CN110138555A - A kind of encryption and decryption method of FBX format threedimensional model - Google Patents

A kind of encryption and decryption method of FBX format threedimensional model Download PDF

Info

Publication number
CN110138555A
CN110138555A CN201910421963.1A CN201910421963A CN110138555A CN 110138555 A CN110138555 A CN 110138555A CN 201910421963 A CN201910421963 A CN 201910421963A CN 110138555 A CN110138555 A CN 110138555A
Authority
CN
China
Prior art keywords
encryption
hashed values
new
threedimensional model
keyword
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910421963.1A
Other languages
Chinese (zh)
Other versions
CN110138555B (en
Inventor
倪炜
黄博航
胡丽隽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Nengchuan Information Technology Co Ltd
Original Assignee
Changsha Nengchuan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Nengchuan Information Technology Co Ltd filed Critical Changsha Nengchuan Information Technology Co Ltd
Priority to CN201910421963.1A priority Critical patent/CN110138555B/en
Publication of CN110138555A publication Critical patent/CN110138555A/en
Application granted granted Critical
Publication of CN110138555B publication Critical patent/CN110138555B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the encryptions and decryption method of a kind of FBX format threedimensional model, more particularly to threedimensional model field, including encrypting module and deciphering module, 1) encryption method of the encrypting module is as follows: step S101, reading original FBX format threedimensional model file;Step S102, copyright holder inputs passage key, by md5 encryption, generates 4 sections of 32 hashed values.The present invention provides a kind of encryption and decryption approaches of easy to use, efficient FBX format threedimensional model, using this encrypting and decrypting method, go out the coal addition position of the random data of model file by preset cipher key calculation, by the coal addition position for changing the random data of the adjustable model file of key, to while holding decryption method high-efficient advantage, the safety for improving algorithm is not easy to be cracked, and threedimensional model decipherment algorithm complexity is lower.

