CN112084516A - Method and equipment for safely protecting CAD drawing information - Google Patents
Method and equipment for safely protecting CAD drawing information Download PDFInfo
- Publication number
- CN112084516A CN112084516A CN202010960971.6A CN202010960971A CN112084516A CN 112084516 A CN112084516 A CN 112084516A CN 202010960971 A CN202010960971 A CN 202010960971A CN 112084516 A CN112084516 A CN 112084516A
- Authority
- CN
- China
- Prior art keywords
- user
- electronic seal
- entity
- encrypting
- receiving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000005516 engineering process Methods 0.000 claims description 21
- 238000012986 modification Methods 0.000 claims description 15
- 230000004048 modification Effects 0.000 claims description 15
- 238000007639 printing Methods 0.000 claims description 13
- 239000003086 colorant Substances 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Automation & Control Theory (AREA)
- Document Processing Apparatus (AREA)
Abstract
The application relates to a method for safely protecting CAD drawing information, wherein a drawing uploaded by a user and an input operation instruction are received, and the drawing is encrypted in various forms according to the operation instruction, so that the safety, reliability and compatibility of the CAD drawing are jointly ensured. The method specifically comprises the following steps: converting a general entity in a drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing, and all professional entities cannot be displayed if CAD software does not load a special interpreter due to the characteristics of the custom entity. And receiving the operation authority edited by the user, and encrypting the drawing based on various reactors according to the operation authority to prevent the user from performing operation which is not allowed by the authority on the drawing. In the application, a plurality of layers of anti-counterfeiting certificates are endowed to the drawing through the electronic seal, the physical background watermark and the digital certificate.
Description
Technical Field
The application relates to the technical field of drawing encryption, in particular to a method and equipment for safely protecting CAD drawing information.
Background
The traditional supervision means of present CAD drawing all has its limitation, and traditional CAD drawing is encrypted and is used CAD own encryption function more, and this function only need input the drawing password in the CAD setting, realizes the drawing encryption function, and this functional limitation is big, and simple CAD encrypts from taking the password, and is too simple, explains easily. And the encryption mode of the CAD itself has limitations, for example, the low version of the CAD cannot open the high version of the drawing, and the compatibility problem exists, so that the traditional encryption is not easy to use in a certain sense. The traditional tamper-proof protection measures of the CAD drawing are relatively weak, and the safety, integrity and confidentiality of the drawing are difficult to ensure in the design and circulation processes of the CAD drawing.
Disclosure of Invention
In order to overcome the problems in the related art at least to a certain extent, the application provides a method and equipment for safely protecting CAD drawing information.
The scheme of the application is as follows:
according to a first aspect of the embodiments of the present application, a method for protecting CAD drawing information safely is provided, including:
receiving a drawing uploaded by a user and an input operation instruction, and encrypting the drawing according to the operation instruction, wherein the method specifically comprises the following steps:
converting a general entity in the drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing;
receiving an operation authority edited by a user, and encrypting the drawing based on various reactors according to the operation authority;
receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal;
based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing;
generating a digital certificate of the drawing based on an encryption lock, a network database and a two-dimensional code technology;
and returning the encrypted drawing to the user.
Preferably, in an implementation manner of the present application, the encrypting the drawing based on multiple reactors according to the operation authority specifically includes:
intercepting the operation of a user before the operation of the user on a drawing or an entity in the drawing is effective;
judging whether the entity in the drawing or the drawing allows the operation of the user or not according to the operation authority;
if not, invalidating the operation of the user;
and if the operation is allowed, executing the operation of the user.
Preferably, in an implementable manner herein,
the plurality of reactors includes at least: command reactor, database reactor, entity reactor;
the operation targeted by the operation authority at least comprises the following operations: rotating and translating scaling, modifying line types and proportions, copying in drawings, deleting, setting layers, copying between drawings, printing, modifying colors, decomposing, editing pinch points, capturing, stretching, whether the drawings are allowed to be newly added or not, and whether only professional entities are printed or not.
Preferably, in an implementation manner of the present application, the receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal specifically includes:
receiving an electronic seal uploaded by a user, wherein the electronic seal comprises a user-defined style and content;
and generating a custom entity of the electronic seal on the drawing according to the style and the content of the electronic seal.
Preferably, in an implementation manner of the present application, the receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal further includes:
destroying the electronic seal when the user edits the drawing;
generating an anti-counterfeiting character string at the periphery of the electronic seal, and encrypting by adopting a high-strength encryption algorithm; the anti-counterfeiting character string is used for verifying the authenticity of the drawing and whether the drawing is matched with the anti-counterfeiting character string;
generating a two-dimensional code in the middle of the electronic seal; the two-dimensional code is used for recording signers, drawing engineering indexes, user-defined information and feature codes of drawings, and is also used for verifying the authenticity of the drawings;
according to an operation instruction of a user, setting the display state of the electronic seal as follows: always displaying, or only printing and displaying, or not displaying the real content;
and receiving a password and a hardware encryption lock which are received by the user, and performing signature control on the electronic seal.
Preferably, in an implementation manner of the present application, the appending of the physical background watermark to the drawing based on multiple anti-counterfeiting technologies specifically includes:
and generating a self-defined entity of the physical background watermark on the drawing based on a two-dimension code independent anti-counterfeiting technology and an encryption point anti-counterfeiting technology.
Preferably, in an implementation manner of the present application, the appending of the physical background watermark to the drawing based on the multiple anti-counterfeiting technologies further includes:
when the user carries out preset operation on the drawing, the modification trace of the drawing is self-checked, and if the modification trace appears on the drawing, the physical background watermark is destroyed.
Preferably, in an implementable manner herein,
the preset operation at least comprises the following steps: printing and displaying;
the self-checking of the modification trace of the drawing specifically includes: and checking the size of the electronic seal and the size of the two-dimensional code in the physical background watermark.
Preferably, in an implementation manner of the present application, the method further includes:
and if receiving a plurality of drawings uploaded by a user and an input operation instruction, encrypting the plurality of drawings in batches according to the operation instruction.
According to a second aspect of the embodiments of the present application, there is provided an apparatus for protecting CAD drawing information, including:
a processor and a memory;
the processor and the memory are connected through a communication bus:
the processor is used for calling and executing the program stored in the memory;
the memory is used for storing a program at least used for executing the method for safety protection of CAD drawing information.
The technical scheme provided by the application can comprise the following beneficial effects: according to the method and the device, the drawing uploaded by a user and the input operation instruction are received, and the drawing is encrypted in various forms according to the operation instruction, so that the safety, reliability and compatibility of the CAD drawing are jointly ensured. The method specifically comprises the following steps: converting a general entity in a drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing, and all professional entities cannot be displayed if CAD software does not load a special interpreter due to the characteristics of the custom entity. And receiving the operation authority edited by the user, and encrypting the drawing based on various reactors according to the operation authority to prevent the user from performing operation which is not allowed by the authority on the drawing. Receiving an electronic seal uploaded by a user, and encrypting a drawing according to the electronic seal; based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing; generating a digital certificate of a drawing based on an encryption lock, a network database and a two-dimensional code technology; and giving a multilayer anti-counterfeiting certificate to the drawing through the electronic seal, the physical background watermark and the digital certificate, and finally returning the encrypted drawing to the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic flow chart diagram illustrating a method for protecting CAD drawing information safely according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus for protecting CAD drawing information in a safety manner according to another embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Fig. 1 is a schematic flow chart of a method for protecting CAD drawing information in an embodiment of the present application, and referring to fig. 1, the method for protecting CAD drawing information includes:
s11: receiving a drawing uploaded by a user and an input operation instruction, and encrypting the drawing according to the operation instruction, wherein the method specifically comprises the following steps:
s111: converting a general entity in a drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing;
basic objects such as straight lines, circles, arcs, polylines, etc. are provided in the CAD software, and when selected, the type and related parameters of these objects can be seen by opening the property box CTRL +1, and the graphics can be edited by adjusting the parameters. In order to expand the application of the CAD industry and improve the operation efficiency, the CAD provides a secondary development interface, and developers can develop tools according to the requirements of specific industries, and complex graphs formed by combining basic graphs can be created or special editing operations can be carried out by using the tools. The developer can define some parameterized objects similar to the basic objects, and such objects are custom objects.
In this embodiment, a general entity in the drawing is converted into a custom entity, and due to the characteristics of the custom entity, if the CAD software does not load a special interpreter, all the custom entities cannot be displayed. The encryption method is used for encrypting the drawing, and the drawing is not influenced to be used in CAD software of different versions.
S112: receiving operation authority edited by a user, and encrypting the drawing based on various reactors according to the operation authority;
when various events occur in the CAD software, such as executing a CAD command, modifying a system variable, saving and exiting a graphic edit, or switching a current working layout space, etc., the event notifier object automatically passes this event to the event receiver object, and upon receiving the message, the reactor object responds to the event, and may perform a query or edit operation on the object that triggered the event, the event receiver object being referred to as a reactor.
According to the operation authority, based on a plurality of reactors, the drawing is encrypted, and the method specifically comprises the following steps:
intercepting the operation of a user before the operation of the user on the drawing or the entity in the drawing is effective;
judging whether the drawing or the entity in the drawing allows the operation of the user or not according to the operation authority;
if not, invalidating the operation of the user;
if yes, executing the operation of the user.
Preferably, the plurality of reactors comprises at least: command reactor, database reactor, entity reactor;
the operation targeted by the operation authority at least comprises the following operations: rotating and translating scaling, modifying line types and proportions, copying in drawings, deleting, setting layers, copying between drawings, printing, modifying colors, decomposing, editing pinch points, capturing, stretching, whether the drawings are allowed to be newly added or not, and whether only professional entities are printed or not.
Each operation authority corresponds to one reactor.
For example, the user encrypts the drawing by commanding the reactor, the user is not allowed to modify the line type and the proportion of the drawing, when the user modifies the line type and the proportion of the drawing, the operation is intercepted before the operation is effective, and the operation of modifying the line type and the proportion of the drawing by the user is invalidated because the operation authority set by the user is not allowed.
By utilizing various reactors (a series of command reactors, database reactors, entity reactors and the like), whether the drawing or the entity allows the current operation can be judged, the entity and some operations of the drawing can be controlled, and the accuracy and the safety of the encryption operation are ensured. The encrypted entity can only be operated according to the authority set by the user, and illegal operation is effectively avoided.
S113: receiving an electronic seal uploaded by a user, and encrypting a drawing according to the electronic seal;
encrypting a drawing according to an electronic seal specifically comprises:
receiving an electronic seal uploaded by a user, wherein the electronic seal comprises a user-defined style and content; the user can directly sign the drawing with the DWG format in the CAD software, and the user can design the style and the content of the electronic seal very flexibly.
Generating a custom entity of the electronic seal on a drawing according to the style and the content of the electronic seal; the electronic seal is a special self-defined entity, and has higher safety and anti-counterfeiting effect except all the characteristics of the self-defined entity, as follows:
1) and when the user edits the drawing, the electronic seal is destroyed.
2) Generating an anti-counterfeiting character string at the periphery of the electronic seal, and encrypting by adopting a high-strength encryption algorithm; the anti-counterfeiting character string is used for verifying the authenticity of the drawing and whether the drawing is matched with the anti-counterfeiting character string;
3) generating a two-dimensional code in the middle of the electronic seal; the two-dimensional code is used for recording signers, drawing engineering indexes, user-defined information and feature codes of drawings, and is also used for verifying the authenticity of the drawings; the two-dimensional code can be used for rapidly identifying and judging the authenticity of the drawing through special equipment.
4) According to an operation instruction of a user, setting the display state of the electronic seal as follows: always displaying, or only printing and displaying, or not displaying the real content;
because the electronic seal is a self-defined entity, the user can control the display state of the electronic seal to be set as follows: the actual content is always displayed, or only printed, or not displayed.
5) And receiving a password and a hardware encryption lock which are received by the user, and performing signature control on the electronic seal.
In the embodiment, multiple combined signature verification can be provided, signature control is performed by setting a password and a hardware encryption lock by a user, illegal signature is avoided, and meanwhile, a signer and a date are recorded, so that effective tracing can be performed.
S114: based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing;
the method specifically comprises the following steps:
and generating a self-defined entity of the physical background watermark on the drawing based on the two-dimension code independent anti-counterfeiting technology and the encryption point anti-counterfeiting technology.
In the embodiment, multiple means (at least including a two-dimension code independent anti-counterfeiting technology and an encryption point anti-counterfeiting technology) are adopted, a physical background watermark is added in a drawing through flexible setting, and control is performed through a user-defined entity, so that the security is very high.
Furthermore, when the user presets the drawing, the modification trace of the drawing is self-checked, and if the drawing has the modification trace, the physical background watermark is destroyed.
The preset operation at least comprises the following steps: printing and displaying;
the preset operations can be multiple, such as rotating and translating scaling, line type modification and proportion modification, in-drawing copying, deleting, picture layer setting, inter-drawing copying, printing display, printing, color modification, decomposition, pinch point editing, capturing, stretching, newly adding and the like on the drawing, wherein the printing display is an important ring, and when a user performs the preset operations such as printing display on the drawing, whether modification marks appear in the size of an electronic seal in the drawing is self-verified, and whether modification marks appear in the size of a two-dimensional code in the physical background watermark is verified. And if the drawing shows a modification trace, destroying the physical background watermark.
The physical background watermark is used as a background self-defined entity, the drawing content is not influenced, meanwhile, the self-checking function is achieved, the drawing is guaranteed not to be illegally modified, the uniqueness of the drawing is guaranteed, and the safety is very high.
S115: generating a digital certificate of a drawing based on an encryption lock, a network database and a two-dimensional code technology;
the digital certificate is mainly used for verifying identity, specifically is used for encrypting a drawing, is mainly used for rejecting illegal signature, and can be used for tracing a signature source, and the digital certificate is used for identifying and verifying the identity.
S12: and returning the encrypted drawing to the user.
The method for safely protecting the CAD drawing information in some embodiments further comprises the following steps:
and if receiving the multiple drawings uploaded by the user and the input operation instructions, encrypting the multiple drawings in batches according to the operation instructions.
All encryption and anti-counterfeiting technologies in the above embodiments can process the current drawings and can also select drawings in batches for processing, so that the encryption processing speed of the drawings is increased, and the efficiency is improved.
An apparatus for protecting CAD drawing information, referring to fig. 2, includes:
a processor 21 and a memory 22;
the processor 21 is connected to the memory 22 by a communication bus:
the processor 21 is configured to call and execute a program stored in the memory 22;
a memory 22 for storing a program for performing at least the method for securing CAD drawing information in any of the above embodiments.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Claims (10)
1. A method for safely protecting CAD drawing information is characterized by comprising the following steps:
receiving a drawing uploaded by a user and an input operation instruction, and encrypting the drawing according to the operation instruction, wherein the method specifically comprises the following steps:
converting a general entity in the drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing;
receiving an operation authority edited by a user, and encrypting the drawing based on various reactors according to the operation authority;
receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal;
based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing;
generating a digital certificate of the drawing based on an encryption lock, a network database and a two-dimensional code technology;
and returning the encrypted drawing to the user.
2. The method according to claim 1, wherein the encrypting the drawing based on a plurality of reactors according to the operation authority includes:
intercepting the operation of a user before the operation of the user on a drawing or an entity in the drawing is effective;
judging whether the entity in the drawing or the drawing allows the operation of the user or not according to the operation authority;
if not, invalidating the operation of the user;
and if the operation is allowed, executing the operation of the user.
3. The method of claim 2,
the plurality of reactors includes at least: command reactor, database reactor, entity reactor;
the operation targeted by the operation authority at least comprises the following operations: rotating and translating scaling, modifying line types and proportions, copying in drawings, deleting, setting layers, copying between drawings, printing, modifying colors, decomposing, editing pinch points, capturing, stretching, whether the drawings are allowed to be newly added or not, and whether only professional entities are printed or not.
4. The method according to claim 1, wherein the receiving an electronic seal uploaded by a user and the encrypting the drawing according to the electronic seal specifically include:
receiving an electronic seal uploaded by a user, wherein the electronic seal comprises a user-defined style and content;
and generating a custom entity of the electronic seal on the drawing according to the style and the content of the electronic seal.
5. The method according to claim 4, wherein the receiving an electronic seal uploaded by a user and the encrypting the drawing according to the electronic seal further comprises:
destroying the electronic seal when the user edits the drawing;
generating an anti-counterfeiting character string at the periphery of the electronic seal, and encrypting by adopting a high-strength encryption algorithm; the anti-counterfeiting character string is used for verifying the authenticity of the drawing and whether the drawing is matched with the anti-counterfeiting character string;
generating a two-dimensional code in the middle of the electronic seal; the two-dimensional code is used for recording signers, drawing engineering indexes, user-defined information and feature codes of drawings, and is also used for verifying the authenticity of the drawings;
according to an operation instruction of a user, setting the display state of the electronic seal as follows: always displaying, or only printing and displaying, or not displaying the real content;
and receiving a password and a hardware encryption lock which are received by the user, and performing signature control on the electronic seal.
6. The method according to claim 5, wherein the adding of the physical background watermark to the drawing based on the multiple anti-counterfeiting technologies specifically comprises:
and generating a self-defined entity of the physical background watermark on the drawing based on a two-dimension code independent anti-counterfeiting technology and an encryption point anti-counterfeiting technology.
7. The method according to claim 6, wherein the adding of the physical background watermark to the drawing based on the multiple anti-counterfeiting technologies further comprises:
when the user carries out preset operation on the drawing, the modification trace of the drawing is self-checked, and if the modification trace appears on the drawing, the physical background watermark is destroyed.
8. The method of claim 7,
the preset operation at least comprises the following steps: printing and displaying;
the self-checking of the modification trace of the drawing specifically includes: and checking the size of the electronic seal and the size of the two-dimensional code in the physical background watermark.
9. The method of claim 1, further comprising:
and if receiving a plurality of drawings uploaded by a user and an input operation instruction, encrypting the plurality of drawings in batches according to the operation instruction.
10. An apparatus for protecting CAD drawing information, comprising:
a processor and a memory;
the processor and the memory are connected through a communication bus:
the processor is used for calling and executing the program stored in the memory;
the memory for storing a program for performing at least the method of securing CAD drawing information according to any of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010960971.6A CN112084516A (en) | 2020-09-14 | 2020-09-14 | Method and equipment for safely protecting CAD drawing information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010960971.6A CN112084516A (en) | 2020-09-14 | 2020-09-14 | Method and equipment for safely protecting CAD drawing information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112084516A true CN112084516A (en) | 2020-12-15 |
Family
ID=73737795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010960971.6A Pending CN112084516A (en) | 2020-09-14 | 2020-09-14 | Method and equipment for safely protecting CAD drawing information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112084516A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115063828A (en) * | 2022-07-14 | 2022-09-16 | 烟台建联勘察设计审查服务中心 | Method and system for automatically identifying and verifying validity of electronic signature for construction drawing |
CN117668878A (en) * | 2022-10-13 | 2024-03-08 | 苏州浩辰软件股份有限公司 | Local encryption method, system, storage medium and program product for CAD file |
WO2024078023A1 (en) * | 2022-10-13 | 2024-04-18 | 苏州浩辰软件股份有限公司 | Local encryption method and system for cad file, and computer program product |
CN117955738A (en) * | 2024-03-26 | 2024-04-30 | 北京鸿鹄云图科技股份有限公司 | Cross-platform multi-terminal drawing synchronization method and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102117476A (en) * | 2011-04-15 | 2011-07-06 | 哈尔滨工业大学 | Signature watermark system used for CAD (Computer-Aided Design) documents |
CN102867135A (en) * | 2012-08-01 | 2013-01-09 | 广东南方数码科技有限公司 | Right control system and control method for computer-aided design (CAD) graph entity |
CN103377329A (en) * | 2012-04-19 | 2013-10-30 | 常熟南师大发展研究院有限公司 | Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities |
US20140281545A1 (en) * | 2013-03-12 | 2014-09-18 | Commvault Systems, Inc. | Multi-layer embedded encryption |
CN106599321A (en) * | 2016-12-30 | 2017-04-26 | 上海绿建信息科技有限公司 | DWG file annotation and signature generation and analysis plug-in, and use method thereof |
CN107784207A (en) * | 2017-10-30 | 2018-03-09 | 平安科技(深圳)有限公司 | Display methods, device, equipment and the storage medium at financial APP interfaces |
CN110109997A (en) * | 2019-05-16 | 2019-08-09 | 洛阳众智软件科技股份有限公司 | Data processing storage method and equipment |
CN110163555A (en) * | 2019-04-11 | 2019-08-23 | 厦门亿力吉奥信息科技有限公司 | Collaboration drawing management method, storage medium |
-
2020
- 2020-09-14 CN CN202010960971.6A patent/CN112084516A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102117476A (en) * | 2011-04-15 | 2011-07-06 | 哈尔滨工业大学 | Signature watermark system used for CAD (Computer-Aided Design) documents |
CN103377329A (en) * | 2012-04-19 | 2013-10-30 | 常熟南师大发展研究院有限公司 | Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities |
CN102867135A (en) * | 2012-08-01 | 2013-01-09 | 广东南方数码科技有限公司 | Right control system and control method for computer-aided design (CAD) graph entity |
US20140281545A1 (en) * | 2013-03-12 | 2014-09-18 | Commvault Systems, Inc. | Multi-layer embedded encryption |
CN106599321A (en) * | 2016-12-30 | 2017-04-26 | 上海绿建信息科技有限公司 | DWG file annotation and signature generation and analysis plug-in, and use method thereof |
CN107784207A (en) * | 2017-10-30 | 2018-03-09 | 平安科技(深圳)有限公司 | Display methods, device, equipment and the storage medium at financial APP interfaces |
CN110163555A (en) * | 2019-04-11 | 2019-08-23 | 厦门亿力吉奥信息科技有限公司 | Collaboration drawing management method, storage medium |
CN110109997A (en) * | 2019-05-16 | 2019-08-09 | 洛阳众智软件科技股份有限公司 | Data processing storage method and equipment |
Non-Patent Citations (1)
Title |
---|
陈玥秀: "工程图纸信息安全管理技术研究", 《中国优秀硕士学位论文全文数据库 工程科技II辑》, no. 2, pages 3 - 5 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115063828A (en) * | 2022-07-14 | 2022-09-16 | 烟台建联勘察设计审查服务中心 | Method and system for automatically identifying and verifying validity of electronic signature for construction drawing |
CN117668878A (en) * | 2022-10-13 | 2024-03-08 | 苏州浩辰软件股份有限公司 | Local encryption method, system, storage medium and program product for CAD file |
WO2024078023A1 (en) * | 2022-10-13 | 2024-04-18 | 苏州浩辰软件股份有限公司 | Local encryption method and system for cad file, and computer program product |
CN117955738A (en) * | 2024-03-26 | 2024-04-30 | 北京鸿鹄云图科技股份有限公司 | Cross-platform multi-terminal drawing synchronization method and system |
CN117955738B (en) * | 2024-03-26 | 2024-05-24 | 北京鸿鹄云图科技股份有限公司 | Cross-platform multi-terminal drawing synchronization method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112084516A (en) | Method and equipment for safely protecting CAD drawing information | |
CA2437645C (en) | Electronic document management system with the use of signature technique capable of masking | |
Koushanfar et al. | Behavioral synthesis techniques for intellectual property protection | |
US7346780B2 (en) | Integrity ordainment and ascertainment of computer-executable instructions | |
EP2634959A2 (en) | Method and Apparatus for Incremental Code Signing | |
CN101305333A (en) | Tamper-resistant trusted virtual machine | |
CN105512565A (en) | Method and server for preventing electronic document leakage | |
CN107784207B (en) | Display method, device and equipment of financial APP interface and storage medium | |
WO2022078366A1 (en) | Application protection method and apparatus, device and medium | |
Kim et al. | Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications | |
Mainka et al. | Shadow Attacks: Hiding and Replacing Content in Signed PDFs. | |
CN115114598A (en) | Watermark generation method, and method and device for file tracing by using watermark | |
CN105740661A (en) | Method and device for protecting application program | |
CN117592108A (en) | Interface data desensitization processing method and device | |
CN107391970B (en) | Function access control method and device in Flash application program | |
Lee et al. | Classification and analysis of security techniques for the user terminal area in the internet banking service | |
KR101497067B1 (en) | Electric document transfer method and apparatus based digital forensic | |
CN111385083B (en) | Key protection method and key protection system | |
JP6395986B2 (en) | Key generation source identification device, key generation source identification method, and key generation source identification program | |
CN109150813A (en) | A kind of verification method and device of equipment | |
Ertaul et al. | JHide-A tool kit for code obfuscation. | |
CN106650329A (en) | Individual authorization method of data export equipment | |
CN117009931A (en) | Watermarking and watermarking application methods, devices, equipment and storage medium | |
CN114629643A (en) | Key processing method, device and medium | |
CN109361667B (en) | Method and device for preventing space proof information from being tampered |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201215 |
|
RJ01 | Rejection of invention patent application after publication |