Summary of the invention
In order to solve the above technical problems, the invention discloses a kind of BIM design software secure storages and circulation retrospect monitoring
Technology, it the following steps are included:
DES example is inserted into BIM design software, the data listened to are based on https agreement and passed through by DES Service Instance
DES proxy server is transferred to background server;
Background server constructs data volume using Restful api, and the format of system customization storing data is cim;
By the other registration table of the operating system grade of modification and the cim resolver write, cim file is made to be designed software
Load;
In background server setting operation permission threshold value, when opening file, DES example is actively submitted to DES agency service
The file information, DES agency service combining geographic location information are sent to background server, and the file information is in given threshold range
It is interior, obtain operating right;
Encryption policy is provided by background server, realizes corresponding algorithm for each encryption policy by DES agency service,
Open file is subjected to encrypting and decrypting;
The preservation function that band has permission control is replaced into the original preservation function of BIM software, saves file, DES example is backward
Platform server request permissions, server decide whether return state authorization code according to request.
It further, further include by being inserted into a digital code in BIM design software data, system is directed to identification code
Feature, selectively for design software file encryption and to certain files in batch encrypt.
It further include elastic storage service further, elastic storage service includes three-level, Cache rank, and persistence is deposited
Store up rank and data warehouse rank.
Another kind settling mode of the invention is to provide a kind of BIM design software secure storage and the retrospect monitoring system that circulates,
It is characterized in that,
It includes:
BIM design software module, the BIM design software loaded by PC machine and thereon form;
DES module, the instant storage for monitoring user are requested, log-on data encryption and storage energy after discovery storage request
Power, including DES example and DES agency service, the DES example and DES are integrated into BIM design software;
Load balancing module, for handling concurrent request, including hardware components load balancer and software section pass through collection
The load balancing that group's Nginx server is built, the hardware components load balancer are loaded by network with BIM design software
PC machine connection;
Message queue module, including several application proxies, each application are set for application service in application cluster module
Agency includes several Nginx servers, and to service multiple application service examples, application proxy corresponds to phase in load balancing module
Answer Nginx server;
Application service is divided into several application service examples according to business by application cluster module;
L2 cache module, to solve the problems, such as data exchange between application service, hardware components include that multiport turns
Change device, software section uses message queue component;
Data warehouse module, for storing and obtaining data.
Further, the data warehouse module includes relevant database and non-relational database, and disposes data
Interface service obtains and storing data.
Further, Nginx server and application service example in application cluster module in the message queue module
Quantitative proportion is 1:8.
Further, the message queue component in the L2 cache module is RabbitMQ.
Further, the data warehouse module China-African tie type database is implemented by Redish and Couch DB, relationship
Type database is implemented by MySql and PostgreSQL.
Another solution disclosed by the invention is to provide a kind of BIM design software secure storage and the retrospect monitoring dress that circulates
It sets, it includes PC machine, for loading BIM design software;Load balancer, for handling concurrent request;Multiport converter is used
To solve the problems, such as data exchange between application service;Store the equipment of equipment, server, routing device to constitute cloud service
And facility.
System of the invention bring it is following several the utility model has the advantages that 1, to the data of design tool software operation or file into
Line trace and retrospect;2, system presses region, and the time, user, the permission of the information such as file decision user's operation file can be with logarithm
According to or file carry out authorization control;3, system provides encryption policy abundant, by DES agency service for each encryption
Strategy realizes corresponding algorithm, user can by open file, by select different Encryption Algorithm to file or data into
Row decryption encryption, encryption policy is abundant, so that the difficulty for cracking data increases;4, the seamless implantation design tool software of the system,
It is transparent to user;5, user data and file data will not be lost;6, Cim formatted file supports the upgrading of design tool software;
7, system is inserted into a digital code in design tool software data, and system can be directed to the feature of identification code, there is selection
It is that design tool software document is encrypted, bulk encryption is supported, for different identification patterns selectively to difference
File carries out bulk encryption operation;8, server end has preferable elasticity using the scheme of multistage storage, supports laterally to expand
Exhibition.9, the self-defining cim file format of the system, realizes the principle that model data is isolated with supplemental characteristic in cim format.
Specific embodiment
The present invention is described in detail with reference to the accompanying drawing.
If Fig. 1 is DES secure storage information tracing system construction drawing of the present invention, BIM of the present invention
Design software secure storage and circulation retrospect monitoring system be one and be integrated with cryptography, informatics, memory technology,
The complication system of the communication technology needs multiple component cooperations to constitute.Fig. 2 is the guiding plan for implementing the system, such as Fig. 2 and Fig. 3 institute
Show that present system includes BIM design software module and background server.BIM design software module is that load BIM is set in PC machine
Software sharing is counted, BIM design software includes Revit, SketchUP, Rhino etc..A DES is embedded in BIM design software
Module, DES module belong to local service, are mainly used for monitoring the instant storage request of user, start number after discovery storage request
According to encryption and storage capacity, DES module includes DES example and DES agency service, and DES example has several functions as follows:
(1) DES example is used for monitoring users data, these data include the file information, user information and location information;(2) it detects immediately
The operation behavior for listening user automatically wakes up processing unit, is first turned off the original of design software when finding user's storage file
Raw store function;Monitoring technique has used socket as communication bridge, and own encryption is established on this communication bridge
Instruction takes anonymous way when monitoring users operation, Active Registration Revit event come to user behavior carry out with
Track;(3) it is switched to the storage service of oneself by DES example, and start des encryption logic to be stored into the file of disk into
Row encryption;(4) after the completion of finally encrypting, user file is encrypted exclusive format cim and is stored, guarantee user data
Safety and user's later period circulate during retrospect.These information can be transferred to background server by DES agency service
Data volume is constructed, the tracking and retrospect of design tool software data file are realized.DES agency service is an encryption/decryption
Service is to carry out encrypting and decrypting to local file using the algorithm of technical grade encryption standard.DES agency service composition is based on
Socket is connected to DES example, including encrypting-decrypting module, and is based on https connection background service, and workflow is to connect
Encrypted instruction is received, obtains encryption standard from backstage, encrypting and decrypting is carried out to file according to instruction and encryption standard.By DES reality
Example is bundled in an installation procedure with DES agency service, and by this installation procedure, it is soft that the two components are integrated into design
In part.
Background server includes load balancing module, message queue module, application cluster module, L2 cache module sum number
According to memory module.Wherein load balancing module is suitable for processing concurrent request and sets up, and is divided into hardware and software part, hardware
Part is load balancer, is connect by internet with PC machine, software section can be built by cluster Nginx server.
Different application proxies is arranged for different application services in message queue module, since each service can start
Multiple application service examples, it is therefore desirable to which multiple Nginx servers service multiple application service examples, are obtained by test data
Know, the quantitative proportion of Nginx server and application service example is controlled in 1:8.
Application cluster module is according to the cluster of the application service example of delineation of activities, each application service example represents
A certain business scenario needs to resolve into service part several junior units, each unit can as business becomes more sophisticated
With by multiple application service example services, application service example include user management, file management, encryption policy, usertracking,
The application services example such as Version Control and information filing, the application service example of the part need to rely on a large amount of hardware money
Source.It generally refers to constitute the equipment and facility of cloud service, for example calculates service, storage service, message-oriented middleware service etc.
Infrastructure is specifically exactly fast storage equipment (such as DFS or NAS), server, routing device, data base administration system
System etc..
L2 cache module is to solve the problems, such as data exchange between application service example, and hardware components include multiterminal
Mouth converter often uses message queue component, such as RabbitMQ, the portion when implementing to dispose this part
Divide and needs to extend its scale according to the quantity of application service example and service type.
Data warehouse module is for storing and obtaining data, mainly by relevant database and non-relational database structure
At, relevant database and non-relational database respectively for structural data and unstructured data, it can be used
Redis and Couch DB implements relevant database portion to implement non-relational database part, MySql and PostgreSQL
Point, it additionally needs to dispose data-interface service acquisition and storing data.
As shown in Figure 1, being to realize peace using BIM design software secure storage of the present invention and circulation retrospect monitoring system below
Full storage and circulation retrospect monitoring technology:
S101 is embedded in a DES example in BIM design software, the data listened to is transmitted by DES agency service
To background server, communication mode is based on https agreement, and the mode of https safe transmission guarantees data in transmission process
It is encryption, DES proxy server is based on socket and is connected to DES example.
S102 constructs data volume using restful api, and in order to support data safely to circulate, system customization stores number
According to format be cim, model data has a large amount of vertex information to constitute in cim format, the geometry number of these information configuration files
According to needing individually specified file progress to be stored in a manner of binary since vertex information quantity is too many;And parameter
Data are made of many descriptive informations, are text datas, are sorted out and from geometric data, and text file such as json is arrived in storage
In relevant database, the separation of geological information and parameter information is realized.
S103 modifies the other registration table of operating system grade to make design software identify cim file, while writing cim text
Part resolver, by an automation installation procedure triggering connection, cim document parser connects cim file and design software;
After the completion of connection, user clicks or drag operation cim file, and this document can be designed software load, the system uses
Win32 message mechanism obtains window handle, and cim file is pulled processing logic and is registered to dragging event, and this pulls thing
Part is provided by window handle.
S104, in order to obtain the permission of file operation, when a file is opened, DES example can be acted on behalf of actively to DES and be taken
Business is presented a paper information, and after DES agency service obtains the file information, combining geographic location information is sent to background service
Device after background server receives and parses through these information, the timestamp of this document is obtained further according to the file information, finally by file
Information, location information, temporal information are uniformly transferred to permission control service, control one state authorization of service creation by permission
Code, and DES example is returned to, system is determined the permission of user's operation file by information such as region, time, user, files, is exceeded
Given threshold, then user can not obtain the authorization of requested document;Such as: DES agency service according to the IP of current machine come
The geographical location for determining user, has exceeded the threshold value of file affiliated area, then the user can not obtain the authorization of this document;This
Outside, file management application Service Instance can control the authorization of file according to the life cycle of file, these are specifically awarded
Power mode has static opening, and read-only opening is read-write etc..
S105, Fig. 4 are the schematic diagram of DES example and DES agency, and software installation is in disk, in order to support different add
Close decipherment algorithm, system provide encryption policy abundant, these strategies are unified to be provided by background service, and is acted on behalf of by DES
Service realizes corresponding algorithm for each encryption policy.User can be by open file, by selecting different encryptions
Encryption is decrypted to file in algorithm, these algorithms include but is not limited to following several: rc4-md5, salsa20,
chacha20、chacha20-ietf、aes-256-cfb、aes-192-cfb、 aes-128-cfb、aes-256-ctr、aes-
192-ctr、aes-128-ctr、bf-cfb、 camellia-128-cfb、camellia-192-cfb、camellia-256-
cfb。
The preservation function that band has permission control is replaced primary preservation function by S106, when user saves file, DES
Example can return to a state authorization code according to solicited message to backstage service request permission, server, this authorization code can determine
Whether this document can be saved.Background server setting saves permission threshold value, if user saves permission to background request, when
User does not save permission, then user should be prompted to lack preservation permission at this time, preservation processing is not carried out later.User can
To initiate application authorization, pass through through audit, administrator can be modified by background server and be authorized, so that user obtains storage power
Limit, convenient for the generation and flowing monitoring and management to file.
The relevant data of a large number of users will be generated, during using design software in order to which these data are effective
Storage, system devise a flexible storage service, and elastic storage service is based on relevant database and non-relational
Database, it is extending transversely go out unlimited storage capacity concept.Elastic storage service is broadly divided into three-level: 1.Cache rank, this
A rank has mainly cached the user information that design tool software is used;2. persistent storage rank, this rank master
Syllabus be so that user data can persistent storage, while can support quick-searching data;3. data warehouse rank,
This rank main purpose is archiving user's data, and presses region division data, and the data interchange of each rank interconnects, simultaneously
The storage capacity of each rank can be extending transversely, and unified data have been run on the basis of this tertiary storage and have been connect
Mouthful, the uniformity of data, integrality, atomicity are realized by these interfaces.
User can generate a large amount of file relevant data during using design software, be used with user data
Framework it is similar, which also uses three-level, and extendible technology carrys out extension storage service, and by unified data-interface,
The relevant data of accessing file.
In addition, further comprising the steps of, system is inserted into a digital code in design software data, is known by data
Other code, system can be directed to the feature of identification code, selectively be encrypted for design software file, and there are many moulds for identification code
Formula without the file of identification code, does not then need for example, the file of the identification code of insertion F000 beginning can be encrypted
Encryption, the step can carry out bulk encryption for certain files.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.