An encryption approach for product assembly models

X. T. Cai, Sheng Wang, Xin Lu, Weidong Li

    Research output: Contribution to journalArticlepeer-review

    5 Citations (Scopus)
    108 Downloads (Pure)

    Abstract

    In a collaboration environment, it is a challenge how to effectively share the information needed for collaboration while protecting other confidential information in a product assembly model. In this paper, an innovative encryption approach for assembly models to support collaboration is presented. This approach is content based encryption and effective for the secure sharing of feature-based assembly models. In the approach, a classification algorithm for features in an assembly model to be shared or protected during collaboration has been first developed. An encryption algorithm for a feature has been then designed to ensure the parameterization, topological and geometrical validity, and self-adaptability of the encrypted feature. An algorithm for parts with multiple encryption features has been developed. Based on the above algorithms, parts are finally assembled and the geometry and topology of the assembling structure are kept un-changed to enhance collaborators’ interoperability. The characteristics and innovations of the approach include: (1) the approach is feature based, integrative into the main-stream commercial Computer Aided Design (CAD) systems, and flexible to meet various users’ needs for encrypting features selected by users during collaboration, (2) in the approach, the topological and geometrical validity of an assembly model after encryption is maintained to ensure effective collaboration on the assembly, and (3) the approach is parametrically controlled through adjusting position and size parameters so as to ensure the user friendliness of using the approach. A case study with complex geometries and assembly structures has been used to validate the effectiveness and robustness of the approach in industrial applications.

    Publisher Statement: NOTICE: this is the author’s version of a work that was accepted for publication in Advanced Engineering Informatics. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Advanced Engineering Informatics, [33, (2016)] DOI: 10.1016/j.aei.2016.12.001

    © 2016, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/
    Original languageEnglish
    Pages (from-to)374-387
    Number of pages14
    JournalAdvanced Engineering Informatics
    Volume33
    Early online date28 Dec 2016
    DOIs
    Publication statusPublished - Aug 2017

    Bibliographical note

    NOTICE: this is the author’s version of a work that was accepted for publication in Advanced Engineering Informatics. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Advanced Engineering Informatics, [33, (2016)] DOI: 10.1016/j.aei.2016.12.001

    © 2016, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/

    Keywords

    • Assembly encryption
    • Assembly features
    • Encrypted features
    • Feature classification

    Fingerprint

    Dive into the research topics of 'An encryption approach for product assembly models'. Together they form a unique fingerprint.

    Cite this