Description

A kind of encryption and decryption method of FBX format threedimensional model
Technical field
The present invention relates to threedimensional model technical field, it is more particularly related to a kind of FBX format threedimensional model Encryption and decryption method.
Background technique
FBX format threedimensional model file is a kind of now widely used threedimensional model file.FBX format threedimensional model text Part itself is in a kind of unprotect state, when these files are placed on network or are installed on client computer with system, appoints What user all can be read and modify these threedimensional model files, or these threedimensional models are used for other application, thus Shortage gives suitable protecting to the achievement of designer or the assets of owner.
Existing threedimensional model guard method is usually the point coordinate for passing through object face element in transformation threedimensional model, makes not award The user of power can not correctly obtain initial three-dimensional object.This method usually requires to become by complicated matrix after model load Calculating is changed to carry out model reduction, its decryption method takes a long time for large-scale three dimensional model, has larger impact to system performance.
Summary of the invention
In order to overcome the drawbacks described above of the prior art, the embodiment of the present invention provides a kind of adding for FBX format threedimensional model Close and decryption method, the present invention is by the defect for above-mentioned threedimensional model time slot scrambling, for FBX format threedimensional model file The characteristics of, by key, one section of random data is added in multiple specific positions of model file, it is adjustable by changing key The random data of model file and the position of addition, this method are ensuring that cryptographic security is higher and threedimensional model decipherment algorithm is multiple Miscellaneous degree is lower.
To achieve the above object, the invention provides the following technical scheme: a kind of encryption and decryption of FBX format threedimensional model Method, including encrypting module and deciphering module;
1) encryption method of the encrypting module is as follows:
Step S101, original FBX format threedimensional model file is read;
Step S102, copyright holder inputs passage key, by md5 encryption, generates 4 sections of 32 hashed values;
Step S103, the document location VP1 of keyword Vertices the 1st time appearance is found by binary search, if Vertices exists, and takes the first 8 corresponding decimal number VN1 of 32 hashed values of paragraph 1 as deviant, finds VP1 backward Rear 24 data sequences of 32 hashed values of paragraph 1 are added, if Vertices is not deposited in the position VP1N of number N1 after VP1N , then directly encryption terminate;
Step S104, the file position of keyword PolygonVertexIndex the 1st time appearance is found by binary search PP1 is set, if PolygonVertexIndex exists, takes the first 8 corresponding decimal number PN1 conducts of the 2nd section of 32 hashed values Deviant finds the position PP1N that PP1 counts up PN1, and rear 24 data sequences of the 2nd section of 32 hashed values are added after PP1N Column, if PolygonVertexIndex is not present, directly encryption terminates;
Step S105, the document location EP1 that keyword Edges the 1st time appearance is found by binary search, if Edges In the presence of taking the first 8 corresponding decimal number EN1 of the 3rd section of 32 hashed values as deviant, find EP1 and count up EN1 Rear 24 data sequences of the 3rd section of 32 hashed values are added in position EP1N after EP1N, if Edges is not present, directly encrypt Terminate;
Step S106, the document location of keyword GeometryVersion the 1st time appearance is found by binary search GP1 takes the first 8 corresponding decimal number GN1 of the 4th section of 32 hashed values as offset if GeometryVersion exists Value, finds the position GP1N that GP1 counts up GN1, and rear 24 data sequences of the 4th section of 32 hashed values are added after GP1N, If GeometryVersion is not present, directly encryption terminates;
Step S107, the document location VP2 of keyword Vertices the 2nd time appearance is found by binary search, if Vertices exists, and the hashed value ring shift left 8 of paragraph 1 32 is become 32 new hashed values, takes new 32 hashed values Preceding 8 corresponding decimal number VN2 find the position VP2N that VP2 counts up VN2 as deviant, are added after VP2N new Rear 24 data sequences of 32 hashed values, if Vertices is not present, directly encryption terminates;
Step S108, the file position of keyword PolygonVertexIndex the 2nd time appearance is found by binary search PP2 is set, if PolygonVertexIndex exists, becomes 32 new hash for the 2nd section 32 hashed value ring shift lefts 8 Value, takes first 8 corresponding decimal number PN2 of new 32 hashed values as deviant, finds the position that PP2 counts up PN2 Rear 24 data sequences of new 32 hashed values are added, if PolygonVertexIndex is not present, directly in PP2N after PP2N Connecing encryption terminates;
Step S109, the document location EP2 that keyword Edges the 2nd time appearance is found by binary search, if Edges In the presence of becoming 32 new hashed values for the 3rd section 32 hashed value ring shift lefts 8, take preceding 8 correspondences of new 32 hashed values Decimal number EN2 as deviant, find the position EP2N that EP2 counts up EN2, new 32 hashed values be added after EP2N Rear 24 data sequences, if Edges is not present, directly encryption terminate;
