Log in

Industry News

Innovation - 3D Printers: IT's Next Great Data Challenge

30 Aug, 2015

Pam Baker has lots to say about 3-D technology. According to Baker in InformationWeek: Many tech professionals think of 3D printing as little more than a toy, even though it's in full production swing in manufacturing operations. Gartner and other researchers predict major growth for 3D printing in the enterprise, raising a host of data protection issues for IT professionals. Here's what you need to know.

Additive manufacturing, aka 3D printing, is not a toy or a passing fad. It already has muscled its way into manufacturing, R&D, and medicine. It is set to seriously disrupt several industries, including logistics, warehousing, shipping, and retailing. In fact, the technology is poised to create havoc when it comes to protecting intellectual property, and the fallout will land squarely at the feet of IT professionals.

According to a 2014 survey of 642 business executives worldwide by Tech Pro Research, 60% of respondents in a wide range of industries were either using or evaluating using 3D printers. The report said that while 3D printing previously has been seen as a niche product primarily for R&D, education, and manufacturing purposes, "such a high percentage of people evaluating the concept shows that this perception is undergoing change and beginning to appeal to an array of businesses."

IT professionals can avoid being caught unprepared for this spread of 3D printers far beyond niche boundaries both inside and outside the organization.

One example of how the 3D printing process is spreading is GE Power & Water, a company that makes power equipment and products for power plants. It uses expensive 3D printers that most of its customers have not yet acquired. All of GE Power & Water's 3D production printing is done in-house, on the plant floor. Eventually, though, as 3D printer prices come down and raw materials become easier to obtain, GE Power & Water customers may be able to print a replacement part, or even a complete machine, at their own facilities. This could sharply reduce downtime and, potentially, reduce costs by eliminating expensive shipping charges. That's why, in the near future, GE will look at sharing files with suppliers and customers, to leverage some of the vital advantages 3D printing brings compared with conventional manufacturing and product distribution.

Manufacturers of big products aren't the only ones that will soon be looking to ship code to 3D printers to enable on-site production for customers. Indeed, 3D printers work by printing according to the instructions in computer code, usually from .STL or .OBJ files. Many 3D printers are sold with a limited number of files preinstalled, and some come with access to third-party services, such as Autodesk, offering many additional product files. Shipping codes to 3D printers, or making the files downloadable from websites, is the logical progression in product distribution, as it negates the costs involved in warehousing stockpiles of products and shipping them to customers.

According to a 2014 Gartner report, business and medical applications will experience the effects of 3D printing beginning next year and continuing for the next four years. "Consumer adoption will be outpaced by business and medical applications that have more compelling use cases in the short term," according to Gartner. "In two to five years, there will be greater adoption of enterprise 3D printing, nurtured in part by the continued acceptance and use of 3D print creation software, 3D scanners, and 3D printing service bureaus."
IT's Incoming 3D Nightmare

Unfortunately, today's standards for protecting intellectual property used in 3D printing, such as embedded tracking and regulatory mechanisms, and "watermarks" designed to protect against money counterfeiting, aren't ready for the kind of massive digital file sharing of intellectual property that will result as 3D printing gains users. It's easy to envision all of the following if 3D printing were to become ubiquitous:

    Intellectual property stolen
    Counterfeit products flooding the market
    Entire industries financially crippled from over-sharing.

These doomsday scenarios are rooted in real life. We've already seen this scenario play out in the entertainment industry, first with music and then with movies, as digital file sharing became commonplace. Even Digital Rights Management (DRM) applications have not stemmed the flood of illegal file sharing in that industry.

Now's the time for IT to start investigating ways to protect IP in 3D printing. Testing the code, securing the files and their transit over the corporate network, plus limiting or blocking file sharing and the end user's 3D printer use of the file, will all be tantamount to protecting company profits. The IT challenges are similar to those found in managing myriad mobile devices being brought into the organization under bring-your-own-device policies, only harder since the data at stake could be the intellectual property at the core of the company's entire product line.

"Basically, there is currently nothing that prevents anyone from printing any file on a 3D printer," said Timothy Simpson, a professor of mechanical and industrial engineering and engineering design at Pennsylvania State University, and a member of The American Society of Mechanical Engineers, in an interview with InformationWeek.

"The file format used to run the majority of 3D printers (.STL) is a series of triangular meshes that describe the 3D object," Simspon explained. "If you have the data in that format, then you can print it, and there are multiple ways to get that data in that format if you have the right equipment. The machines don't care whether the object is copyright protected or someone else's IP. They just print what they are instructed to print."

STL will remain important to 3D printing, according to the 3MF Consortium, a consortium that was announced in late April. The group released the 3D Manufacturing Format (3MF) specification, which lets design applications send full-fidelity 3D models to a mix of other applications, platforms, services, and printers. According to the consortium, which is comprised of seven companies, "modern 3D printers, even low-cost devices, are capable of printing items that are difficult to describe using existing formats. The 3MF specification eliminates the problems associated with currently available file formats, such as STL, which was designed in 1989. It resolves interoperability and functionality issues, enabling companies to focus on innovation in this growing field."

The consortium is making its open source 3MF specification available for free download, and it will soon be on GitHub.

Intellectual property protections and 3D printer monitoring are not baked into the new standard. Indeed, there isn't so much as a snippet of security support in the core spec. However, there is a way to add it on as an extension.

