{"title":"评估使用3D打印和成像来创建工作副本钥匙","authors":"J. Straub, Scott D. Kerlin","doi":"10.1117/12.2225187","DOIUrl":null,"url":null,"abstract":"This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the easiness of gaining the required data for key production and an understanding of how well keys produced under this method work. The results of an experiment to characterize this are discussed and generalized to different key types. The effect of alternate sources of data on imaging requirements is considered.","PeriodicalId":222501,"journal":{"name":"SPIE Defense + Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Evaluation of the use of 3D printing and imaging to create working replica keys\",\"authors\":\"J. Straub, Scott D. Kerlin\",\"doi\":\"10.1117/12.2225187\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the easiness of gaining the required data for key production and an understanding of how well keys produced under this method work. The results of an experiment to characterize this are discussed and generalized to different key types. The effect of alternate sources of data on imaging requirements is considered.\",\"PeriodicalId\":222501,\"journal\":{\"name\":\"SPIE Defense + Security\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SPIE Defense + Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2225187\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SPIE Defense + Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2225187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of the use of 3D printing and imaging to create working replica keys
This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the easiness of gaining the required data for key production and an understanding of how well keys produced under this method work. The results of an experiment to characterize this are discussed and generalized to different key types. The effect of alternate sources of data on imaging requirements is considered.