Step S110, the document location of keyword GeometryVersion the 2nd time appearance is found by binary search GP2 becomes 32 new hashed values for the 4th section 32 hashed value ring shift lefts 8 if GeometryVersion exists, and takes new First 8 corresponding decimal number GN2 of 32 hashed values find the position GP2N that GP2 counts up GN2 as deviant, Rear 24 data sequences of new 32 hashed values are added after GP2N, if GeometryVersion is not present, directly encryption is tied Beam;
Step S111, the rest may be inferred, until searched for all keyword Vertices, PolygonVertexIndex, Edges and GeometryVersion, the ciphering process for completing threedimensional model file add to generate new threedimensional model file Close end;
2) decryption method of the deciphering module is as follows:
Step S101, the new threedimensional model file is propagated by network or other physics modes;
Step S102, when needing using the threedimensional model file, new model file can be restored according to 4 sections of 32 hashed values At the FBX format threedimensional model file of standard;
Step S103, the document location VP1 of keyword Vertices the 1st time appearance is found by binary search, if Vertices exists, and takes the first 8 corresponding decimal number VN1 of 32 hashed values of paragraph 1 as deviant, finds VP1 backward The position VP1N of number N1, deletes 24 data sequences after VP1, if Vertices is not present, directly decryption terminates;
Step S104, the file position of keyword PolygonVertexIndex the 1st time appearance is found by binary search PP1 is set, if PolygonVertexIndex exists, takes the first 8 corresponding decimal number PN1 conducts of the 2nd section of 32 hashed values Deviant finds the position PP1N that PP1 counts up PN1N, 24 data sequences is deleted after PP1, if PolygonVertexIndex is not present, then directly decryption terminates;
Step S105, the document location EP1 that keyword Edges the 1st time appearance is found by binary search, if Edges In the presence of taking the first 8 corresponding decimal number EN1 of the 3rd section of 32 hashed values as deviant, find EP1 and count up EN1 Position EP1N deletes 24 data sequences after EP1N, if Edges is not present, directly decryption terminates;
Step S106, the document location of keyword GeometryVersion the 1st time appearance is found by binary search GP1 takes the first 8 corresponding decimal number GN1 of the 4th section of 32 hashed values as offset if GeometryVersion exists Value, finds the position GP1N that GP1 counts up GN1,24 data sequences is deleted after GP1N, if GeometryVersion It is not present, then directly decryption terminates;
Step S107, the document location VP2 of keyword Vertices the 2nd time appearance is found by binary search, if Vertices exists, and the hashed value ring shift left 8 of paragraph 1 32 is become 32 new hashed values, takes new 32 hashed values Preceding 8 corresponding decimal number VN2 find the position VP2N that VP2 counts up N2,24 are deleted after VP2N as deviant Position data sequence, if Vertices is not present, directly encryption terminates;
Step S108, the file position of keyword PolygonVertexIndex the 2nd time appearance is found by binary search PP2 is set, if PolygonVertexIndex exists, becomes 32 new hash for the 2nd section 32 hashed value ring shift lefts 8 Value, takes first 8 corresponding decimal number PN2 of new 32 hashed values as deviant, finds the position that PP2 counts up PN2 PP2N deletes 24 data sequences after PP2N, if PolygonVertexIndex is not present, directly encryption terminates;
Step S109, the document location EP2 that keyword Edges the 2nd time appearance is found by binary search, if Edges In the presence of becoming 32 new hashed values for the 3rd section 32 hashed value ring shift lefts 8, take preceding 8 correspondences of new 32 hashed values Decimal number EN2 as deviant, find the position EP2N that EP2 counts up EN2,24 data sequences deleted after EP2N Column, if Edges is not present, directly encryption terminates;
Step S110, the document location of keyword GeometryVersion the 2nd time appearance is found by binary search GP2 becomes 32 new hashed values for the 4th section 32 hashed value ring shift lefts 8 if GeometryVersion exists, and takes new First 8 corresponding decimal number GN2 of 32 hashed values find the position GP2N that GP2 counts up GN2 as deviant, 24 data sequences are deleted after GP2N, if GeometryVersion is not present, directly encryption terminates;
Step S111, the rest may be inferred, until searched for all keyword Vertices, PolygonVertexIndex, Edges and GeometryVersion completes the decrypting process of threedimensional model file, is reduced into the FBX format threedimensional model of standard File, decryption terminate.
In a preferred embodiment, the encrypting module is installed on copyright owner's computer, using the encryption Method encrypts the FBX format threedimensional model file of standard, generates new threedimensional model encryption file.
In a preferred embodiment, the deciphering module is built in all software systems of copyright owner, or with The mode of dll dynamic link library is installed along on user computer with threedimensional model encryption file.
In a preferred embodiment, 4 sections of 32 hashed values of encryption and decryption are used for built in die-filling piece of the decryption, it can Threedimensional model encryption file is decrypted, the FBX threedimensional model file of standard is reduced into.
Technical effect and advantage of the invention:
1, the present invention uses this encrypting and decrypting method, goes out adding for the random data of model file by preset cipher key calculation Enter position, the coal addition position of the random data by changing the adjustable model file of key, thus keeping decryption method effect While rate high advantage, the safety of algorithm is improved, is not easy to be cracked, and threedimensional model decipherment algorithm complexity is lower;
