name, dosage, patient name, prescriber details, etc.…”
Section: As a Results Of Global Initiatives Such As The European Unionmentioning
confidence: 99%
“…In this instance, it would be more favourable to include an authentication measure directly on the dosage form. Due to their relatively simple internal graphic design, codes such as data matrices and quick response (QR) codes have previously been included directly onto the surface or imbedded within small dosage forms (Chen et al, 2018;Edinger et al, 2018;Fei and Liu, 2016). Favourably, these codes can encode a host of product information, such as the drug name, dosage, patient name, prescriber details, etc.…”
Section: As a Results Of Global Initiatives Such As The European Unionmentioning
confidence: 99%
“…Please refer to pages 2 and 3 of the revised paper: "… … Gupta et al carried out an investigation on embedding tracking codes, i.e. Quick Response (QR) code having fast readability and greater storage capacity [16], in additive manufactured parts for product authentication [17][18][19], and applied a micro-CT scanner to detect the embedded QR code in polymer components comprised of black and white resin, and laser sintered single metal component made of AlSi10Mg alloy, in which the powder particle in the QR code region were not fused [18], that may cause component fatigue failure problem due to the voids created. The technical limitations of existing commercial metal additive manufacturing technologies, including powder-bed fusion and directed energy deposition would make embedding security features of a high resolution difficult.. Firstly, present commercial powder-bed fusion machine, e.g.…”
Section: Reviewermentioning
confidence: 99%
“…Gupta et al carried out an investigation on embedding tracking codes, i.e. Quick Response (QR) code having fast readability and greater storage capacity [16], in additive manufactured parts for product authentication [17][18][19], and applied a micro-CT scanner to detect the embedded QR code in polymer components comprised of black and white resins, and laser sintered single metal component made of AlSi10Mg alloy, in which the powder particle in the QR code region were not fused and was left as lose powders [18]. This, however, may cause component fatigue failure due to the voids created.…”
Section: Introductionmentioning
confidence: 99%
“…Thorough survey on risk taxonomy for additive manufacturing is presented in previous published works [16], [17]. Developments have taken place in mitigating risks of counterfeiting [18], [19], transparency [20], [21] and the manufacturing process [22], [23] in the AM security. Nonetheless, the extant body of literature of SCRM for AM remains preliminary and conceptual [24].…”
Section: Introductionmentioning
confidence: 99%