CN110688644B - Method and system for realizing login of BIM system through graphic code - Google Patents

Method and system for realizing login of BIM system through graphic code Download PDF

Info

Publication number
CN110688644B
CN110688644B CN201910955742.2A CN201910955742A CN110688644B CN 110688644 B CN110688644 B CN 110688644B CN 201910955742 A CN201910955742 A CN 201910955742A CN 110688644 B CN110688644 B CN 110688644B
Authority
CN
China
Prior art keywords
graphic code
login
verification
code
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910955742.2A
Other languages
Chinese (zh)
Other versions
CN110688644A (en
Inventor
赵亮
郭双清
张凤岐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuzhijian Technology Chongqing Co ltd
Original Assignee
Chongqing Zhuzhijian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Zhuzhijian Information Technology Co ltd filed Critical Chongqing Zhuzhijian Information Technology Co ltd
Priority to CN201910955742.2A priority Critical patent/CN110688644B/en
Publication of CN110688644A publication Critical patent/CN110688644A/en
Application granted granted Critical
Publication of CN110688644B publication Critical patent/CN110688644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method and a system for realizing login of a BIM system through a graphic code, wherein the method comprises the following steps: s1, carrying out hash operation after decoding the obtained login graphic code to obtain a hash login code; s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password respectively with the hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side; and S3, if the verification authentication account and the verification authentication password received by the server are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful. The invention can log in the BIM system only by scanning the pattern code without repeatedly inputting the authentication account number and the authentication password, thereby enhancing the user experience and being safe and reliable.

Description

Method and system for realizing login of BIM system through graphic code
Technical Field
The invention relates to the technical field of BIM, in particular to a method and a system for realizing login of a BIM system through a graphic code.
Background
The Building Information model (Building Information Modeling) is based on various relevant Information data of a construction engineering project, is established, and simulates real Information of a Building through digital Information. The method has five characteristics of visualization, coordination, simulation, optimization and graphing. The building information model covers the geometry, spatial relationship, geographic information communication base station, nature and quantity of various building components (such as detailed information of suppliers). The building information model can be used for displaying the whole building life cycle, including the construction process and the operation process. The information of the materials in the building is very convenient to extract. Various parts and systems in the building can be presented. At present, when people use the internet, login information is often required to be input, the login information generally comprises an authentication account (login name) and an authentication password (password), and when the login information input by a user is matched with data stored in a server in advance, the user can remotely use the authority and the data corresponding to the login information. However, it is complicated to input the authentication account and the authentication password each time, which not only takes a certain time, but also may miss the authentication account and the authentication password, and is not easy to experience.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a method and a system for realizing login of a BIM system through a graphic code.
In order to achieve the above object, the present invention provides a method for a BIM system to log in through a graphic code, which includes the following steps:
s1, the client side obtains the login graphic code, and after decoding the obtained login graphic code, hash operation is carried out to obtain a hash login code;
s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password and the hash login code respectively to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
s3, the server side verifies whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in step S3, the method for obtaining the authentication account and the authentication password stored in the server includes the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned. And updating the information of the graphic code to be generated at intervals of T, which is favorable for ensuring the login safety.
In a preferred embodiment of the present invention, in step S31, the method for converting the to-be-generated graphic code information into the login graphic code includes the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph. The capacity of the two-dimensional code can be expanded, and the two-dimensional code is not only the existence of black and white square pigments.
In a preferred embodiment of the present invention, in step S1, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
In a preferred embodiment of the present invention, in step S2, the method for obtaining the authentication account and the authentication password comprises:
the method for obtaining the verification authentication account number comprises the following steps:
Figure GDA0002947954620000031
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountAuthenticating account information for the hash;
the method for obtaining the verification authentication password comprises the following steps:
Figure GDA0002947954620000032
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
The invention also discloses a login system of the method for realizing login by the BIM system through the graphic code, which comprises a Hash login code acquisition module, a transmission module and a verification module;
the hash login code acquisition module is used for acquiring a login graphic code by a client, decoding the acquired login graphic code and then performing hash operation to obtain a hash login code;
the transmission module is used for respectively carrying out Hash operation on the authentication account and the authentication password stored in the client to respectively obtain a Hash authentication account and a Hash authentication password, and respectively carrying out the Hash authentication account and the Hash authentication password with the Hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
the verification module is used for verifying whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in the verification module, the method for obtaining the verification authentication account and the verification authentication password stored in the server includes the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned.
In a preferred embodiment of the present invention, in step S31, the method for converting the to-be-generated graphic code information into the login graphic code includes the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
In a preferred embodiment of the present invention, in the hash login code obtaining module, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
and S12, acquiring the corresponding graphic code codes of the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and the stored graphic code mapping table.
In summary, due to the adoption of the technical scheme, the login of the BIM system can be realized only by scanning the pattern code without repeatedly inputting the authentication account number and the authentication password, so that the user experience is enhanced, and the method is safe and reliable.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Fig. 2 is a schematic diagram of the login graphic code of the present invention.
Fig. 3 is a schematic diagram of the login graphic code of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a method for realizing login by a BIM system through a graphic code, which comprises the following steps as shown in figure 1: s1, the client side obtains the login graphic code, and after decoding the obtained login graphic code, hash operation is carried out to obtain a hash login code;
s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password and the hash login code respectively to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side; in the present embodiment, the graphic code is a two-dimensional code.
S3, the server side verifies whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in step S3, the method for obtaining the authentication account and the authentication password stored in the server includes the following steps: s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned.
In a preferred embodiment of the present invention, a method for converting information of a graphic code to be generated into a graphic code includes the following steps: s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information; in the present embodiment, as shown in table 1, the code table includes characters and codes corresponding to the characters, and the codes may be binary codes, octal codes, decimal codes, or hexadecimal codes.
Table 1 shows a coding table according to the present invention
Figure GDA0002947954620000071
Figure GDA0002947954620000081
Figure GDA0002947954620000091
Figure GDA0002947954620000101
Figure GDA0002947954620000111
Figure GDA0002947954620000121