2, encryption and decryption approaches provided by the invention are easy to use, provide a kind of efficient FBX format threedimensional model, Solve the problems, such as that FBX format threedimensional model secrecy and existing FBX format threedimensional model encrypting and decrypting method are complicated, the time is multiple The high problem of miscellaneous degree.
Detailed description of the invention
Fig. 1 is encryption method flow chart of the invention.
Fig. 2 is decryption method flow chart of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
A kind of encryption and decryption method of FBX format threedimensional model according to shown in Fig. 1-2, including encrypting module and decryption Module;
The encrypting module is installed on copyright owner's computer, three-dimensional using FBX format of the encryption method to standard Model file is encrypted, and new threedimensional model encryption file is generated;
The deciphering module is built in all software systems of copyright owner, or in a manner of dll dynamic link library, with three Dimension module encryption file is installed along on user computer;
It is used for 4 sections of 32 hashed values of encryption and decryption built in die-filling piece of the decryption, file can be encrypted to threedimensional model and carried out Decryption, is reduced into the FBX threedimensional model file of standard.
Below to a preferred embodiment of the present invention will be described in detail:
1) encryption method of the encrypting module is as follows:
Step S101, certain original FBX format threedimensional model file, comprising keyword Vertices, PolygonVertexIndex, Edges and GeometryVersion each 2 times;
Step S102, copyright holder inputs passage " threedimensional model encryption " by md5 encryption, generates 4 sections 32 Hashed value is a2dd4015 74e8f21e 5ca68ec7 8084d214 (hexadecimal representation);
Step S103, the document location VP1 of keyword Vertices the 1st time appearance is found by binary search, if Vertices exists, and takes the corresponding decimal number 162 of preceding 8 a2 (hexadecimal representation) of 32 hashed values of paragraph 1 as inclined Shifting value finds the position VP1N that VP1 counts up 162, and rear 24 data sequences of 32 hashed values of paragraph 1 are added after VP1N Dd4015 (hexadecimal representation), if Vertices is not present, directly encryption terminates;
Step S104, the file position of keyword PolygonVertexIndex the 1st time appearance is found by binary search PP1 is set, if PolygonVertexIndex exists, takes preceding 8 74 (hexadecimal representations) of the 2nd section of 32 hashed values corresponding Decimal number 116 is used as deviant, finds the position PP1N that PP1 counts up 116, and the 2nd section of 32 hash are added after PP1N Rear 24 data sequence e8f21e (hexadecimal representation) of value directly encrypt if PolygonVertexIndex is not present Terminate;
Step S105, the document location EP1 that keyword Edges the 1st time appearance is found by binary search, if Edges In the presence of taking the corresponding decimal number 92 of preceding 8 5c of the 3rd section of 32 hashed values as deviant, find 92 and count up EN1 Rear 24 data sequence a68ec7 of the 3rd section of 32 hashed values are added, if Edges is not present, directly in position EP1N after EP1N Connecing encryption terminates;
Step S106, the document location of keyword GeometryVersion the 1st time appearance is found by binary search GP1 takes preceding 8 80 corresponding decimal numbers 128 of the 4th section of 32 hashed values as offset if GeometryVersion exists Value, finds the position GP1N that GP1 counts up 128, and rear 24 data sequences of the 4th section of 32 hashed values are added after GP1N 84d214, if GeometryVersion is not present, directly encryption terminates;
Step S107, the document location VP2 of keyword Vertices the 2nd time appearance is found by binary search, if Vertices exists, and the hashed value ring shift left 8 of paragraph 1 32 is become 32 new hashed value dd4015a2, takes new 32 The corresponding decimal number 221 of preceding 8 dd of hashed value is used as deviant, finds the position VP2N that VP2 counts up 221, Rear 24 data sequence 4015a2 of new 32 hashed values are added after VP2N, if Vertices is not present, directly encryption terminates;
Step S108, the file position of keyword PolygonVertexIndex the 2nd time appearance is found by binary search PP2 is set, if PolygonVertexIndex exists, becomes 32 new hashed values for the 2nd section 32 hashed value ring shift lefts 8 E8f21e74 takes the corresponding decimal number 232 of preceding 8 e8 of new 32 hashed values as deviant, finds PP2 and count up 232 The position PP2N of position, is added rear 24 data sequence f21e74 of new 32 hashed values after PP2N, if PolygonVertexIndex is not present, then directly encryption terminates;
Step S109, the document location EP2 that keyword Edges the 2nd time appearance is found by binary search, if Edges In the presence of becoming 32 new hashed value a68ec75c for the 3rd section 32 hashed value ring shift lefts 8, take new 32 hashed values The corresponding decimal number 166 of preceding 8 a6 is used as deviant, finds the position EP2N that EP2 counts up 166, is added after EP2N Rear 24 data sequence 8ec75c of new 32 hashed values, if Edges is not present, directly encryption terminates;
Step S110, the document location of keyword GeometryVersion the 2nd time appearance is found by binary search GP2 becomes 32 new hashed values for the 4th section 32 hashed value ring shift lefts 8 if GeometryVersion exists 84d21480 takes preceding 8 84 corresponding decimal numbers 132 of new 32 hashed values as deviant, finds GP2 and count up 132 The position GP2N of position, is added rear 24 data sequence d21480 of new 32 hashed values, if GeometryVersion after GP2N It is not present, then directly encryption terminates;
