-
公开(公告)号:US11356268B2
公开(公告)日:2022-06-07
申请号:US16613821
申请日:2017-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor , Adrian Baldwin , Jonathan Griffin
Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
-
公开(公告)号:US20200186354A1
公开(公告)日:2020-06-11
申请号:US16613821
申请日:2017-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor , Adrian Baldwin , Jonathan Griffin
Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
-
公开(公告)号:US11036880B2
公开(公告)日:2021-06-15
申请号:US16074105
申请日:2016-09-16
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor
Abstract: In an example, a method includes acquiring, at a processor, object generation source data representing a three-dimensional object to be generated in additive manufacturing. A dataset which is representative of an aspect of the three-dimensional object may be determined from the object generation source data. Digital security may be applied to the object generation source data and the dataset. The digital security applied to the object generation source data may be different from that which is applied to the dataset.
-
-