CN110688644B - Method and system for realizing login of BIM system through graphic code - Google Patents
Method and system for realizing login of BIM system through graphic code Download PDFInfo
- Publication number
- CN110688644B CN110688644B CN201910955742.2A CN201910955742A CN110688644B CN 110688644 B CN110688644 B CN 110688644B CN 201910955742 A CN201910955742 A CN 201910955742A CN 110688644 B CN110688644 B CN 110688644B
- Authority
- CN
- China
- Prior art keywords
- graphic code
- login
- verification
- code
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method and a system for realizing login of a BIM system through a graphic code, wherein the method comprises the following steps: s1, carrying out hash operation after decoding the obtained login graphic code to obtain a hash login code; s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password respectively with the hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side; and S3, if the verification authentication account and the verification authentication password received by the server are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful. The invention can log in the BIM system only by scanning the pattern code without repeatedly inputting the authentication account number and the authentication password, thereby enhancing the user experience and being safe and reliable.
Description
Technical Field
The invention relates to the technical field of BIM, in particular to a method and a system for realizing login of a BIM system through a graphic code.
Background
The Building Information model (Building Information Modeling) is based on various relevant Information data of a construction engineering project, is established, and simulates real Information of a Building through digital Information. The method has five characteristics of visualization, coordination, simulation, optimization and graphing. The building information model covers the geometry, spatial relationship, geographic information communication base station, nature and quantity of various building components (such as detailed information of suppliers). The building information model can be used for displaying the whole building life cycle, including the construction process and the operation process. The information of the materials in the building is very convenient to extract. Various parts and systems in the building can be presented. At present, when people use the internet, login information is often required to be input, the login information generally comprises an authentication account (login name) and an authentication password (password), and when the login information input by a user is matched with data stored in a server in advance, the user can remotely use the authority and the data corresponding to the login information. However, it is complicated to input the authentication account and the authentication password each time, which not only takes a certain time, but also may miss the authentication account and the authentication password, and is not easy to experience.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a method and a system for realizing login of a BIM system through a graphic code.
In order to achieve the above object, the present invention provides a method for a BIM system to log in through a graphic code, which includes the following steps:
s1, the client side obtains the login graphic code, and after decoding the obtained login graphic code, hash operation is carried out to obtain a hash login code;
s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password and the hash login code respectively to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
s3, the server side verifies whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in step S3, the method for obtaining the authentication account and the authentication password stored in the server includes the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned. And updating the information of the graphic code to be generated at intervals of T, which is favorable for ensuring the login safety.
In a preferred embodiment of the present invention, in step S31, the method for converting the to-be-generated graphic code information into the login graphic code includes the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph. The capacity of the two-dimensional code can be expanded, and the two-dimensional code is not only the existence of black and white square pigments.
In a preferred embodiment of the present invention, in step S1, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
In a preferred embodiment of the present invention, in step S2, the method for obtaining the authentication account and the authentication password comprises:
the method for obtaining the verification authentication account number comprises the following steps:
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountAuthenticating account information for the hash;
the method for obtaining the verification authentication password comprises the following steps:
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
The invention also discloses a login system of the method for realizing login by the BIM system through the graphic code, which comprises a Hash login code acquisition module, a transmission module and a verification module;
the hash login code acquisition module is used for acquiring a login graphic code by a client, decoding the acquired login graphic code and then performing hash operation to obtain a hash login code;
the transmission module is used for respectively carrying out Hash operation on the authentication account and the authentication password stored in the client to respectively obtain a Hash authentication account and a Hash authentication password, and respectively carrying out the Hash authentication account and the Hash authentication password with the Hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
the verification module is used for verifying whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in the verification module, the method for obtaining the verification authentication account and the verification authentication password stored in the server includes the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned.
In a preferred embodiment of the present invention, in step S31, the method for converting the to-be-generated graphic code information into the login graphic code includes the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
In a preferred embodiment of the present invention, in the hash login code obtaining module, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
and S12, acquiring the corresponding graphic code codes of the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and the stored graphic code mapping table.
In summary, due to the adoption of the technical scheme, the login of the BIM system can be realized only by scanning the pattern code without repeatedly inputting the authentication account number and the authentication password, so that the user experience is enhanced, and the method is safe and reliable.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Fig. 2 is a schematic diagram of the login graphic code of the present invention.
Fig. 3 is a schematic diagram of the login graphic code of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a method for realizing login by a BIM system through a graphic code, which comprises the following steps as shown in figure 1: s1, the client side obtains the login graphic code, and after decoding the obtained login graphic code, hash operation is carried out to obtain a hash login code;
s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password and the hash login code respectively to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side; in the present embodiment, the graphic code is a two-dimensional code.
S3, the server side verifies whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in step S3, the method for obtaining the authentication account and the authentication password stored in the server includes the following steps: s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned.
In a preferred embodiment of the present invention, a method for converting information of a graphic code to be generated into a graphic code includes the following steps: s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information; in the present embodiment, as shown in table 1, the code table includes characters and codes corresponding to the characters, and the codes may be binary codes, octal codes, decimal codes, or hexadecimal codes.
Table 1 shows a coding table according to the present invention
When the generated graphic code information is linked with a website (www.cnipa.gov.cn, cnipa. gov. cn), the code corresponding to each character in the website link character string is searched in the coding table, the codes corresponding to each character are sequentially arranged, and finally the multi-bit code corresponding to the website link is generated. As can be derived from table 1, the hexadecimal code of "w" is "77", ". the hexadecimal code of" E "," c "is" 63 "," n "is" 6E "," i "is" 69 "," p "is" 70 "," a "is" 61 "," g "is" 67 "," o "is" 6F ", and" v "is" 76 "; the hexadecimal coding of "www.cnipa.gov.cn" is "7777772E 636E6970612E676F762E 636E", as shown in table 2; the hexadecimal code of "cnipa. gov. cn" is "636E 6970612E676F762E 636E" as shown in table 3.
TABLE 2 hexadecimal code corresponding to "www.cnipa.gov.cn
To-be-generated graphic code information | w | w | w | . | c | n | i | p | a | . | g | o | v | . | c | n |
Hexadecimal coding | 77 | 77 | 77 | 2E | 63 | 6E | 69 | 70 | 61 | 2E | 67 | 6F | 76 | 2E | 63 | 6E |
Table 3 shows hexadecimal codes corresponding to "cnipa
To-be-generated graphic code information | c | n | i | p | a | . | g | o | v | . | c | n |
Hexadecimal coding | 63 | 6E | 69 | 70 | 61 | 2E | 67 | 6F | 76 | 2E | 63 | 6E |
S312, generating a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination of gray, white and black, and can also comprise red, yellow, green, cyan, blue and purple, and the color types are expanded according to requirements; the shape of the graphic code sub-picture comprises one of rectangle, square and rhombus or any combination, and can also comprise circle, trapezoid, semicircle and parallelogram, and the shape of the graphic is expanded according to the requirement; as shown in table 4, different codes correspond to different two-dimensional code sub-patterns (graphs), and the colors or patterns of the different two-dimensional code sub-patterns are different. The code 0 corresponds to a white triangular graphic code sub-pattern, the code 1 corresponds to a white diamond graphic code sub-pattern, the code 2 corresponds to a white rectangular graphic code sub-pattern, the code 3 corresponds to a white trapezoidal graphic code sub-pattern, the code 4 corresponds to a white semicircular graphic code sub-pattern, the code 5 corresponds to a white circular graphic code sub-pattern, the code 6 corresponds to a gray triangular graphic code sub-pattern, the code 7 corresponds to a gray diamond graphic code sub-pattern, the code 8 corresponds to a gray rectangular graphic code sub-pattern, the code 9 corresponds to a gray trapezoidal graphic code sub-pattern, the code A corresponds to a gray semicircular graphic code sub-pattern, the code B corresponds to a gray circular graphic code sub-pattern, the code C corresponds to a black graphic code sub-pattern, the code D corresponds to a white parallelogram graphic code sub-pattern, the code E corresponds to a gray graphic code sub-pattern, and the code F corresponds to a white graphic code sub-pattern.
Table 4 is a mapping table of the graphic code according to the present invention
S313, obtaining a graphic code sub-picture corresponding to the graphic code through a graphic code mapping table;
and splitting the two-bit hexadecimal code into unit hexadecimal codes according to the table 4, and respectively selecting corresponding graphic code sub-pictures in a contrast manner. Shown in table 5 are the graphic code sub-patterns sequentially corresponding to "7777772E 636E6970612E676F762E 636E". The graphic code sub-patterns sequentially corresponding to "636E 6970612E676F762E 636E" are shown in Table 6.
Table 5 shows the corresponding graphic code sub-patterns in the sequence of "7777772E 636E6970612E676F762E636E
Table 6 shows the corresponding graphic code sub-patterns in the sequence of "636E 6970612E676F762E636E
And S314, generating a graphic code corresponding to the graphic code through the graphic code sub-picture. And sequentially arranging the graphic code sub-pictures in a form of A x A grid (sixteen grids) from left to right and from top to bottom to generate a two-dimensional code corresponding to the graphic code, as shown in figures 2 and 3. In the embodiment, the method for converting the graphic code information to be generated into the login graphic code and the method for decoding the login graphic code form an inverse operation rule with each other.
In a preferred embodiment of the present invention, in step S1, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
In a preferred embodiment of the present invention, in step S2, the method for obtaining the authentication account and the authentication password comprises:
the method for obtaining the verification authentication account number comprises the following steps:
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountIn order to hash the authentication account information,is an exclusive or operation;
the method for obtaining the verification authentication password comprises the following steps:
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
The invention also discloses a login system of the method for realizing login by the BIM system through the graphic code, which comprises a Hash login code acquisition module, a transmission module and a verification module;
the hash login code acquisition module is used for acquiring a login graphic code by a client, decoding the acquired login graphic code and then performing hash operation to obtain a hash login code;
the transmission module is used for respectively carrying out Hash operation on the authentication account and the authentication password stored in the client to respectively obtain a Hash authentication account and a Hash authentication password, and respectively carrying out the Hash authentication account and the Hash authentication password with the Hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
the verification module is used for verifying whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
In a preferred embodiment of the present invention, in the verification module, the method for obtaining the verification authentication account and the verification authentication password stored in the server includes the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after the time T, the time T is positive, preferably, the time T is one day, the information of the graphic code to be generated is updated, and the step S31 is returned.
In a preferred embodiment of the present invention, in step S31, the method for converting the to-be-generated graphic code information into the login graphic code includes the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
In a preferred embodiment of the present invention, in the hash login code obtaining module, the method for decoding the login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
In a preferred embodiment of the present invention, in the transmission module, the method for obtaining the authentication account and the authentication password comprises:
the method for obtaining the verification authentication account number comprises the following steps:
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountIn order to hash the authentication account information,is an exclusive or operation;
the method for obtaining the verification authentication password comprises the following steps:
PASSWORD is to verify the authentication PASSWORD information, WpasswordThe cryptographic information is authenticated for hash.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (8)
1. A method for realizing login by a BIM system through a graphic code is characterized by comprising the following steps:
s1, the client side obtains the login graphic code, and after decoding the obtained login graphic code, hash operation is carried out to obtain a hash login code;
s2, performing hash operation on the authentication account and the authentication password stored in the client respectively to obtain a hash authentication account and a hash authentication password respectively, and performing hash operation on the obtained hash authentication account and the obtained hash authentication password and the hash login code respectively to obtain a verification authentication account and a verification authentication password;
the method for obtaining the verification authentication account number comprises the following steps:
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountAuthenticating account information for the hash;is an exclusive or operation;
the method for obtaining the verification authentication password comprises the following steps:
PASSWORD is to verify the authentication PASSWORD information, WpasswordAuthenticating the cryptographic information for the hash;
sending the obtained verification authentication account and the verification authentication password to a server side;
s3, the server side verifies whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
the method for acquiring the verification authentication account number and the verification authentication password stored by the server comprises the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
s34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned;
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
2. The method for realizing login by using a graphic code in the BIM system according to claim 1, wherein in step S31, the method for converting the graphic code information to be generated into the login graphic code comprises the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
3. The BIM system of claim 1, wherein the method for implementing login via graphic code, in step S1, the method for decoding login graphic code includes the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
4. The BIM system login system for realizing the login method through the graphic code according to one of claims 1 to 3, wherein the BIM system login system comprises a Hash login code acquisition module, a transmission module and a verification module;
the hash login code acquisition module is used for acquiring a login graphic code by a client, decoding the acquired login graphic code and then performing hash operation to obtain a hash login code;
the transmission module is used for respectively carrying out Hash operation on the authentication account and the authentication password stored in the client to respectively obtain a Hash authentication account and a Hash authentication password, and respectively carrying out the Hash authentication account and the Hash authentication password with the Hash login code to obtain a verification authentication account and a verification authentication password; sending the obtained verification authentication account and the verification authentication password to a server side;
the verification module is used for verifying whether the received verification authentication account and the received verification authentication password are consistent with the verification authentication account and the verification authentication password stored by the server:
if the verification authentication account and the verification authentication password received by the server side are consistent with the verification authentication account and the verification authentication password stored by the server, the verification login is successful;
and if the verification authentication account and the verification authentication password received by the server end are inconsistent with the verification authentication account and the verification authentication password stored by the server, the verification login is not passed.
5. The login system of the method for realizing login by the BIM system through the graphic code according to claim 4, wherein in the verification module, the method for acquiring the verification authentication account and the verification authentication password stored by the server comprises the following steps:
s31, acquiring the graphic code information to be generated, and performing hash operation on the graphic code information to be generated to obtain a hash generated code;
s32, the authentication account and the authentication password stored in the server are respectively operated with the Hash generated code to obtain the server authentication account and the server authentication password;
s33, storing the obtained server authentication account and server authentication password in a server database and updating the server database to obtain a verification authentication account and a verification authentication password;
and S34, after T time, the T is positive, the information of the graphic code to be generated is updated, and the step S31 is returned.
6. The login system of the method for realizing login through the graphical code by the BIM system according to claim 5, wherein in step S31, the method for converting the graphical code information to be generated into the login graphical code comprises the following steps:
s311, generating coding information corresponding to the graphic code information to be generated according to the graphic code information to be generated and the coding table information;
s312, acquiring a graphic code mapping table, wherein the graphic code mapping table comprises a graphic code and a graphic code sub-picture corresponding to the graphic code, the color of the graphic code sub-picture comprises one of gray, white and black or any combination, and the shape of the graphic code sub-picture comprises one of rectangle, square and diamond or any combination;
s313, obtaining a graphic code sub-graph corresponding to the graphic code through a graphic code mapping table;
and S314, generating a graphic code corresponding to the graphic code through the graphic code sub-graph.
7. The login system of the method for realizing login through the graphical code by the BIM system as claimed in claim 5, wherein in the hash login code acquisition module, the method for decoding the login graphical code comprises the following steps:
s11, splitting the login graphic code to generate sequentially arranged graphic code sub-graphs;
s12, acquiring the graphic code corresponding to the sequentially arranged graphic code sprites by using the sequentially arranged graphic code sprites and a stored graphic code mapping table, wherein the graphic code mapping table comprises the graphic code and the graphic code sprites corresponding to the graphic code, the colors of the graphic code sprites comprise one of gray, white and black or any combination, and the shapes of the graphic code sprites comprise one of rectangle, square and diamond or any combination;
and S13, generating the graphic code encoding information corresponding to the graphic code by using the graphic code encoding and the stored encoding table information.
8. The login system of the method for realizing login by the BIM system according to claim 5, wherein the method for obtaining the authentication account and the authentication password in the transmission module comprises:
the method for obtaining the verification authentication account number comprises the following steps:
ACCOUNT is used for verifying authentication ACCOUNT information, QHashFor hashed login code information, PAccountAuthenticating account information for the hash;
the method for obtaining the verification authentication password comprises the following steps:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910955742.2A CN110688644B (en) | 2019-10-09 | 2019-10-09 | Method and system for realizing login of BIM system through graphic code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910955742.2A CN110688644B (en) | 2019-10-09 | 2019-10-09 | Method and system for realizing login of BIM system through graphic code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110688644A CN110688644A (en) | 2020-01-14 |
CN110688644B true CN110688644B (en) | 2021-07-20 |
Family
ID=69111783
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910955742.2A Active CN110688644B (en) | 2019-10-09 | 2019-10-09 | Method and system for realizing login of BIM system through graphic code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110688644B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113312535B (en) * | 2021-05-28 | 2023-02-24 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management control cloud platform |
CN113312534B (en) * | 2021-05-28 | 2022-08-05 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management platform |
CN113259136B (en) * | 2021-07-07 | 2021-11-16 | 浙江宇视科技有限公司 | Multi-client cooperative authentication method, device, equipment and medium for feature recognition |
CN113783840B (en) * | 2021-08-06 | 2023-06-23 | 维沃移动通信(杭州)有限公司 | Account login method, device, equipment and storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1472627A (en) * | 2003-07-17 | 2004-02-04 | 王玉宏 | Binary grahpics code encoding method and character composed rule thereof |
WO2010031110A1 (en) * | 2008-09-16 | 2010-03-25 | Edith Cowan University | Data storage device and encoding/decoding methods |
WO2014027424A1 (en) * | 2012-08-17 | 2014-02-20 | A・Tコミュニケーションズ株式会社 | Two-dimensional code authentication device, two-dimensional code generation device, two-dimensional code authentication method and program |
CN103533392B (en) * | 2013-10-25 | 2016-08-17 | 乐视网信息技术(北京)股份有限公司 | A kind of account login method, electronic equipment and system |
CN106713225B (en) * | 2015-11-12 | 2021-02-02 | 国民技术股份有限公司 | Two-dimensional code device and system based on two-dimensional code authentication and operation method thereof |
CN109104290A (en) * | 2018-10-26 | 2018-12-28 | 南京航空航天大学 | It is a kind of without re-register and to support the dynamic password authentication method of offline authentication |
-
2019
- 2019-10-09 CN CN201910955742.2A patent/CN110688644B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110688644A (en) | 2020-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110688644B (en) | Method and system for realizing login of BIM system through graphic code | |
CN106056185B (en) | readable matrix code | |
CN105095936B (en) | A kind of two-dimensional image code and its generation method and system based on Information hiding | |
CN107610038B (en) | Watermark display method, device and system | |
CN109190736B (en) | Anti-counterfeiting two-dimensional code and generation method and generation application system thereof | |
CN106384328A (en) | Image digital copyright protecting method and image digital copyright protecting system based on frequency domain digital watermarking algorithm | |
CN107590394B (en) | A kind of image encryption method based on chaotic maps and bit recombination | |
CN110430336A (en) | Image concealing and the method for recovery, equipment and storage medium | |
CN111581605A (en) | Block chain-based multi-person participation BIM drawing copyright protection system and method | |
CN112968798B (en) | Virtual and real network environment automatic generation method suitable for electric power industrial control target range platform | |
CN110475038A (en) | A kind of character of combination minimum closure coding is drawn production and is hidden and restoration methods | |
CN106533680A (en) | Quantum neighbor query method for protecting position privacy | |
CN107704893A (en) | Generation and the method and Quick Response Code multiplex system of scanning Quick Response Code | |
CN103259621A (en) | Encoding method and device of colorized three-dimensional codes and application method and system of colorized three-dimensional codes | |
CN104616049A (en) | Colored anti-counterfeiting label and method for realizing product anti-counterfeiting | |
CN104394166A (en) | Certificate anti-fake authentication system and method for mobile terminal under cloud environment | |
CN109214486B (en) | Three-dimensional code, three-dimensional code generation method and device, and three-dimensional code identification method and device | |
US10997482B2 (en) | Two-dimensional cryptographic poly-chromatic poly-digital code | |
CN108959898B (en) | Graph unlocking password authentication method based on graph addition algorithm | |
CN110430335A (en) | A kind of method, equipment and the storage medium of information disguising and recovery | |
CN111147686A (en) | Video and image content tracking method and system based on steganographic information | |
CN110417551A (en) | A kind of the character picture production camouflage and restoration methods of the diffusion of combination error | |
JP4913493B2 (en) | Information leakage prevention method | |
CN106682122B (en) | Optimal path verification method based on data interaction | |
CN106803118A (en) | Anti-counterfeiting mark and recognition methods based on stealthy private mark technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220520 Address after: 400000 24-1, No. 58-7, shabin Road, Shapingba District, Chongqing Patentee after: Zhuzhijian Technology (Chongqing) Co.,Ltd. Address before: 400042 5-3, building 1, No.16 shijitian street, Yuzhong District, Chongqing Patentee before: Chongqing Zhuzhijian Information Technology Co.,Ltd. |
|
TR01 | Transfer of patent right |