Step S111, the rest may be inferred, until searched for all keyword Vertices, PolygonVertexIndex, Edges and GeometryVersion, the ciphering process for completing threedimensional model file add to generate new threedimensional model file Close end;
2) decryption method of the deciphering module is as follows:
Step S101, the new threedimensional model file is propagated by network or other physics modes;
It step S102, can be according to 4 sections of 32 hashed value a2dd401574e8f21e when needing using the threedimensional model file New model file is reduced into the FBX format threedimensional model file of standard by 5ca68ec7 8084d214 (hexadecimal representation);
Step S103, the document location VP1 of keyword Vertices the 1st time appearance is found by binary search, if Vertices exists, and takes the first 8 corresponding decimal numbers 162 of 32 hashed values of paragraph 1 as deviant, finds VP1 backward Number 162 position VP1N delete 24 data sequences after VP1N, if Vertices is not present, directly decryption terminates;
Step S104, the file position of keyword PolygonVertexIndex the 1st time appearance is found by binary search PP1 is set, if PolygonVertexIndex exists, takes first 8 corresponding 116 conducts of decimal number of the 2nd section of 32 hashed values Deviant finds the position PP1N that PP1N counts up 116,24 data sequences is deleted after PP1, if PolygonVertexIndex is not present, then directly decryption terminates;
Step S105, the document location EP1 that keyword Edges the 1st time appearance is found by binary search, if Edges In the presence of taking the first 8 corresponding decimal numbers 92 of the 3rd section of 32 hashed values as deviant, find the position that EP1 counts up 92 EP1N is set, 24 data sequences are deleted after EP1N, if Edges is not present, directly decryption terminates;
Step S106, the document location of keyword GeometryVersion the 1st time appearance is found by binary search GP1 takes the first 8 corresponding decimal numbers 128 of the 4th section of 32 hashed values as offset if GeometryVersion exists Value, finds the position GP1N that GP1 counts up 128,24 data sequences is deleted after GP1N, if GeometryVersion It is not present, then directly decryption terminates;
Step S107, the document location VP2 of keyword Vertices the 2nd time appearance is found by binary search, if Vertices exists, and the hashed value ring shift left 8 of paragraph 1 32 is become 32 new hashed value dd4015a2, takes new 32 First 8 corresponding decimal numbers 221 of hashed value are used as deviant, the position VP2N that VP2 counts up 221 are found, in VP2N After delete 24 data sequences, if Vertices is not present, directly encryption terminate;
Step S108, the file position of keyword PolygonVertexIndex the 2nd time appearance is found by binary search PP2 is set, if PolygonVertexIndex exists, becomes 32 new hashed values for the 2nd section 32 hashed value ring shift lefts 8 E8f21e74 takes first 8 corresponding decimal numbers 232 of new 32 hashed values as deviant, finds PP2 and count up 232 Position PP2N, 24 data sequences are deleted after PP2N, if PolygonVertexIndex is not present, directly encryption knot Beam;
Step S109, the document location EP2 that keyword Edges the 2nd time appearance is found by binary search, if Edges In the presence of becoming 32 new hashed value a68ec75c for the 3rd section 32 hashed value ring shift lefts 8, take new 32 hashed values Preceding 8 corresponding decimal numbers 166 are used as deviant, find the position EP2N that EP2 counts up 166, delete after EP2N 24 data sequences, if Edges is not present, directly encryption terminates;
Step S110, the document location of keyword GeometryVersion the 2nd time appearance is found by binary search GP2 becomes 32 new hashed values for the 4th section 32 hashed value ring shift lefts 8 if GeometryVersion exists 84d21480 takes first 8 corresponding decimal numbers 132 of new 32 hashed values as deviant, finds GP2 and count up 132 Position GP2N, 24 data sequences are deleted after GP2N, if GeometryVersion is not present, directly encryption terminate;
Step S111, the rest may be inferred, until searched for all keyword Vertices, PolygonVertexIndex, Edges and GeometryVersion completes the decrypting process of threedimensional model file, is reduced into the FBX format threedimensional model of standard File, decryption terminate.
The several points that should finally illustrate are: firstly, in the description of the present application, it should be noted that unless otherwise prescribed and It limits, term " installation ", " connected ", " connection " shall be understood in a broad sense, can be mechanical connection or electrical connection, be also possible to two Connection inside element, can be directly connected, and "upper", "lower", "left", "right" etc. are only used for indicating relative positional relationship, when The absolute position for being described object changes, then relative positional relationship may change;
Secondly: the present invention discloses in embodiment attached drawing, relates only to the structure being related to the embodiment of the present disclosure, other knots Structure, which can refer to, to be commonly designed, and under not conflict situations, the same embodiment of the present invention and different embodiments be can be combined with each other;
Last: the foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, all in the present invention Spirit and principle within, any modification, equivalent replacement, improvement and so on, should be included in protection scope of the present invention it It is interior.