When the generated graphic code information is linked with a website (www.cnipa.gov.cn, cnipa. gov. cn), the code corresponding to each character in the website link character string is searched in the coding table, the codes corresponding to each character are sequentially arranged, and finally the multi-bit code corresponding to the website link is generated. As can be derived from table 1, the hexadecimal code of "w" is "77", ". the hexadecimal code of" E "," c "is" 63 "," n "is" 6E "," i "is" 69 "," p "is" 70 "," a "is" 61 "," g "is" 67 "," o "is" 6F ", and" v "is" 76 "; the hexadecimal coding of "www.cnipa.gov.cn" is "7777772E 636E6970612E676F762E 636E", as shown in table 2; the hexadecimal code of "cnipa. gov. cn" is "636E 6970612E676F762E 636E" as shown in table 3.
TABLE 2 hexadecimal code corresponding to "www.cnipa.gov.cn
To-be-generated graphic code information w w w . c n i p a . g o v . c n
Hexadecimal coding 77 77 77 2E 63 6E 69 70 61 2E 67 6F 76 2E 63 6E
Table 3 shows hexadecimal codes corresponding to "cnipa
To-be-generated graphic code information c n i p a . g o v . c n
Hexadecimal coding 63 6E 69 70 61 2E 67 6F 76 2E 63 6E
S312, generating a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination of gray, white and black, and can also comprise red, yellow, green, cyan, blue and purple, and the color types are expanded according to requirements; the shape of the graphic code sub-picture comprises one of rectangle, square and rhombus or any combination, and can also comprise circle, trapezoid, semicircle and parallelogram, and the shape of the graphic is expanded according to the requirement; as shown in table 4, different codes correspond to different two-dimensional code sub-patterns (graphs), and the colors or patterns of the different two-dimensional code sub-patterns are different. The code 0 corresponds to a white triangular graphic code sub-pattern, the code 1 corresponds to a white diamond graphic code sub-pattern, the code 2 corresponds to a white rectangular graphic code sub-pattern, the code 3 corresponds to a white trapezoidal graphic code sub-pattern, the code 4 corresponds to a white semicircular graphic code sub-pattern, the code 5 corresponds to a white circular graphic code sub-pattern, the code 6 corresponds to a gray triangular graphic code sub-pattern, the code 7 corresponds to a gray diamond graphic code sub-pattern, the code 8 corresponds to a gray rectangular graphic code sub-pattern, the code 9 corresponds to a gray trapezoidal graphic code sub-pattern, the code A corresponds to a gray semicircular graphic code sub-pattern, the code B corresponds to a gray circular graphic code sub-pattern, the code C corresponds to a black graphic code sub-pattern, the code D corresponds to a white parallelogram graphic code sub-pattern, the code E corresponds to a gray graphic code sub-pattern, and the code F corresponds to a white graphic code sub-pattern.
Table 4 is a mapping table of the graphic code according to the present invention
Figure GDA0002947954620000131
S313, obtaining a graphic code sub-picture corresponding to the graphic code through a graphic code mapping table;
and splitting the two-bit hexadecimal code into unit hexadecimal codes according to the table 4, and respectively selecting corresponding graphic code sub-pictures in a contrast manner. Shown in table 5 are the graphic code sub-patterns sequentially corresponding to "7777772E 636E6970612E676F762E 636E". The graphic code sub-patterns sequentially corresponding to "636E 6970612E676F762E 636E" are shown in Table 6.
Table 5 shows the corresponding graphic code sub-patterns in the sequence of "7777772E 636E6970612E676F762E636E
Figure GDA0002947954620000141
Figure GDA0002947954620000151
Table 6 shows the corresponding graphic code sub-patterns in the sequence of "636E 6970612E676F762E636E
Figure GDA0002947954620000152
Figure GDA0002947954620000161
And S314, generating a graphic code corresponding to the graphic code through the graphic code sub-picture. And sequentially arranging the graphic code sub-pictures in a form of A x A grid (sixteen grids) from left to right and from top to bottom to generate a two-dimensional code corresponding to the graphic code, as shown in figures 2 and 3. In the embodiment, the method for converting the graphic code information to be generated into the login graphic code and the method for decoding the login graphic code form an inverse operation rule with each other.
In a preferred embodiment of the present invention, in step S1, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
In a preferred embodiment of the present invention, in step S2, the method for obtaining the authentication account and the authentication password comprises:
the method for obtaining the verification authentication account number comprises the following steps:
Figure GDA0002947954620000171
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountIn order to hash the authentication account information,
Figure GDA0002947954620000172
is an exclusive or operation;
the method for obtaining the verification authentication password comprises the following steps:
Figure GDA0002947954620000173
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
The invention also discloses a login system of the method for realizing login by the BIM system through the graphic code, which comprises a Hash login code acquisition module, a transmission module and a verification module;
the hash login code acquisition module is used for acquiring a login graphic code by a client, decoding the acquired login graphic code and then performing hash operation to obtain a hash login code;
the transmission module is used for respectively carrying out Hash operation on the authentication account and the authentication password stored in the client to respectively obtain a Hash authentication account and a Hash authentication password, and respectively carrying out the Hash authentication account and the Hash authentication password with the Hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
the verification module is used for verifying whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in the verification module, the method for obtaining the verification authentication account and the verification authentication password stored in the server includes the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after the time T, the time T is positive, preferably, the time T is one day, the information of the graphic code to be generated is updated, and the step S31 is returned.
In a preferred embodiment of the present invention, in step S31, the method for converting the to-be-generated graphic code information into the login graphic code includes the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
In a preferred embodiment of the present invention, in the hash login code obtaining module, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
In a preferred embodiment of the present invention, in the transmission module, the method for obtaining the authentication account and the authentication password comprises:
the method for obtaining the verification authentication account number comprises the following steps:
Figure GDA0002947954620000191
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountIn order to hash the authentication account information,
Figure GDA0002947954620000192
is an exclusive or operation;
the method for obtaining the verification authentication password comprises the following steps:
Figure GDA0002947954620000193
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (8)