"3MF is designed to support existing and emerging scenarios in 3D printing," Adrian Lannin, executive director at 3MF Consortium, told InformationWeek. "As new scenarios become important, or as features that are specific to a particular workflow or use case become necessary, they can be implemented as extensions to the standard."

Protecting IP On 3D Printers

Manufacturers such as GE Power & Water are giving serious consideration to protecting intellectual property on 3D printers. InformationWeek interviewed Clay Johnson, the company's CIO, and its CISO, Teresa Zielinski, earlier this year about how they're approaching 3D printing.

"Inside our walls we treat 3D printers as another asset in our network," said Johnson. "We used to post pictures and drawings of our product designs on physical boards in the office. We actually think we can protect all that data a little better now on 3D printers."

Zielinski added: "We have extensive logging and monitoring of where our data is sent, and who had access to it. There's less touching of the information, and it's no longer laying around in the offices exposed."

What happens when a manufacturer ships code to a customer or another external 3D printer instead of shipping an actual product? "We will evaluate shipping code to customers in careful stages," Johnson said.

"This is new to everybody," Zielinski added. "There will need to be processes to protect the data, and to assure buyers that what is delivered to their 3D printer is actually from the manufacturer."

How to protect intellectual property in the process is a work in progress. "At the moment, there is not a lot being done," said David Alan Grier, IEEE Fellow and principal for Djaghe consulting, in an interview with InformationWeek. Grier cited Shapeways and other "maker" websites as examples of how IP is currently handled.

Shapeways, an online 3D printing service and marketplace based in New York City, is aiming to help independent designers worldwide create and sell their products. Makers use a 3D printing app and a range of modeling software to design their products, and can work with a Shapeways designer on fine-tuning the product. Once the product design is complete, it's uploaded to the Shapeways site, and Shapeways will produce it using its 3D printing capabilities. The product can then be sold to others using the online Shapeways marketplace.

Where the IP challenge arises is in the fact that the code that a maker sends to Shapeways for printing may be stolen from someone else or be an adaptation of someone else's code that was made without their permission and in violation of copyrights and patents. Shapeways is one of the few 3D printing service companies that tries to check for such infringements and illegal activity prior to printing a product and shipping it back to the user. Keep in mind that users can order more than one unit – they can order many units printed – and resell them. That resell is known as a "second sale," and if the practice is done using stolen IP, it can be devastating to a company's profits by filling a marketplace with counterfeit goods.

According to Grier, websites such as Shapeways "do at least a quick scan on design files that are uploaded to their sites to make sure that the files are not copies of material that they are circulating. All of them control the first sale of the files, but none control the second sale."

According to Grier, "For now, there are three technical ways for protecting files: encrypting them, circulating them from a secure server, or circulating hamstrung files – files that don't work without additional information. None of them is perfect, since the printers don't have an encryption feature." Rather, according to Grier, encryption/decryption has to be handled by an external program or application. "If you are able to capture an unencrypted file, you can circulate [it] indefinitely," he said, comparing the current state of 3D printing with that of the music business in 1998.

Indeed, the 40 or so professionals queried as background for this story all pointed to older distributed media as illustration of the current problems in 3D printing – and as possible shared solutions. "Look at all the counterfeiting in DVD copies earlier," GE's Johnson said. "Maybe we don't need DRM exactly, but we will need something similar. We can learn from the past and perhaps use that knowledge in digital threads, digital DNA, microdots, quantum dots, or some other protections. In any case, it is the same evolution."

Not everyone agrees that the DRM developed to protect entertainment files can be adapted to 3D printing. "Given the track record with color scanners and printers in the area of counterfeiting money, for example, the theft and counterfeit issue cannot be prevented to a large degree," attorney Richard Santalesa, founding member of the SmartEdgeLaw Group, said in an interview. According to Santalesa, this is particularly true for small objects that have no moving parts and are simple designs, such as small parts, jewelry, and toys.

"There will be technical approaches," he said, citing advanced scanners and copiers that contain code to recognize currency and prevent copying of U.S. currency. But, ultimately, "The burden will be on the IP owner to police and squash such items from being sold or entering the country."

CIOs and IT leaders can begin preparing today to protect company data in 3D printing in much the same way as they seek to govern and protect devices and data in their BYOD policies and processes. Look there for clues on how to structure policies and processes in 3D printing both on-site and off. Additionally, begin crafting protective extensions for the open source 3MF specification now, and pressure 3D printer vendors and manufacturers to add encryption and other security features directly on printers. Stay vigilant and proactive. According to Gartner, you can expect to see 3D printer use inside and outside your company walls as early as next year, if you don't already have them now. You can also expect to see their use increase over the next five to 10 years and a corresponding increase in demand. Prepare accordingly.

Pam Baker is author of Data Divination: Big Data Strategies, which met with rave reviews and is currently being used in universities as a textbook for both business and tech courses. It's also sold to business audiences in the general market.

Add Comment

WebinarCase Studies and White PapersSand Exchange Blog

imageSource Magazine Quick Links
Upcoming Events
ITEX Expo & Conference
©2015 Questex, LLC. All rights reserved
Reproduction in whole or part is prohibited
Please send any technical comments or questions to our webmaster