Claims (4)

1. a kind of encryption and decryption method of FBX format threedimensional model, it is characterised in that: including encrypting module and deciphering module;
1) encryption method of the encrypting module is as follows:
Step S101, original FBX format threedimensional model file is read;
Step S102, copyright holder inputs passage key, by md5 encryption, generates 4 sections of 32 hashed values;
Step S103, the document location VP1 of keyword Vertices the 1st time appearance is found by binary search, if Vertices exists, and takes the first 8 corresponding decimal number VN1 of 32 hashed values of paragraph 1 as deviant, finds VP1 backward Rear 24 data sequences of 32 hashed values of paragraph 1 are added, if Vertices is not deposited in the position VP1N of number N1 after VP1N , then directly encryption terminate;
Step S104, the document location of keyword PolygonVertexIndex the 1st time appearance is found by binary search PP1 takes the first 8 corresponding decimal number PN1 of the 2nd section of 32 hashed values as inclined if PolygonVertexIndex exists Shifting value finds the position PP1N that PP1 counts up PN1, and rear 24 data sequences of the 2nd section of 32 hashed values are added after PP1N Column, if PolygonVertexIndex is not present, directly encryption terminates;
Step S105, the document location EP1 of keyword Edges the 1st time appearance is found by binary search, if Edges exists, It takes the first 8 corresponding decimal number EN1 of the 3rd section of 32 hashed values as deviant, finds the position that EP1 counts up EN1 Rear 24 data sequences of the 3rd section of 32 hashed values are added in EP1N after EP1N, if Edges is not present, directly encryption is tied Beam;
Step S106, the document location GP1 of keyword GeometryVersion the 1st time appearance is found by binary search, if GeometryVersion exists, and takes the first 8 corresponding decimal number GN1 of the 4th section of 32 hashed values as deviant, finds GP1 counts up GN1 position GP1N, and rear 24 data sequences of the 4th section of 32 hashed values are added after GP1N, if GeometryVersion is not present, then directly encryption terminates;
Step S107, the document location VP2 of keyword Vertices the 2nd time appearance is found by binary search, if Vertices exists, and the hashed value ring shift left 8 of paragraph 1 32 is become 32 new hashed values, takes new 32 hashed values Preceding 8 corresponding decimal number VN2 find the position VP2N that VP2 counts up VN2 as deviant, are added after VP2N new Rear 24 data sequences of 32 hashed values, if Vertices is not present, directly encryption terminates;
Step S108, the document location of keyword PolygonVertexIndex the 2nd time appearance is found by binary search PP2 becomes 32 new hashed values for the 2nd section 32 hashed value ring shift lefts 8 if PolygonVertexIndex exists, It takes first 8 corresponding decimal number PN2 of new 32 hashed values as deviant, finds the position that PP2 counts up PN2 Rear 24 data sequences of new 32 hashed values are added, if PolygonVertexIndex is not present, directly in PP2N after PP2N Connecing encryption terminates;
Step S109, the document location EP2 of keyword Edges the 2nd time appearance is found by binary search, if Edges exists, Become 32 new hashed values for the 3rd section 32 hashed value ring shift lefts 8, takes first 8 corresponding ten of new 32 hashed values System number EN2 finds the position EP2N that EP2 counts up EN2 as deviant, after new 32 hashed values are added after EP2N 24 data sequences, if Edges is not present, directly encryption terminates;
Step S110, the document location GP2 of keyword GeometryVersion the 2nd time appearance is found by binary search, if GeometryVersion exists, and becomes 32 new hashed values for the 4th section 32 hashed value ring shift lefts 8, takes new 32 to dissipate First 8 corresponding decimal number GN2 of train value find the position GP2N that GP2 counts up GN2, after GP2N as deviant Rear 24 data sequences of new 32 hashed values are added, if GeometryVersion is not present, directly encryption terminates;
Step S111, the rest may be inferred, until having searched for all keyword Vertices, PolygonVertexIndex, Edges And GeometryVersion, the ciphering process of threedimensional model file is completed, so that new threedimensional model file is generated, encryption knot Beam;
2) decryption method of the deciphering module is as follows:
Step S101, the new threedimensional model file is propagated by network or other physics modes;
Step S102, when needing using the threedimensional model file, new model file can be reduced into mark according to 4 sections of 32 hashed values Quasi- FBX format threedimensional model file;
Step S103, the document location VP1 of keyword Vertices the 1st time appearance is found by binary search, if Vertices exists, and takes the first 8 corresponding decimal number VN1 of 32 hashed values of paragraph 1 as deviant, finds VP1 backward The position VP1N of number N1, deletes 24 data sequences after VP1, if Vertices is not present, directly decryption terminates;