1. A method for realizing login by a BIM system through a graphic code is characterized by comprising the following steps:
s1, the client side obtains the login graphic code, and after decoding the obtained login graphic code, hash operation is carried out to obtain a hash login code;
s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password and the hash login code respectively to obtain a verification authentication account and a verification authentication password;
the method for obtaining the verification authentication account number comprises the following steps:
Figure FDA0003087433640000011
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountAuthenticating account information for the hash;
Figure FDA0003087433640000012
is an exclusive or operation;
the method for obtaining the verification authentication password comprises the following steps:
Figure FDA0003087433640000013
PASSWORD is to verify the authentication PASSWORD information, WpasswordAuthenticating the cryptographic information for the hash;
sending the obtained verification authentication account and the verification authentication password to a server side;
s3, the server side verifies whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
the method for acquiring the verification authentication account number and the verification authentication password stored by the server comprises the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
s34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned;
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
2. The method for realizing login by using a graphic code in the BIM system according to claim 1, wherein in step S31, the method for converting the graphic code information to be generated into the login graphic code comprises the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
3. The BIM system of claim 1, wherein the method for implementing login via graphic code, in step S1, the method for decoding login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
4. The BIM system login system for realizing the login method through the graphic code according to one of claims 1 to 3, wherein the BIM system login system comprises a Hash login code acquisition module, a transmission module and a verification module;
the hash login code acquisition module is used for acquiring a login graphic code by a client, decoding the acquired login graphic code and then performing hash operation to obtain a hash login code;
the transmission module is used for respectively carrying out Hash operation on the authentication account and the authentication password stored in the client to respectively obtain a Hash authentication account and a Hash authentication password, and respectively carrying out the Hash authentication account and the Hash authentication password with the Hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
the verification module is used for verifying whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
5. The login system of the method for realizing login by the BIM system through the graphic code according to claim 4, wherein in the verification module, the method for acquiring the verification authentication account and the verification authentication password stored by the server comprises the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned.
6. The login system of the method for realizing login through the graphical code by the BIM system according to claim 5, wherein in step S31, the method for converting the graphical code information to be generated into the login graphical code comprises the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
7. The login system of the method for realizing login through the graphical code by the BIM system as claimed in claim 5, wherein in the hash login code acquisition module, the method for decoding the login graphical code comprises the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
8. The login system of the method for realizing login by the BIM system according to claim 5, wherein the method for obtaining the authentication account and the authentication password in the transmission module comprises:
the method for obtaining the verification authentication account number comprises the following steps:
Figure FDA0003087433640000041
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountAuthenticating account information for the hash;
the method for obtaining the verification authentication password comprises the following steps:
Figure FDA0003087433640000042
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
CN201910955742.2A 2019-10-09 2019-10-09 Method and system for realizing login of BIM system through graphic code Active CN110688644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910955742.2A CN110688644B (en) 2019-10-09 2019-10-09 Method and system for realizing login of BIM system through graphic code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910955742.2A CN110688644B (en) 2019-10-09 2019-10-09 Method and system for realizing login of BIM system through graphic code

Publications (2)

Publication Number Publication Date
CN110688644A CN110688644A (en) 2020-01-14
CN110688644B true CN110688644B (en) 2021-07-20

Family

ID=69111783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910955742.2A Active CN110688644B (en) 2019-10-09 2019-10-09 Method and system for realizing login of BIM system through graphic code

Country Status (1)

Country Link
CN (1) CN110688644B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312535B (en) * 2021-05-28 2023-02-24 中铁十一局集团第五工程有限公司 Engineering survey intelligent management control cloud platform
CN113312534B (en) * 2021-05-28 2022-08-05 中铁十一局集团第五工程有限公司 Engineering survey intelligent management platform
CN113259136B (en) * 2021-07-07 2021-11-16 浙江宇视科技有限公司 Multi-client cooperative authentication method, device, equipment and medium for feature recognition
CN113783840B (en) * 2021-08-06 2023-06-23 维沃移动通信(杭州)有限公司 Account login method, device, equipment and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472627A (en) * 2003-07-17 2004-02-04 王玉宏 Binary grahpics code encoding method and character composed rule thereof
WO2010031110A1 (en) * 2008-09-16 2010-03-25 Edith Cowan University Data storage device and encoding/decoding methods
WO2014027424A1 (en) * 2012-08-17 2014-02-20 A・Tコミュニケーションズ株式会社 Two-dimensional code authentication device, two-dimensional code generation device, two-dimensional code authentication method and program
CN103533392B (en) * 2013-10-25 2016-08-17 乐视网信息技术(北京)股份有限公司 A kind of account login method, electronic equipment and system
CN106713225B (en) * 2015-11-12 2021-02-02 国民技术股份有限公司 Two-dimensional code device and system based on two-dimensional code authentication and operation method thereof
CN109104290A (en) * 2018-10-26 2018-12-28 南京航空航天大学 It is a kind of without re-register and to support the dynamic password authentication method of offline authentication

Also Published As

Publication number Publication date
CN110688644A (en) 2020-01-14

Similar Documents

Publication Publication Date Title
CN110688644B (en) Method and system for realizing login of BIM system through graphic code
CN106056185B (en) readable matrix code
CN105095936B (en) A kind of two-dimensional image code and its generation method and system based on Information hiding
CN107610038B (en) Watermark display method, device and system
CN109190736B (en) Anti-counterfeiting two-dimensional code and generation method and generation application system thereof
CN106384328A (en) Image digital copyright protecting method and image digital copyright protecting system based on frequency domain digital watermarking algorithm
CN107590394B (en) A kind of image encryption method based on chaotic maps and bit recombination
CN110430336A (en) Image concealing and the method for recovery, equipment and storage medium
CN111581605A (en) Block chain-based multi-person participation BIM drawing copyright protection system and method
CN112968798B (en) Virtual and real network environment automatic generation method suitable for electric power industrial control target range platform
CN110475038A (en) A kind of character of combination minimum closure coding is drawn production and is hidden and restoration methods
CN106533680A (en) Quantum neighbor query method for protecting position privacy
CN107704893A (en) Generation and the method and Quick Response Code multiplex system of scanning Quick Response Code
CN103259621A (en) Encoding method and device of colorized three-dimensional codes and application method and system of colorized three-dimensional codes
CN104616049A (en) Colored anti-counterfeiting label and method for realizing product anti-counterfeiting
CN104394166A (en) Certificate anti-fake authentication system and method for mobile terminal under cloud environment
CN109214486B (en) Three-dimensional code, three-dimensional code generation method and device, and three-dimensional code identification method and device
US10997482B2 (en) Two-dimensional cryptographic poly-chromatic poly-digital code
CN108959898B (en) Graph unlocking password authentication method based on graph addition algorithm
CN110430335A (en) A kind of method, equipment and the storage medium of information disguising and recovery
CN111147686A (en) Video and image content tracking method and system based on steganographic information
CN110417551A (en) A kind of the character picture production camouflage and restoration methods of the diffusion of combination error
JP4913493B2 (en) Information leakage prevention method
CN106682122B (en) Optimal path verification method based on data interaction
CN106803118A (en) Anti-counterfeiting mark and recognition methods based on stealthy private mark technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220520

Address after: 400000 24-1, No. 58-7, shabin Road, Shapingba District, Chongqing

Patentee after: Zhuzhijian Technology (Chongqing) Co.,Ltd.

Address before: 400042 5-3, building 1, No.16 shijitian street, Yuzhong District, Chongqing

Patentee before: Chongqing Zhuzhijian Information Technology Co.,Ltd.

TR01 Transfer of patent right