CN112084516A - Method and equipment for safely protecting CAD drawing information - Google Patents

Method and equipment for safely protecting CAD drawing information Download PDF

Info

Publication number
CN112084516A
CN112084516A CN202010960971.6A CN202010960971A CN112084516A CN 112084516 A CN112084516 A CN 112084516A CN 202010960971 A CN202010960971 A CN 202010960971A CN 112084516 A CN112084516 A CN 112084516A
Authority
CN
China
Prior art keywords
user
electronic seal
entity
encrypting
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010960971.6A
Other languages
Chinese (zh)
Inventor
丁伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Luoyang Zhongzhi Software Technology Co ltd
Original Assignee
Luoyang Zhongzhi Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luoyang Zhongzhi Software Technology Co ltd filed Critical Luoyang Zhongzhi Software Technology Co ltd
Priority to CN202010960971.6A priority Critical patent/CN112084516A/en
Publication of CN112084516A publication Critical patent/CN112084516A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The application relates to a method for safely protecting CAD drawing information, wherein a drawing uploaded by a user and an input operation instruction are received, and the drawing is encrypted in various forms according to the operation instruction, so that the safety, reliability and compatibility of the CAD drawing are jointly ensured. The method specifically comprises the following steps: converting a general entity in a drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing, and all professional entities cannot be displayed if CAD software does not load a special interpreter due to the characteristics of the custom entity. And receiving the operation authority edited by the user, and encrypting the drawing based on various reactors according to the operation authority to prevent the user from performing operation which is not allowed by the authority on the drawing. In the application, a plurality of layers of anti-counterfeiting certificates are endowed to the drawing through the electronic seal, the physical background watermark and the digital certificate.

Description

Method and equipment for safely protecting CAD drawing information
Technical Field
The application relates to the technical field of drawing encryption, in particular to a method and equipment for safely protecting CAD drawing information.
Background
The traditional supervision means of present CAD drawing all has its limitation, and traditional CAD drawing is encrypted and is used CAD own encryption function more, and this function only need input the drawing password in the CAD setting, realizes the drawing encryption function, and this functional limitation is big, and simple CAD encrypts from taking the password, and is too simple, explains easily. And the encryption mode of the CAD itself has limitations, for example, the low version of the CAD cannot open the high version of the drawing, and the compatibility problem exists, so that the traditional encryption is not easy to use in a certain sense. The traditional tamper-proof protection measures of the CAD drawing are relatively weak, and the safety, integrity and confidentiality of the drawing are difficult to ensure in the design and circulation processes of the CAD drawing.
Disclosure of Invention
In order to overcome the problems in the related art at least to a certain extent, the application provides a method and equipment for safely protecting CAD drawing information.
The scheme of the application is as follows:
according to a first aspect of the embodiments of the present application, a method for protecting CAD drawing information safely is provided, including:
receiving a drawing uploaded by a user and an input operation instruction, and encrypting the drawing according to the operation instruction, wherein the method specifically comprises the following steps:
converting a general entity in the drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing;
receiving an operation authority edited by a user, and encrypting the drawing based on various reactors according to the operation authority;
receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal;
based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing;
generating a digital certificate of the drawing based on an encryption lock, a network database and a two-dimensional code technology;
and returning the encrypted drawing to the user.
Preferably, in an implementation manner of the present application, the encrypting the drawing based on multiple reactors according to the operation authority specifically includes:
intercepting the operation of a user before the operation of the user on a drawing or an entity in the drawing is effective;
judging whether the entity in the drawing or the drawing allows the operation of the user or not according to the operation authority;
if not, invalidating the operation of the user;
and if the operation is allowed, executing the operation of the user.
Preferably, in an implementable manner herein,
the plurality of reactors includes at least: command reactor, database reactor, entity reactor;
the operation targeted by the operation authority at least comprises the following operations: rotating and translating scaling, modifying line types and proportions, copying in drawings, deleting, setting layers, copying between drawings, printing, modifying colors, decomposing, editing pinch points, capturing, stretching, whether the drawings are allowed to be newly added or not, and whether only professional entities are printed or not.
Preferably, in an implementation manner of the present application, the receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal specifically includes:
receiving an electronic seal uploaded by a user, wherein the electronic seal comprises a user-defined style and content;
and generating a custom entity of the electronic seal on the drawing according to the style and the content of the electronic seal.
Preferably, in an implementation manner of the present application, the receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal further includes:
destroying the electronic seal when the user edits the drawing;
generating an anti-counterfeiting character string at the periphery of the electronic seal, and encrypting by adopting a high-strength encryption algorithm; the anti-counterfeiting character string is used for verifying the authenticity of the drawing and whether the drawing is matched with the anti-counterfeiting character string;
generating a two-dimensional code in the middle of the electronic seal; the two-dimensional code is used for recording signers, drawing engineering indexes, user-defined information and feature codes of drawings, and is also used for verifying the authenticity of the drawings;
according to an operation instruction of a user, setting the display state of the electronic seal as follows: always displaying, or only printing and displaying, or not displaying the real content;
and receiving a password and a hardware encryption lock which are received by the user, and performing signature control on the electronic seal.
Preferably, in an implementation manner of the present application, the appending of the physical background watermark to the drawing based on multiple anti-counterfeiting technologies specifically includes:
and generating a self-defined entity of the physical background watermark on the drawing based on a two-dimension code independent anti-counterfeiting technology and an encryption point anti-counterfeiting technology.
Preferably, in an implementation manner of the present application, the appending of the physical background watermark to the drawing based on the multiple anti-counterfeiting technologies further includes:
when the user carries out preset operation on the drawing, the modification trace of the drawing is self-checked, and if the modification trace appears on the drawing, the physical background watermark is destroyed.
Preferably, in an implementable manner herein,
the preset operation at least comprises the following steps: printing and displaying;
the self-checking of the modification trace of the drawing specifically includes: and checking the size of the electronic seal and the size of the two-dimensional code in the physical background watermark.
Preferably, in an implementation manner of the present application, the method further includes:
and if receiving a plurality of drawings uploaded by a user and an input operation instruction, encrypting the plurality of drawings in batches according to the operation instruction.
According to a second aspect of the embodiments of the present application, there is provided an apparatus for protecting CAD drawing information, including:
a processor and a memory;
the processor and the memory are connected through a communication bus:
the processor is used for calling and executing the program stored in the memory;
the memory is used for storing a program at least used for executing the method for safety protection of CAD drawing information.
The technical scheme provided by the application can comprise the following beneficial effects: according to the method and the device, the drawing uploaded by a user and the input operation instruction are received, and the drawing is encrypted in various forms according to the operation instruction, so that the safety, reliability and compatibility of the CAD drawing are jointly ensured. The method specifically comprises the following steps: converting a general entity in a drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing, and all professional entities cannot be displayed if CAD software does not load a special interpreter due to the characteristics of the custom entity. And receiving the operation authority edited by the user, and encrypting the drawing based on various reactors according to the operation authority to prevent the user from performing operation which is not allowed by the authority on the drawing. Receiving an electronic seal uploaded by a user, and encrypting a drawing according to the electronic seal; based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing; generating a digital certificate of a drawing based on an encryption lock, a network database and a two-dimensional code technology; and giving a multilayer anti-counterfeiting certificate to the drawing through the electronic seal, the physical background watermark and the digital certificate, and finally returning the encrypted drawing to the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic flow chart diagram illustrating a method for protecting CAD drawing information safely according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus for protecting CAD drawing information in a safety manner according to another embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Fig. 1 is a schematic flow chart of a method for protecting CAD drawing information in an embodiment of the present application, and referring to fig. 1, the method for protecting CAD drawing information includes:
s11: receiving a drawing uploaded by a user and an input operation instruction, and encrypting the drawing according to the operation instruction, wherein the method specifically comprises the following steps:
s111: converting a general entity in a drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing;
basic objects such as straight lines, circles, arcs, polylines, etc. are provided in the CAD software, and when selected, the type and related parameters of these objects can be seen by opening the property box CTRL +1, and the graphics can be edited by adjusting the parameters. In order to expand the application of the CAD industry and improve the operation efficiency, the CAD provides a secondary development interface, and developers can develop tools according to the requirements of specific industries, and complex graphs formed by combining basic graphs can be created or special editing operations can be carried out by using the tools. The developer can define some parameterized objects similar to the basic objects, and such objects are custom objects.
In this embodiment, a general entity in the drawing is converted into a custom entity, and due to the characteristics of the custom entity, if the CAD software does not load a special interpreter, all the custom entities cannot be displayed. The encryption method is used for encrypting the drawing, and the drawing is not influenced to be used in CAD software of different versions.
S112: receiving operation authority edited by a user, and encrypting the drawing based on various reactors according to the operation authority;
when various events occur in the CAD software, such as executing a CAD command, modifying a system variable, saving and exiting a graphic edit, or switching a current working layout space, etc., the event notifier object automatically passes this event to the event receiver object, and upon receiving the message, the reactor object responds to the event, and may perform a query or edit operation on the object that triggered the event, the event receiver object being referred to as a reactor.
According to the operation authority, based on a plurality of reactors, the drawing is encrypted, and the method specifically comprises the following steps:
intercepting the operation of a user before the operation of the user on the drawing or the entity in the drawing is effective;
judging whether the drawing or the entity in the drawing allows the operation of the user or not according to the operation authority;
if not, invalidating the operation of the user;
if yes, executing the operation of the user.
Preferably, the plurality of reactors comprises at least: command reactor, database reactor, entity reactor;
the operation targeted by the operation authority at least comprises the following operations: rotating and translating scaling, modifying line types and proportions, copying in drawings, deleting, setting layers, copying between drawings, printing, modifying colors, decomposing, editing pinch points, capturing, stretching, whether the drawings are allowed to be newly added or not, and whether only professional entities are printed or not.
Each operation authority corresponds to one reactor.
For example, the user encrypts the drawing by commanding the reactor, the user is not allowed to modify the line type and the proportion of the drawing, when the user modifies the line type and the proportion of the drawing, the operation is intercepted before the operation is effective, and the operation of modifying the line type and the proportion of the drawing by the user is invalidated because the operation authority set by the user is not allowed.
By utilizing various reactors (a series of command reactors, database reactors, entity reactors and the like), whether the drawing or the entity allows the current operation can be judged, the entity and some operations of the drawing can be controlled, and the accuracy and the safety of the encryption operation are ensured. The encrypted entity can only be operated according to the authority set by the user, and illegal operation is effectively avoided.
S113: receiving an electronic seal uploaded by a user, and encrypting a drawing according to the electronic seal;
encrypting a drawing according to an electronic seal specifically comprises:
receiving an electronic seal uploaded by a user, wherein the electronic seal comprises a user-defined style and content; the user can directly sign the drawing with the DWG format in the CAD software, and the user can design the style and the content of the electronic seal very flexibly.
Generating a custom entity of the electronic seal on a drawing according to the style and the content of the electronic seal; the electronic seal is a special self-defined entity, and has higher safety and anti-counterfeiting effect except all the characteristics of the self-defined entity, as follows:
1) and when the user edits the drawing, the electronic seal is destroyed.
2) Generating an anti-counterfeiting character string at the periphery of the electronic seal, and encrypting by adopting a high-strength encryption algorithm; the anti-counterfeiting character string is used for verifying the authenticity of the drawing and whether the drawing is matched with the anti-counterfeiting character string;
3) generating a two-dimensional code in the middle of the electronic seal; the two-dimensional code is used for recording signers, drawing engineering indexes, user-defined information and feature codes of drawings, and is also used for verifying the authenticity of the drawings; the two-dimensional code can be used for rapidly identifying and judging the authenticity of the drawing through special equipment.
4) According to an operation instruction of a user, setting the display state of the electronic seal as follows: always displaying, or only printing and displaying, or not displaying the real content;
because the electronic seal is a self-defined entity, the user can control the display state of the electronic seal to be set as follows: the actual content is always displayed, or only printed, or not displayed.
5) And receiving a password and a hardware encryption lock which are received by the user, and performing signature control on the electronic seal.
In the embodiment, multiple combined signature verification can be provided, signature control is performed by setting a password and a hardware encryption lock by a user, illegal signature is avoided, and meanwhile, a signer and a date are recorded, so that effective tracing can be performed.
S114: based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing;
the method specifically comprises the following steps:
and generating a self-defined entity of the physical background watermark on the drawing based on the two-dimension code independent anti-counterfeiting technology and the encryption point anti-counterfeiting technology.
In the embodiment, multiple means (at least including a two-dimension code independent anti-counterfeiting technology and an encryption point anti-counterfeiting technology) are adopted, a physical background watermark is added in a drawing through flexible setting, and control is performed through a user-defined entity, so that the security is very high.
Furthermore, when the user presets the drawing, the modification trace of the drawing is self-checked, and if the drawing has the modification trace, the physical background watermark is destroyed.
The preset operation at least comprises the following steps: printing and displaying;
the preset operations can be multiple, such as rotating and translating scaling, line type modification and proportion modification, in-drawing copying, deleting, picture layer setting, inter-drawing copying, printing display, printing, color modification, decomposition, pinch point editing, capturing, stretching, newly adding and the like on the drawing, wherein the printing display is an important ring, and when a user performs the preset operations such as printing display on the drawing, whether modification marks appear in the size of an electronic seal in the drawing is self-verified, and whether modification marks appear in the size of a two-dimensional code in the physical background watermark is verified. And if the drawing shows a modification trace, destroying the physical background watermark.
The physical background watermark is used as a background self-defined entity, the drawing content is not influenced, meanwhile, the self-checking function is achieved, the drawing is guaranteed not to be illegally modified, the uniqueness of the drawing is guaranteed, and the safety is very high.
S115: generating a digital certificate of a drawing based on an encryption lock, a network database and a two-dimensional code technology;
the digital certificate is mainly used for verifying identity, specifically is used for encrypting a drawing, is mainly used for rejecting illegal signature, and can be used for tracing a signature source, and the digital certificate is used for identifying and verifying the identity.
S12: and returning the encrypted drawing to the user.
The method for safely protecting the CAD drawing information in some embodiments further comprises the following steps:
and if receiving the multiple drawings uploaded by the user and the input operation instructions, encrypting the multiple drawings in batches according to the operation instructions.
All encryption and anti-counterfeiting technologies in the above embodiments can process the current drawings and can also select drawings in batches for processing, so that the encryption processing speed of the drawings is increased, and the efficiency is improved.
An apparatus for protecting CAD drawing information, referring to fig. 2, includes:
a processor 21 and a memory 22;
the processor 21 is connected to the memory 22 by a communication bus:
the processor 21 is configured to call and execute a program stored in the memory 22;
a memory 22 for storing a program for performing at least the method for securing CAD drawing information in any of the above embodiments.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A method for safely protecting CAD drawing information is characterized by comprising the following steps:
receiving a drawing uploaded by a user and an input operation instruction, and encrypting the drawing according to the operation instruction, wherein the method specifically comprises the following steps:
converting a general entity in the drawing into a custom entity, and returning an interpreter corresponding to the custom entity to a user, wherein the interpreter is used for analyzing the custom entity to display the custom entity on the drawing;
receiving an operation authority edited by a user, and encrypting the drawing based on various reactors according to the operation authority;
receiving an electronic seal uploaded by a user, and encrypting the drawing according to the electronic seal;
based on multiple anti-counterfeiting technologies, adding a physical background watermark to the drawing;
generating a digital certificate of the drawing based on an encryption lock, a network database and a two-dimensional code technology;
and returning the encrypted drawing to the user.
2. The method according to claim 1, wherein the encrypting the drawing based on a plurality of reactors according to the operation authority includes:
intercepting the operation of a user before the operation of the user on a drawing or an entity in the drawing is effective;
judging whether the entity in the drawing or the drawing allows the operation of the user or not according to the operation authority;
if not, invalidating the operation of the user;
and if the operation is allowed, executing the operation of the user.
3. The method of claim 2,
the plurality of reactors includes at least: command reactor, database reactor, entity reactor;
the operation targeted by the operation authority at least comprises the following operations: rotating and translating scaling, modifying line types and proportions, copying in drawings, deleting, setting layers, copying between drawings, printing, modifying colors, decomposing, editing pinch points, capturing, stretching, whether the drawings are allowed to be newly added or not, and whether only professional entities are printed or not.
4. The method according to claim 1, wherein the receiving an electronic seal uploaded by a user and the encrypting the drawing according to the electronic seal specifically include:
receiving an electronic seal uploaded by a user, wherein the electronic seal comprises a user-defined style and content;
and generating a custom entity of the electronic seal on the drawing according to the style and the content of the electronic seal.
5. The method according to claim 4, wherein the receiving an electronic seal uploaded by a user and the encrypting the drawing according to the electronic seal further comprises:
destroying the electronic seal when the user edits the drawing;
generating an anti-counterfeiting character string at the periphery of the electronic seal, and encrypting by adopting a high-strength encryption algorithm; the anti-counterfeiting character string is used for verifying the authenticity of the drawing and whether the drawing is matched with the anti-counterfeiting character string;
generating a two-dimensional code in the middle of the electronic seal; the two-dimensional code is used for recording signers, drawing engineering indexes, user-defined information and feature codes of drawings, and is also used for verifying the authenticity of the drawings;
according to an operation instruction of a user, setting the display state of the electronic seal as follows: always displaying, or only printing and displaying, or not displaying the real content;
and receiving a password and a hardware encryption lock which are received by the user, and performing signature control on the electronic seal.
6. The method according to claim 5, wherein the adding of the physical background watermark to the drawing based on the multiple anti-counterfeiting technologies specifically comprises:
and generating a self-defined entity of the physical background watermark on the drawing based on a two-dimension code independent anti-counterfeiting technology and an encryption point anti-counterfeiting technology.
7. The method according to claim 6, wherein the adding of the physical background watermark to the drawing based on the multiple anti-counterfeiting technologies further comprises:
when the user carries out preset operation on the drawing, the modification trace of the drawing is self-checked, and if the modification trace appears on the drawing, the physical background watermark is destroyed.
8. The method of claim 7,
the preset operation at least comprises the following steps: printing and displaying;
the self-checking of the modification trace of the drawing specifically includes: and checking the size of the electronic seal and the size of the two-dimensional code in the physical background watermark.
9. The method of claim 1, further comprising:
and if receiving a plurality of drawings uploaded by a user and an input operation instruction, encrypting the plurality of drawings in batches according to the operation instruction.
10. An apparatus for protecting CAD drawing information, comprising:
a processor and a memory;
the processor and the memory are connected through a communication bus:
the processor is used for calling and executing the program stored in the memory;
the memory for storing a program for performing at least the method of securing CAD drawing information according to any of claims 1 to 9.
CN202010960971.6A 2020-09-14 2020-09-14 Method and equipment for safely protecting CAD drawing information Pending CN112084516A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010960971.6A CN112084516A (en) 2020-09-14 2020-09-14 Method and equipment for safely protecting CAD drawing information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010960971.6A CN112084516A (en) 2020-09-14 2020-09-14 Method and equipment for safely protecting CAD drawing information

Publications (1)

Publication Number Publication Date
CN112084516A true CN112084516A (en) 2020-12-15

Family

ID=73737795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010960971.6A Pending CN112084516A (en) 2020-09-14 2020-09-14 Method and equipment for safely protecting CAD drawing information

Country Status (1)

Country Link
CN (1) CN112084516A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115063828A (en) * 2022-07-14 2022-09-16 烟台建联勘察设计审查服务中心 Method and system for automatically identifying and verifying validity of electronic signature for construction drawing
CN117668878A (en) * 2022-10-13 2024-03-08 苏州浩辰软件股份有限公司 Local encryption method, system, storage medium and program product for CAD file
WO2024078023A1 (en) * 2022-10-13 2024-04-18 苏州浩辰软件股份有限公司 Local encryption method and system for cad file, and computer program product
CN117955738A (en) * 2024-03-26 2024-04-30 北京鸿鹄云图科技股份有限公司 Cross-platform multi-terminal drawing synchronization method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117476A (en) * 2011-04-15 2011-07-06 哈尔滨工业大学 Signature watermark system used for CAD (Computer-Aided Design) documents
CN102867135A (en) * 2012-08-01 2013-01-09 广东南方数码科技有限公司 Right control system and control method for computer-aided design (CAD) graph entity
CN103377329A (en) * 2012-04-19 2013-10-30 常熟南师大发展研究院有限公司 Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities
US20140281545A1 (en) * 2013-03-12 2014-09-18 Commvault Systems, Inc. Multi-layer embedded encryption
CN106599321A (en) * 2016-12-30 2017-04-26 上海绿建信息科技有限公司 DWG file annotation and signature generation and analysis plug-in, and use method thereof
CN107784207A (en) * 2017-10-30 2018-03-09 平安科技(深圳)有限公司 Display methods, device, equipment and the storage medium at financial APP interfaces
CN110109997A (en) * 2019-05-16 2019-08-09 洛阳众智软件科技股份有限公司 Data processing storage method and equipment
CN110163555A (en) * 2019-04-11 2019-08-23 厦门亿力吉奥信息科技有限公司 Collaboration drawing management method, storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117476A (en) * 2011-04-15 2011-07-06 哈尔滨工业大学 Signature watermark system used for CAD (Computer-Aided Design) documents
CN103377329A (en) * 2012-04-19 2013-10-30 常熟南师大发展研究院有限公司 Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities
CN102867135A (en) * 2012-08-01 2013-01-09 广东南方数码科技有限公司 Right control system and control method for computer-aided design (CAD) graph entity
US20140281545A1 (en) * 2013-03-12 2014-09-18 Commvault Systems, Inc. Multi-layer embedded encryption
CN106599321A (en) * 2016-12-30 2017-04-26 上海绿建信息科技有限公司 DWG file annotation and signature generation and analysis plug-in, and use method thereof
CN107784207A (en) * 2017-10-30 2018-03-09 平安科技(深圳)有限公司 Display methods, device, equipment and the storage medium at financial APP interfaces
CN110163555A (en) * 2019-04-11 2019-08-23 厦门亿力吉奥信息科技有限公司 Collaboration drawing management method, storage medium
CN110109997A (en) * 2019-05-16 2019-08-09 洛阳众智软件科技股份有限公司 Data processing storage method and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈玥秀: "工程图纸信息安全管理技术研究", 《中国优秀硕士学位论文全文数据库 工程科技II辑》, no. 2, pages 3 - 5 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115063828A (en) * 2022-07-14 2022-09-16 烟台建联勘察设计审查服务中心 Method and system for automatically identifying and verifying validity of electronic signature for construction drawing
CN117668878A (en) * 2022-10-13 2024-03-08 苏州浩辰软件股份有限公司 Local encryption method, system, storage medium and program product for CAD file
WO2024078023A1 (en) * 2022-10-13 2024-04-18 苏州浩辰软件股份有限公司 Local encryption method and system for cad file, and computer program product
CN117955738A (en) * 2024-03-26 2024-04-30 北京鸿鹄云图科技股份有限公司 Cross-platform multi-terminal drawing synchronization method and system
CN117955738B (en) * 2024-03-26 2024-05-24 北京鸿鹄云图科技股份有限公司 Cross-platform multi-terminal drawing synchronization method and system

Similar Documents

Publication Publication Date Title
CN112084516A (en) Method and equipment for safely protecting CAD drawing information
CA2437645C (en) Electronic document management system with the use of signature technique capable of masking
Koushanfar et al. Behavioral synthesis techniques for intellectual property protection
US7346780B2 (en) Integrity ordainment and ascertainment of computer-executable instructions
EP2634959A2 (en) Method and Apparatus for Incremental Code Signing
CN101305333A (en) Tamper-resistant trusted virtual machine
CN105512565A (en) Method and server for preventing electronic document leakage
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
WO2022078366A1 (en) Application protection method and apparatus, device and medium
Kim et al. Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications
Mainka et al. Shadow Attacks: Hiding and Replacing Content in Signed PDFs.
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
CN105740661A (en) Method and device for protecting application program
CN117592108A (en) Interface data desensitization processing method and device
CN107391970B (en) Function access control method and device in Flash application program
Lee et al. Classification and analysis of security techniques for the user terminal area in the internet banking service
KR101497067B1 (en) Electric document transfer method and apparatus based digital forensic
CN111385083B (en) Key protection method and key protection system
JP6395986B2 (en) Key generation source identification device, key generation source identification method, and key generation source identification program
CN109150813A (en) A kind of verification method and device of equipment
Ertaul et al. JHide-A tool kit for code obfuscation.
CN106650329A (en) Individual authorization method of data export equipment
CN117009931A (en) Watermarking and watermarking application methods, devices, equipment and storage medium
CN114629643A (en) Key processing method, device and medium
CN109361667B (en) Method and device for preventing space proof information from being tampered

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201215

RJ01 Rejection of invention patent application after publication