Step S104, the document location of keyword PolygonVertexIndex the 1st time appearance is found by binary search PP1 takes the first 8 corresponding decimal number PN1 of the 2nd section of 32 hashed values as inclined if PolygonVertexIndex exists Shifting value finds the position PP1N that PP1 counts up PN1N, 24 data sequences is deleted after PP1, if PolygonVertexIndex is not present, then directly decryption terminates;
Step S105, the document location EP1 of keyword Edges the 1st time appearance is found by binary search, if Edges exists, It takes the first 8 corresponding decimal number EN1 of the 3rd section of 32 hashed values as deviant, finds the position that EP1 counts up EN1 EP1N deletes 24 data sequences after EP1N, if Edges is not present, directly decryption terminates;
Step S106, the document location GP1 of keyword GeometryVersion the 1st time appearance is found by binary search, if GeometryVersion exists, and takes the first 8 corresponding decimal number GN1 of the 4th section of 32 hashed values as deviant, finds GP1 counts up GN1 position GP1N, and 24 data sequences are deleted after GP1N, if GeometryVersion is not present, Then directly decryption terminates;
Step S107, the document location VP2 of keyword Vertices the 2nd time appearance is found by binary search, if Vertices exists, and the hashed value ring shift left 8 of paragraph 1 32 is become 32 new hashed values, takes new 32 hashed values Preceding 8 corresponding decimal number VN2 find the position VP2N that VP2 counts up N2,24 are deleted after VP2N as deviant Position data sequence, if Vertices is not present, directly encryption terminates;
Step S108, the document location of keyword PolygonVertexIndex the 2nd time appearance is found by binary search PP2 becomes 32 new hashed values for the 2nd section 32 hashed value ring shift lefts 8 if PolygonVertexIndex exists, It takes first 8 corresponding decimal number PN2 of new 32 hashed values as deviant, finds the position that PP2 counts up PN2 PP2N deletes 24 data sequences after PP2N, if PolygonVertexIndex is not present, directly encryption terminates;
Step S109, the document location EP2 of keyword Edges the 2nd time appearance is found by binary search, if Edges exists, Become 32 new hashed values for the 3rd section 32 hashed value ring shift lefts 8, takes first 8 corresponding ten of new 32 hashed values System number EN2 finds the position EP2N that EP2 counts up EN2,24 data sequences is deleted after EP2N as deviant, If Edges is not present, directly encryption terminates;
Step S110, the document location GP2 of keyword GeometryVersion the 2nd time appearance is found by binary search, if GeometryVersion exists, and becomes 32 new hashed values for the 4th section 32 hashed value ring shift lefts 8, takes new 32 to dissipate First 8 corresponding decimal number GN2 of train value find the position GP2N that GP2 counts up GN2, after GP2N as deviant 24 data sequences are deleted, if GeometryVersion is not present, directly encryption terminates;
Step S111, the rest may be inferred, until having searched for all keyword Vertices, PolygonVertexIndex, Edges And GeometryVersion, the decrypting process of threedimensional model file is completed, the FBX format threedimensional model file of standard is reduced into, Decryption terminates.
2. the encryption and decryption method of a kind of FBX format threedimensional model according to claim 1, it is characterised in that: described Encrypting module is installed on copyright owner's computer, is carried out using FBX format threedimensional model file of the encryption method to standard Encryption generates new threedimensional model encryption file.
3. the encryption and decryption method of a kind of FBX format threedimensional model according to claim 1, it is characterised in that: described Deciphering module is built in all software systems of copyright owner, or in a manner of dll dynamic link library, encrypts text with threedimensional model Part is installed along on user computer.
4. the encryption and decryption method of a kind of FBX format threedimensional model according to claim 1, it is characterised in that: described 4 sections of 32 hashed values for being used for encryption and decryption built in die-filling piece are decrypted, file can be encrypted to threedimensional model and be decrypted, be reduced into mark Quasi- FBX threedimensional model file.
CN201910421963.1A 2019-05-21 2019-05-21 Encryption and decryption method for FBX format three-dimensional model Active CN110138555B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910421963.1A CN110138555B (en) 2019-05-21 2019-05-21 Encryption and decryption method for FBX format three-dimensional model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910421963.1A CN110138555B (en) 2019-05-21 2019-05-21 Encryption and decryption method for FBX format three-dimensional model

Publications (2)

Publication Number Publication Date
CN110138555A true CN110138555A (en) 2019-08-16
CN110138555B CN110138555B (en) 2020-11-20

Family

ID=67571981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910421963.1A Active CN110138555B (en) 2019-05-21 2019-05-21 Encryption and decryption method for FBX format three-dimensional model

Country Status (1)

Country Link
CN (1) CN110138555B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
US20150134962A1 (en) * 2013-11-08 2015-05-14 MustBin Inc. Bin enabled data object encryption and storage apparatuses, methods and systems
CN104780161A (en) * 2015-03-23 2015-07-15 南京邮电大学 Searchable encryption method supporting multiple users in cloud storage
CN104836862A (en) * 2015-06-04 2015-08-12 成都果豆数字娱乐有限公司 Intelligent terminal data storage method
CN105187192A (en) * 2015-09-08 2015-12-23 广州六米网络科技有限公司 Three-dimensional secret code encryption algorithm
CN105488360A (en) * 2015-11-27 2016-04-13 北京印刷学院 Anti-fake processing method and device of three-dimensional model file with fbx format postfix
CN105512522A (en) * 2015-11-27 2016-04-20 北京印刷学院 Anti-counterfeiting processing method and device for three-dimensional model file with suffix in 3ds format
CN106789049A (en) * 2017-03-24 2017-05-31 中国人民解放军国防科学技术大学 A kind of three-dimensional constellation rotation encryption method based on radio channel characteristic
CN107454142A (en) * 2017-06-29 2017-12-08 北京邮电大学 Non- the obstruction content buffering method and device of a kind of content router

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
US20150134962A1 (en) * 2013-11-08 2015-05-14 MustBin Inc. Bin enabled data object encryption and storage apparatuses, methods and systems
CN104780161A (en) * 2015-03-23 2015-07-15 南京邮电大学 Searchable encryption method supporting multiple users in cloud storage
CN104836862A (en) * 2015-06-04 2015-08-12 成都果豆数字娱乐有限公司 Intelligent terminal data storage method
CN105187192A (en) * 2015-09-08 2015-12-23 广州六米网络科技有限公司 Three-dimensional secret code encryption algorithm
CN105488360A (en) * 2015-11-27 2016-04-13 北京印刷学院 Anti-fake processing method and device of three-dimensional model file with fbx format postfix
CN105512522A (en) * 2015-11-27 2016-04-20 北京印刷学院 Anti-counterfeiting processing method and device for three-dimensional model file with suffix in 3ds format
CN106789049A (en) * 2017-03-24 2017-05-31 中国人民解放军国防科学技术大学 A kind of three-dimensional constellation rotation encryption method based on radio channel characteristic
CN107454142A (en) * 2017-06-29 2017-12-08 北京邮电大学 Non- the obstruction content buffering method and device of a kind of content router

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SAMIRA BADER: "Design of a 3D Virtual World to Implement a Logical Access Control Mechanism", 《2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS》 *
李红岩: "基于超混沌系统的三维网格模型几何保留加密算法", 《现代电子技术 》 *

Also Published As

Publication number Publication date
CN110138555B (en) 2020-11-20

Similar Documents

Publication Publication Date Title
TWI750223B (en) Blockchain encrypted radio frequency chip storage design method
KR101369748B1 (en) Method for encrypting datas and appatus therefor
CN105324956B (en) The method and apparatus of encrypting plaintext data
CN106878013B (en) File encryption and decryption method and device
CN108959978A (en) The generation of key and acquisition methods and device in equipment
CN104660590B (en) A kind of file encryption secure cloud storage scheme
CN102063598A (en) Data encryption and decryption methods and devices
CN102306262A (en) Data encryption method and data encryption system
CN102355352A (en) Data confidentiality and integrity protection method
WO2017033843A1 (en) Searchable cryptograph processing system
CN102541762A (en) Data protector for external memory and data protection method
CN111984985A (en) HDL source code encryption method based on FPGA hardware system
CN104954362B (en) The encryption and decryption approaches and its device of sequence number
CN106656500A (en) Encryption device and method
JP2004350007A (en) Encryption system
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN101479774B (en) Cipher processing apparatus, data converting method, data converting program, recording medium and integrated circuit
CN110138555A (en) A kind of encryption and decryption method of FBX format threedimensional model
CN108809889B (en) Data deterministic deletion method based on data block random position negation
CN112134701B (en) Encryption method capable of repudiating editing of sensitive keywords
EP3832945B1 (en) System and method for protecting memory encryption against template attacks
CN111314053B (en) Data encryption and decryption method
CN111314052B (en) Data encryption and decryption method
CN103491384A (en) Encrypting method and device of video and decrypting method and device of video
CN100359494C (en) Electronic file characters internal code transformation encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant