CN111177661B - Copyright authentication method for building information model component and related product - Google Patents

Copyright authentication method for building information model component and related product Download PDF

Info

Publication number
CN111177661B
CN111177661B CN201911400562.4A CN201911400562A CN111177661B CN 111177661 B CN111177661 B CN 111177661B CN 201911400562 A CN201911400562 A CN 201911400562A CN 111177661 B CN111177661 B CN 111177661B
Authority
CN
China
Prior art keywords
authentication
copyright authentication
submitter
information
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911400562.4A
Other languages
Chinese (zh)
Other versions
CN111177661A (en
Inventor
赵伟玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wanyi Technology Co Ltd
Original Assignee
Wanyi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wanyi Technology Co Ltd filed Critical Wanyi Technology Co Ltd
Priority to CN201911400562.4A priority Critical patent/CN111177661B/en
Publication of CN111177661A publication Critical patent/CN111177661A/en
Application granted granted Critical
Publication of CN111177661B publication Critical patent/CN111177661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The embodiment of the application discloses a copyright authentication method for building information model components and a related product, wherein the method is applied to electronic equipment and comprises the following steps: the electronic equipment firstly obtains a copyright authentication request through an input device and sends the copyright authentication request to a processor, the copyright authentication request comprises BIM (building information model) component information, then BIM component copyright authentication is carried out on the BIM component information through the processor according to the copyright authentication request to obtain an authentication result, then copyright authentication information is generated through the processor according to the authentication result and sent to a display, and finally the copyright authentication information is output through the display. The method and the device for the copyright authentication of the building information model component improve the efficiency of the copyright authentication of the building information model component.

Description

Copyright authentication method for building information model component and related product
Technical Field
The application relates to the technical field of electronics, in particular to a copyright authentication method for a building information model component and a related product.
Background
With the development of the BIM technical field, the assembly type building usually adopts standardized prefabricated components or parts, the number, the types and the specifications of the BIM virtual components are continuously increased through the establishment of the BIM component library of the assembly type building, the standardized prefabricated component library is gradually constructed, the copyright ownership of the BIM components is particularly important, in the prior art, real products are often submitted to a BIM component authentication platform through users, the BIM component authentication platform forms BIM component information according to the real products submitted by the users and issues the information to the public to realize the copyright authentication of the BIM components, the process is complicated from submission to audit to issue, and the timeliness of the copyright authentication of the BIM components cannot be guaranteed.
Disclosure of Invention
The embodiment of the application provides a copyright authentication method for building information model components and a related product, so as to improve the efficiency of copyright authentication of the building information model components.
In a first aspect, embodiments of the present application provide a method for copyright authentication of building information model components, which is applied to an electronic device,
the method is applied to electronic equipment, the electronic equipment comprises a processor, an information input device and a display, the input device and the display are respectively connected with the processor, and the method comprises the following steps:
acquiring a copyright authentication request through the input device, and sending the copyright authentication request to the processor, wherein the copyright authentication request comprises Building Information Model (BIM) component information;
performing BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result;
generating copyright authentication information according to the authentication result through the processor, and sending the copyright authentication information to the display;
and outputting the copyright authentication information through the display.
In a second aspect, embodiments of the present application provide a copyright authentication apparatus for building information model components,
applied to electronic equipment, the copyright authentication device of the building information model component comprises a processing unit and a communication unit, wherein,
the processing unit is used for acquiring a copyright authentication request through the input device and sending the copyright authentication request to the processor through the communication unit, wherein the copyright authentication request comprises Building Information Model (BIM) component information; the processor is used for carrying out BIM component copyright authentication on the BIM component information according to the copyright authentication request to obtain an authentication result; the processor is used for generating copyright authentication information according to the authentication result and sending the copyright authentication information to the display; and for outputting the copyright authentication information through the display. In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program causes a computer to perform some or all of the steps described in any one of the methods in the first aspect of the embodiment of the present application.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the present application, an electronic device obtains a copyright authentication request through an input device, and sends the copyright authentication request to a processor, where the copyright authentication request includes building information model BIM component information, then performs BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result, then generates copyright authentication information according to the authentication result through the processor, and sends the copyright authentication information to a display, and finally outputs the copyright authentication information through the display. Therefore, the electronic equipment provided by the embodiment of the application can perform BIM component copyright authentication through the processor after acquiring the copyright authentication request through the input device to obtain the authentication result, generate copyright authentication information according to the authentication result and output the copyright authentication information, and the intelligence of the building information model component copyright authentication is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for authenticating copyright of building information model components according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of another electronic device provided in an embodiment of the present application;
fig. 4 is a block diagram of functional modules of a copyright authentication apparatus for building information model components according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device according to the embodiments of the present application may be an electronic device with communication capability, and the electronic device may include various handheld devices with wireless communication function, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), mobile Stations (MS), terminal equipment (terminal), and so on.
At present, a user often submits a real product to a BIM component copyright authentication platform, the BIM component authentication platform forms BIM component information according to the real product submitted by the user and issues the BIM component information to the public so as to realize BIM component copyright authentication, and the process is complex from submission to verification to issuance, and the timeliness of the BIM component copyright authentication cannot be guaranteed.
In view of the above problems, the present application provides a method for authenticating copyright of building information model component, and the following describes embodiments of the present application in detail with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure, as shown in fig. 1, an electronic device 10 includes a processor 101, an information input device 102, and a display 103, where the information input device 102 and the display 103 are respectively in communication connection with the processor 101, data interaction can be performed between the information input device 102 and the processor 101, and data interaction can be performed between the display 103 and the processor 101.
Referring to fig. 2, fig. 2 is a flowchart illustrating a copyright authentication method for a building information model component according to an embodiment of the present application, which is applied to the electronic device shown in fig. 1, and as shown in fig. 2, the copyright authentication method for a building information model component includes:
s201, the electronic equipment acquires a copyright authentication request through the input device and sends the copyright authentication request to the processor, wherein the copyright authentication request comprises Building Information Model (BIM) component information.
The input device comprises a keyboard, a mouse and the like, and the keyboard comprises a physical keyboard and a virtual keyboard.
The BIM component information comprises BIM component content, a BIM component copyright requester and a BIM component copyright request submitter, wherein the BIM component content can be in a form of characters or pictures, the BIM component copyright requester is a real author of the BIM component, and in an actual application scene, the submitter and the requester can be the same user or not, the user can be a natural person or an organization code, and the limitation is not made.
As can be seen, in this example, the electronic device is able to obtain the copyright authentication request through the input device.
S202, the electronic equipment conducts BIM component copyright authentication on the BIM component information through the processor according to the copyright authentication request to obtain an authentication result.
Wherein the authentication result includes three types: the first authentication is passed, the second authentication is not passed, the third authentication is undetermined, and when the authentication result is to be determined, the corresponding processing flow node can submit information and further review the information manually.
As can be seen, in this example, the electronic device can perform BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor, so as to obtain an authentication result.
S203, the electronic device generates copyright authentication information according to the authentication result through the processor and sends the copyright authentication information to the display.
The copyright authentication information may be presented in the form of process nodes, for example, the copyright authentication process is determined as the following process nodes: the first process node reflects the current submission state (including submission and submission), the second process node reflects the current initial review state, the initial review is a non-manual review process (the initial review is in progress, the initial review does not pass, the initial review passes), and the third process node reflects the current manual review result state (copyright authentication passes, copyright waiting authentication, and copyright authentication does not pass). For example, when the first process node is red, it indicates that the copyright authentication request is being submitted, when the first process node is blue, it indicates that the copyright authentication request is submitted, when the second process node is red, it indicates that the pre-examination is in progress, when the second process node is green, it indicates that the pre-examination is not passed, when the second process node is blue, it indicates that the pre-examination is passed, when the third process node is red, it indicates that the copyright is waiting for authentication, when the third process node is green, it indicates that the copyright authentication is not passed, when the third process node is blue, it indicates that the copyright is authenticated, and it should be noted that the association relationship between the state of the second process node and the state of the third process node is as follows: when the state of the second process node is not passed through the initial audit, the manual audit link is entered, namely the third process node passes through the copyright waiting authentication process, and when the state of the second process node is passed through the initial audit, the copyright authentication is passed, namely the third process node directly presents the copyright authentication passing state.
For example, if the copyright authentication result is not passed, the copyright authentication information may be "the copyright authentication is not passed", if the copyright authentication result is passed, the copyright authentication information may be "the copyright authentication is passed", if the copyright authentication result is undetermined, the copyright authentication information may be "waiting for manual review", and when the copyright authentication result is undetermined, the corresponding copyright authentication information may further include estimated authentication result determination time information, and if the estimated authentication result determination time is three days later and the current time is 11, month and 2 days of the current year, the estimated authentication result determination time information may be "an inquireable result after about three days", "an inquireable result after about 11, month and 5 days", and the like, without specific limitations.
As can be seen, in this example, the electronic device is capable of generating, by the processor, copyright authentication information according to the authentication result, and sending the copyright authentication information to the display.
S204, the electronic equipment outputs the copyright authentication information through the display.
For example, the electronic device outputting the copyright authentication information through the display may be the electronic device outputting a view corresponding to the process node through the display.
For example, the copyright authentication result is pending, and the display of the copyright authentication information on the current interface by the electronic device may be "waiting for manual review, and a result may be queried after about three days".
As can be seen, in this example, the electronic device is capable of outputting the copyright authentication information through the display.
It can be seen that, in the embodiment of the present application, an electronic device obtains a copyright authentication request through an input device, and sends the copyright authentication request to a processor, where the copyright authentication request includes building information model BIM component information, then performs BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result, then generates copyright authentication information according to the authentication result through the processor, and sends the copyright authentication information to a display, and finally outputs the copyright authentication information through the display. Therefore, the electronic equipment provided by the embodiment of the application can perform BIM component copyright authentication through the processor after acquiring the copyright authentication request through the input device to obtain the authentication result, generate copyright authentication information according to the authentication result and output the copyright authentication information, and the intelligence of the building information model component copyright authentication is improved.
In one possible example, the performing, by the processor, BIM component copyright authentication on the BIM component information according to the copyright authentication request to obtain an authentication result includes: determining, by the processor, a submitter of the copyright authentication request according to the BIM component information; judging whether the submitter meets a first exemption condition; if the submitter meets the first exemption condition, confirming that the copyright of the BIM component passes the authentication; if the submitter does not meet the first exemption condition, determining a requester of the copyright authentication request according to the BIM component information; judging whether the applicant meets a second exemption condition or not; if the applicant meets a second exemption condition, confirming that the copyright of the BIM component passes the authentication; and if the applicant does not satisfy the second non-audit condition, confirming that the BIM component information authentication is pending, and performing audit authentication through a third party user, wherein the third party user comprises an audit identifier.
Here, the obtaining of the authentication result through the processor according to the copyright authentication request and the BIM component information is that a mechanism of condition audit and manual audit of the electronic device is adopted, when the audit condition of the electronic device is met, the copyright authentication is passed, and when the audit condition of the electronic device is not met, the authentication process is realized by combining the manual audit.
Wherein the first exempt condition comprises: the submitter of the copyright authentication request is an audit-free user, or the submitter is not an audit-free user, but the credit score of the submitter exceeds a first credit score value. The second exempt condition comprises: the credit score of the requester of the copyright authentication request exceeds a certain credit score value.
The authentication of the exempted user can also be realized through a credit point accumulation mechanism, any user can obtain the credit point through a certain action, for example, a copyright authentication request is automatically made, for example, a copyright authentication request is helped to be made by other people, and also the application of the exempted qualification can be made, wherein, the authentication of the exempted user can be realized through a certain auditing mechanism, any user can submit the application of the exempted qualification, the management user audits the application materials provided for submitting the exempted qualification, whether the exempted qualification is granted or not is determined by combining the modes of offline visiting, actual investigation and the like, and after the application of the exempted qualification is passed, the corresponding credit point is given, namely, the application of the exempted qualification can be passed and also can be restored into the credit point.
Further, the credit integration is obtained by the electronic device executing the following steps: updating credit points of related users according to the authentication result, wherein the related users comprise the submitter, the requester and the third-party user; or acquiring evaluation information aiming at the copyright of the authenticated BIM component; and updating the credit points of the related users according to the evaluation information.
Wherein, the updating the credit score of the relevant user according to the authentication result may be: and when the copyright authentication is passed, credit points of the submitter and the requester are increased, wherein the credit points of the submitter and the requester can be different.
Wherein the evaluation information includes the evaluation of the public, such as the obtaining of the evaluation information of the copyright of the authenticated BIM component; the specific implementation of updating the credit score of the relevant user according to the evaluation information is as follows: after the BIM component copyright authentication is passed, the BIM component information is issued to the public through a network, after the BIM component information is issued, a public evaluation channel is provided, after the BIM component copyright authentication is issued, a person reports plagiarism, after the plagiarism action exists, when a submitter and a requester are the same user, the credit score of the user is correspondingly deducted, when the submitter and the requester are not the same user, the credit score of the requester is correspondingly deducted, further, whether the submitter knows the plagiarism action or not is checked, and if the submitter knows, the credit score of the submitter is correspondingly deducted.
The evaluation information comprises audit evaluation of a professional review group, for example, the evaluation information aiming at the copyright of the authenticated BIM component is obtained; the specific implementation of updating the credit score of the relevant user according to the evaluation information is as follows: after the BIM component copyright authentication is passed, the BIM component information is issued to the public through a network, after the BIM component information is issued, a professional review group evaluation channel is provided, the professional review group conducts spot check on the BIM component information passing the copyright authentication, if the obvious defect of the BIM component is found out, the credit score of a submitter and an applicant is the same user, the credit score of the user is correspondingly deducted, if the submitter and the applicant are not the same user, the credit score of the submitter is correspondingly deducted, and if the BIM component information has a manual review process, the credit score of the manual reviewer is correspondingly deducted.
As can be seen, in this example, the electronic device can accumulate credit points of the user through a credit point system, and implement the authentication process through the credit points.
Furthermore, the authentication of the exempt from audit user can pass through a certain audit mechanism, and when the authentication of the exempt from audit user is hooked with the credit point mechanism, the credit point mechanism can be as follows: through one-time copyright authentication, the submitter adds 1 point, the applicant adds 1 point, if an auditor exists, the auditor adds 1 point, if first malicious copyright authentication (not conforming to the authentication content requirement) exists, for the submitter, 5 points are subtracted every time, the auditor deducts 5 points under the condition that the auditor exists, if second malicious copyright authentication (conforming to the authentication content requirement and having malicious copy) exists, the applicant deducts 5 points, the submitter knows to help to apply for deduction, the submitter does not know to help apply for deduction, and if the user applies for authentication of the exemption user qualification, the credit score is directly added with 1000.
Optionally, the determining whether the submitter meets the first exemption condition includes: judging whether the submitter is a non-trial user; if the submitter is an audit-free user, determining that the submitter meets the first audit-free condition; if the submitter is not a trial-free user, acquiring credit points of the submitter; judging whether the credit score of the submitter is larger than a first preset credit score or not; if so, determining that the submitter meets the first trial-free condition; if not, determining that the submitter does not meet the first exemption condition.
The first preset credit may be determined according to a credit mechanism specifically adopted, and possibly may be 500, and when the credit score of the submitter is 501, it is determined that the submitter satisfies the first trial-free condition, and if the credit score of the submitter is 500, it is determined that the submitter does not satisfy the first trial-free condition. Therefore, the electronic equipment can audit the exempted condition of the submitter.
Further, the method for the electronic device to be checked includes the following steps: when the credit point of the current user is detected to exceed a second preset credit point, the current user is identified as an exempt user, and the second preset credit point is larger than the first preset credit point.
When the first credit score is 500, the second preset credit score may be 1000, and thus, the electronic device can perform the exemption user authentication according to the credit score of the user.
Optionally, the determining whether the applicant meets the second exemption condition includes: judging whether the requester is the same as the submitter or not; if the requester is the same as the submitter, determining that the requester does not meet the second exemption condition; if the requester is different from the submitter, acquiring a credit score of the requester; judging whether the credit score of the applicant is larger than a second preset credit score or not; if so, determining that the applicant meets the second exemption condition; if not, determining that the applicant does not meet the second exemption condition.
The second exempt condition may be that the requester and the submitter are different, and the credit score of the requester exceeds a certain credit score, where the second preset credit score may be any score greater than 500.
For example, the second predetermined credit integral is 600, and when the submitter does not satisfy the first exemption condition, if the requester and the submitter are the same, it is determined that the requester does not satisfy the second exemption condition; if the requester is different from the submitter, acquiring credit points of the requester; and if the credit integral of the applicant is 601, determining that the applicant meets the second exemption condition, and if the credit integral of the applicant is 602, determining that the applicant does not meet the second exemption condition. Therefore, the electronic equipment can determine whether the applicant meets the corresponding non-audit condition according to the credit integral of the applicant under the condition that the applicant does not meet the non-audit condition.
In one possible example, the electronic device includes a communication device, the communication device is in communication connection with the processor, and the performing of the audit certification by the third party user includes: transmitting the BIM component information to at least one of the third party users through the communication device; obtaining an authentication result of at least one third-party user through the communication device and sending the authentication result to the processor; determining, by the processor, that the BIM component copyright authentication is passed according to an authentication result of the at least one third party user; if the authentication result of at least one third-party user is that the authentication is passed, confirming that the copyright of the BIM component is authenticated; and if the authentication result of at least one third-party user is that the authentication is not passed, confirming that the copyright authentication of the BIM component is not passed.
If the authentication result of at least one of the third-party users is that the user passes the authentication, that is, the user passes the authentication, and if the authentication result of at least one of the third-party users is that the user passes the authentication, that is, the user passes more than half of the authentication, that is, the user passes the authentication.
For example, the BIM component information is sent to 3 third-party users through the communication device, the authentication results of the 3 third-party users are obtained through the communication device, the authentication results are sent to the processor, the copyright authentication of the BIM component is determined to be passed through the processor according to the authentication results of the 3 third-party users, if 2 or 3 of the authentication results of the 3 users are authenticated, the copyright authentication of the BIM component is determined to be passed, and if only 1 or no person is authenticated, the copyright authentication of the BIM component is determined not to be passed.
As can be seen, in this example, the electronic device can authenticate the copy right of the BIM component in conjunction with a manual audit.
In one possible example, after confirming that the BIM component copyright authentication is passed, the method further includes: and packaging and writing the BIM component information into a block chain, and issuing the block chain to a network.
And the verification is stored through the block chain, so that the stability of the BIM component information is ensured.
Therefore, in this example, the electronic device can store the BIM component information through the block chain, and stability of the BIM component information is improved.
Referring to fig. 3 in accordance with the embodiment shown in fig. 2, fig. 3 is a schematic structural diagram of another electronic device provided in the embodiment of the present application, and as shown in fig. 3, an electronic device 300 includes an application processor 310, a memory 320, a communication interface 330, and one or more programs 321, where the one or more programs 321 are stored in the memory 320 and configured to be executed by the application processor 310, and the one or more programs 321 include instructions for performing the following steps;
acquiring a copyright authentication request through the input device, and sending the copyright authentication request to the processor, wherein the copyright authentication request comprises Building Information Model (BIM) component information;
performing BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result;
generating copyright authentication information according to the authentication result through the processor, and sending the copyright authentication information to the display;
and outputting the copyright authentication information through the display.
It can be seen that, in the embodiment of the present application, an electronic device obtains a copyright authentication request through an input device, and sends the copyright authentication request to a processor, where the copyright authentication request includes building information model BIM component information, then performs BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result, then generates copyright authentication information according to the authentication result through the processor, and sends the copyright authentication information to a display, and finally outputs the copyright authentication information through the display. Therefore, the electronic equipment provided by the embodiment of the application can perform BIM component copyright authentication through the processor after acquiring the copyright authentication request through the input device to obtain the authentication result, generate copyright authentication information according to the authentication result and output the copyright authentication information, and the intelligence of the building information model component copyright authentication is improved.
In one possible example, in terms of obtaining an authentication result by the processor performing BIM component copyright authentication on the BIM component information according to the copyright authentication request, the instructions in the one or more programs 321 are specifically configured to perform the following operations: determining, by the processor, a submitter of the copyright authentication request according to the BIM component information; judging whether the submitter meets a first exemption condition; if the submitter meets the first exemption condition, confirming that the copyright of the BIM component passes the authentication; if the submitter does not meet the first exemption condition, determining a requester of the copyright authentication request according to the BIM component information; judging whether the applicant meets a second exemption condition or not; if the applicant meets a second exemption condition, confirming that the copyright of the BIM component passes the authentication; and if the applicant does not meet a second non-audit condition, confirming that the BIM component information authentication is pending, and carrying out audit authentication through a third-party user, wherein the third-party user comprises an audit identifier.
In one possible example, in the determining whether the submitter satisfies the first exemption condition, the instructions in the one or more programs 321 are specifically configured to: judging whether the submitter is a non-trial user; if the submitter is an audit-free user, determining that the submitter meets the first audit-free condition; if the submitter is not a trial-free user, acquiring credit points of the submitter; judging whether the credit score of the submitter is larger than a first preset credit score or not; if so, determining that the submitter meets the first exemption condition; if not, determining that the submitter does not meet the first exemption condition.
In one possible example, the method includes the step of the trial-free user performing the following steps for the electronic device: when the credit point of the current user is detected to exceed a second preset credit point, the current user is identified as an exempt user, and the second preset credit point is larger than the first preset credit point.
In one possible example, in the aspect of determining whether the applicant meets the second exempt condition, the instructions in the one or more programs 321 are specifically configured to: judging whether the requester is the same as the submitter or not; if the requester is the same as the submitter, determining that the requester does not meet the second exemption condition; if the requester is different from the submitter, acquiring credit points of the requester; judging whether the credit score of the applicant is larger than a second preset credit score or not; if so, determining that the applicant meets the second exemption condition; if not, determining that the applicant does not satisfy the second trial-free condition.
In one possible example, the electronic device includes a communication device, and in communication with the processor, the one or more programs 321 include instructions specifically configured to, in connection with performing audit authentication by a third party user: transmitting the BIM component information to at least one of the third party users through the communication device; obtaining an authentication result of at least one third-party user through the communication device and sending the authentication result to the processor; determining, by the processor, that the BIM component copyright authentication is passed according to an authentication result of the at least one third party user; if the authentication result of at least one third-party user is that the authentication is passed, confirming that the copyright of the BIM component is authenticated; and if the authentication result of at least one third-party user is that the authentication is not passed, confirming that the copyright authentication of the BIM component is not passed.
In one possible example, the credit integration is obtained by the electronic device performing the following steps: updating credit points of related users according to the authentication result, wherein the related users comprise the submitter, the requester and the third-party user; or acquiring evaluation information aiming at the copyright of the authenticated BIM component; and updating the credit points of the related users according to the evaluation information.
In one possible example, the one or more programs 321 further include instructions for: and after confirming that the BIM component copyright authentication passes, packaging and writing the BIM component information into a block chain, and issuing the block chain to a network.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and software modules for performing the respective functions in order to realize the functions. Those of skill in the art will readily appreciate that the present application is capable of being implemented in hardware or a combination of hardware and computer software for carrying out the various example modules and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional modules according to the method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Referring to fig. 4, in accordance with the embodiment shown in fig. 2, fig. 4 is a block diagram of functional modules of a copyright authentication apparatus for building information model components according to an embodiment of the present application. The building information model member copyright authentication apparatus 400 is applied to an electronic device, and includes a processing unit 401 and a communication unit 402, wherein,
the processing unit 401 is configured to obtain a copyright authentication request through the input device, and send the copyright authentication request to the processor through the communication unit 402, where the copyright authentication request includes Building Information Model (BIM) component information; the processor is used for carrying out BIM component copyright authentication on the BIM component information according to the copyright authentication request to obtain an authentication result; the processor is used for generating copyright authentication information according to the authentication result and sending the copyright authentication information to the display; and for outputting the copyright authentication information through the display.
The building information model member copyright authentication apparatus 400 may further include a storage unit 403 for storing program codes and data of an electronic device. The processing unit 401 may be a processor, the communication unit 402 may be a touch display screen or a transceiver, and the storage unit 403 may be a memory.
It can be seen that, in the embodiment of the present application, an electronic device obtains a copyright authentication request through an input device, and sends the copyright authentication request to a processor, where the copyright authentication request includes building information model BIM component information, then performs BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result, then generates copyright authentication information according to the authentication result through the processor, and sends the copyright authentication information to a display, and finally outputs the copyright authentication information through the display. Therefore, the electronic equipment provided by the embodiment of the application can perform BIM component copyright authentication through the processor after acquiring the copyright authentication request through the input device to obtain the authentication result, generate copyright authentication information according to the authentication result and output the copyright authentication information, and the intelligence of the building information model component copyright authentication is improved.
In one possible example, in terms of performing, by the processor, BIM component copyright authentication on the BIM component information according to the copyright authentication request to obtain an authentication result, the processing unit 401 is specifically configured to: determining, by the processor, a submitter of the copyright authentication request according to the BIM component information; judging whether the submitter meets a first exemption condition; if the submitter meets the first exemption condition, confirming that the copyright of the BIM component passes the authentication; if the submitter does not meet the first exemption condition, determining a requester of the copyright authentication request according to the BIM component information; judging whether the applicant meets a second exemption condition or not; if the applicant meets a second exemption condition, confirming that the copyright of the BIM component passes the authentication; and if the applicant does not meet a second non-audit condition, confirming that the BIM component information authentication is pending, and carrying out audit authentication through a third-party user, wherein the third-party user comprises an audit identifier.
In one possible example, in terms of determining whether the submitter satisfies the first exempt condition, the processing unit 401 is specifically configured to: judging whether the submitter is a non-trial user; if the submitter is a non-review user, determining that the submitter meets the first non-review condition; if the submitter is not a trial-free user, acquiring credit points of the submitter; judging whether the credit score of the submitter is larger than a first preset credit score or not; if so, determining that the submitter meets the first exemption condition; if not, determining that the submitter does not meet the first exemption condition.
In one possible example, the method includes the step of the trial-free user performing the following steps for the electronic device: when the fact that the credit score of the current user exceeds a second preset credit score is detected, the current user is identified as an audit-free user, and the second preset credit score is larger than the first preset credit score.
In one possible example, in terms of the determination whether the applicant satisfies the second exemption condition, the processing unit 401 is specifically configured to: judging whether the requester is the same as the submitter or not; if the requester is the same as the submitter, determining that the requester does not meet the second trial-free condition; if the requester is different from the submitter, acquiring credit points of the requester; judging whether the credit score of the applicant is larger than a second preset credit score or not; if so, determining that the applicant meets the second exemption condition; if not, determining that the applicant does not meet the second exemption condition.
In one possible example, the electronic device includes a communication device, and in terms of communication connection between the communication device and the processor, and audit authentication performed by a third-party user, the processing unit 401 is specifically configured to: transmitting the BIM component information to at least one of the third party users through the communication device; obtaining an authentication result of at least one third-party user through the communication device and sending the authentication result to the processor; determining, by the processor, that the BIM component copyright authentication is passed according to an authentication result of the at least one third party user; if the authentication result of at least one third-party user is that the authentication is passed, confirming that the copyright of the BIM component is authenticated; and if the authentication result of at least one third-party user is that the authentication is not passed, confirming that the copyright authentication of the BIM component is not passed.
In one possible example, the credit integration is obtained by the electronic device performing the following steps: updating credit points of related users according to the authentication result, wherein the related users comprise the submitter, the requester and the third-party user; or acquiring evaluation information aiming at the copyright of the authenticated BIM component; and updating the credit points of the related users according to the evaluation information.
In one possible example, the processing unit 401 is further configured to: and after confirming that the BIM component copyright authentication passes, packaging and writing the BIM component information into a block chain, and issuing the block chain to a network.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the above-described modules is merely a logical division, and other divisions may be realized in practice, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some interfaces, and may be in an electrical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated modules, if implemented in the form of software functional modules and sold or used as separate products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash memory disks, read-only memories (ROMs), random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, the specific embodiments and the application range may have the variation, and in the above description, the content of the present specification should not be construed as a limitation to the present application.

Claims (8)

1. A copyright authentication method for building information model components is applied to electronic equipment, the electronic equipment comprises a processor, an information input device and a display, the information input device and the display are respectively connected with the processor, and the method comprises the following steps:
acquiring a copyright authentication request through the information input device, and sending the copyright authentication request to the processor, wherein the copyright authentication request comprises Building Information Model (BIM) component information;
performing BIM component copyright authentication on the BIM component information according to the copyright authentication request through the processor to obtain an authentication result;
generating copyright authentication information according to the authentication result through the processor, and sending the copyright authentication information to the display;
outputting the copyright authentication information through the display;
the copyright authentication information is presented in a process node mode, the copyright authentication process comprises a second process node and a third process node, the second process node reflects the current initial audit state, the initial audit is a non-manual audit process, and the third process node reflects the current manual audit result state;
the association of the state of the second process node with the state of the third process node is as follows:
when the state of the second process node is that the initial audit is not passed, entering a manual audit link, and enabling the third process node to present a state that the copyright waits for authentication; when the state of the second process node is the state of passing the initial review, the third process node presents a state of passing the copyright authentication;
the BIM component copyright authentication is carried out on the BIM component information through the processor according to the copyright authentication request, and an authentication result is obtained, wherein the authentication result comprises the following steps:
determining, by the processor, a submitter of the copyright authentication request according to the BIM component information;
judging whether the submitter is a non-trial user;
if the submitter is not a trial-free user, acquiring credit points of the submitter;
judging whether the credit score of the submitter is larger than a first preset credit score or not;
if the credit score of the submitter is larger than a first preset credit score, confirming that the copyright of the BIM component passes the authentication;
if the credit score of the submitter is less than or equal to the first preset credit score, determining the requester of the copyright authentication request according to the BIM component information;
judging whether the requester is the same as the submitter or not;
and if the requester is the same as the submitter, confirming that the copyright authentication of the BIM component is pending, and performing audit authentication through a third-party user, wherein the third-party user comprises an audit identifier.
2. The method of claim 1, wherein after determining whether the requestor and the submitter are the same, the method further comprises:
if the requester is different from the submitter, acquiring credit points of the requester;
judging whether the credit score of the applicant is larger than a second preset credit score or not;
and if so, confirming that the copyright authentication of the BIM component is passed.
3. The method of claim 2, wherein after determining whether the credit score of the requestor is greater than a second predetermined credit score, the method further comprises:
and if the credit score of the applicant is less than or equal to the second preset credit score, confirming that the copyright authentication of the BIM component is pending, and performing audit authentication through a third-party user, wherein the third-party user comprises an audit identifier.
4. The method of claim 1, wherein after determining whether the submitter is a trial-free user, the method further comprises:
and if the submitter is the trial-free user, confirming that the copyright authentication of the BIM component passes.
5. The method of claim 1, wherein the electronic device includes a communication device communicatively coupled to the processor, and wherein performing audit verification by a third party user includes:
transmitting the BIM component information to at least one of the third party users through the communication device;
obtaining an authentication result of at least one third-party user through the communication device and sending the authentication result to the processor;
determining, by the processor, that the BIM component copyright authentication is passed according to an authentication result of the at least one third party user;
if the authentication result of at least one third-party user is that the authentication is passed, confirming that the copyright of the BIM component is authenticated;
and if the authentication result of at least one third-party user is that the authentication is not passed, confirming that the copyright authentication of the BIM component is not passed.
6. The method according to claim 1, wherein after confirming that the BIM component copyright authentication is passed, the method further comprises:
and packaging and writing the BIM component information into a block chain, and issuing the block chain to a network.
7. A copyright authentication device of a building information model component is applied to electronic equipment and comprises a processing unit and a communication unit, wherein,
the processing unit is used for acquiring a copyright authentication request through an information input device and sending the copyright authentication request to the processor through the communication unit, wherein the copyright authentication request comprises Building Information Model (BIM) component information; the processor is used for carrying out BIM component copyright authentication on the BIM component information according to the copyright authentication request to obtain an authentication result; the processor is used for generating copyright authentication information according to the authentication result and sending the copyright authentication information to the display; and for outputting the copyright authentication information via the display;
the copyright authentication information is presented in a process node mode, the copyright authentication process comprises a second process node and a third process node, the second process node reflects the current initial audit state, the initial audit is a non-manual audit process, and the third process node reflects the current manual audit result state;
the association of the state of the second process node with the state of the third process node is as follows:
when the state of the second process node is that the initial audit is not passed, entering a manual audit link, and enabling the third process node to present a state that the copyright waits for authentication; when the state of the second process node is the state of passing the initial review, the third process node presents a state of passing the copyright authentication;
in the aspect that the processor performs BIM component copyright authentication on the BIM component information according to the copyright authentication request to obtain an authentication result, the processing unit is specifically configured to:
determining, by the processor, a submitter of the copyright authentication request according to the BIM component information;
judging whether the submitter is a non-trial user;
if the submitter is not a trial-free user, acquiring credit points of the submitter;
judging whether the credit score of the submitter is larger than a first preset credit score or not;
if the credit score of the submitter is larger than a first preset credit score, confirming that the copyright of the BIM component passes the authentication;
if the credit score of the submitter is less than or equal to the first preset credit score, determining the requester of the copyright authentication request according to the BIM component information;
judging whether the requester is the same as the submitter or not;
and if the requester is the same as the submitter, confirming that the copyright authentication of the BIM component is pending, and performing audit authentication through a third-party user, wherein the third-party user comprises an audit identifier.
8. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-6.
CN201911400562.4A 2019-12-27 2019-12-27 Copyright authentication method for building information model component and related product Active CN111177661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911400562.4A CN111177661B (en) 2019-12-27 2019-12-27 Copyright authentication method for building information model component and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911400562.4A CN111177661B (en) 2019-12-27 2019-12-27 Copyright authentication method for building information model component and related product

Publications (2)

Publication Number Publication Date
CN111177661A CN111177661A (en) 2020-05-19
CN111177661B true CN111177661B (en) 2023-04-18

Family

ID=70655938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911400562.4A Active CN111177661B (en) 2019-12-27 2019-12-27 Copyright authentication method for building information model component and related product

Country Status (1)

Country Link
CN (1) CN111177661B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115827816B (en) * 2023-02-21 2023-05-02 山东铁路投资控股集团有限公司 BIM component data verification and right confirmation method and device based on blockchain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103209174A (en) * 2013-03-12 2013-07-17 华为技术有限公司 Data protection method, device and system
CN108471400A (en) * 2018-02-07 2018-08-31 阿里巴巴集团控股有限公司 Method for authenticating, apparatus and system
CN109684786A (en) * 2018-11-05 2019-04-26 深圳变设龙信息科技有限公司 A kind of copyright registration method, apparatus and terminal device based on block chain
CN110222481A (en) * 2019-06-14 2019-09-10 兰州交通大学 A kind of BIM model copyright protection spatial domain digital watermark method
CN110489946A (en) * 2019-08-15 2019-11-22 腾讯科技(深圳)有限公司 Copyright authentication method, apparatus, equipment and storage medium based on block chain
CN110598475A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based work attribute information acquisition method and device and computer equipment
CN110598376A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Copyright authentication method, device and equipment based on block chain and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145768B (en) * 2016-03-01 2021-02-12 华为技术有限公司 Copyright management method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103209174A (en) * 2013-03-12 2013-07-17 华为技术有限公司 Data protection method, device and system
CN108471400A (en) * 2018-02-07 2018-08-31 阿里巴巴集团控股有限公司 Method for authenticating, apparatus and system
CN109684786A (en) * 2018-11-05 2019-04-26 深圳变设龙信息科技有限公司 A kind of copyright registration method, apparatus and terminal device based on block chain
CN110222481A (en) * 2019-06-14 2019-09-10 兰州交通大学 A kind of BIM model copyright protection spatial domain digital watermark method
CN110489946A (en) * 2019-08-15 2019-11-22 腾讯科技(深圳)有限公司 Copyright authentication method, apparatus, equipment and storage medium based on block chain
CN110598475A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based work attribute information acquisition method and device and computer equipment
CN110598376A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Copyright authentication method, device and equipment based on block chain and storage medium

Also Published As

Publication number Publication date
CN111177661A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN104954353B (en) The method of calibration and device of APK file bag
CN107395614A (en) Single-point logging method and system
US20210243037A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US9280669B2 (en) Systems, methods and computer readable media for calculating a security index of an application hosted in a cloud environment
KR20190014124A (en) Two factor authentication
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN114139135B (en) Equipment login management method, device and storage medium
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN111177661B (en) Copyright authentication method for building information model component and related product
CN104836777A (en) Identity verification method and system
CN111476640A (en) Authentication method, system, storage medium and big data authentication platform
CN110929230A (en) Work management method, device, equipment and storage medium
CN114444131A (en) Document auditing method and computer storage medium
CN110674218A (en) Company business license tracing method and device related to block chain
CN110555761A (en) Method and apparatus for conducting financial mortgage on blockchain
CN112925711A (en) Local joint debugging test method and related device
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN112328686A (en) Block chain link point sharing method based on digital certificate and related products thereof
JP2007128310A (en) Service provision server and service provision system
CN110022327B (en) Short message authentication test method and device
CN110381114B (en) Interface request parameter processing method and device, terminal equipment and medium
CN112243007A (en) Single-user login method, equipment and storage medium
CN110570192A (en) Method and device for physical mortgage on block chain for borrowing digital currency
CN108259487A (en) Information interacting method and computer-readable medium
CN111209540B (en) Information verification method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant