CN113946849B - Processing method for Revit family file - Google Patents

Processing method for Revit family file Download PDF

Info

Publication number
CN113946849B
CN113946849B CN202111219731.1A CN202111219731A CN113946849B CN 113946849 B CN113946849 B CN 113946849B CN 202111219731 A CN202111219731 A CN 202111219731A CN 113946849 B CN113946849 B CN 113946849B
Authority
CN
China
Prior art keywords
parameter
family
list
target file
primitive element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111219731.1A
Other languages
Chinese (zh)
Other versions
CN113946849A (en
Inventor
严心军
严晗
张涛
鲍大鑫
林剑远
张邦旭
田仲翔
张超甫
张帅
占游云
吴璇
朱立刚
王磊
史雅瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway Construction Engineering Group Smart Technology Co ltd
China Railway Construction Engineering Group Co Ltd
Original Assignee
China Railway Construction Engineering Group Smart Technology Co ltd
China Railway Construction Engineering Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway Construction Engineering Group Smart Technology Co ltd, China Railway Construction Engineering Group Co Ltd filed Critical China Railway Construction Engineering Group Smart Technology Co ltd
Priority to CN202111219731.1A priority Critical patent/CN113946849B/en
Publication of CN113946849A publication Critical patent/CN113946849A/en
Application granted granted Critical
Publication of CN113946849B publication Critical patent/CN113946849B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of Revit family files, in particular to a processing method for a Revit family file, which comprises the following steps: establishing an environment required by processing the target file, judging whether the target file is encrypted, if so, outputting encrypted information, and ending encryption; if the result is negative, carrying out encryption operation on the target file; judging whether the target file is encrypted or not, and if not, outputting unencrypted information; if yes, decrypting the target file; the decryption operation includes: resetting the visibility of the primitives in the target file; resetting the workability of the second group parameters in the target file; and deleting the encrypted identification in the target file. The invention can encrypt and decrypt the group file, and processes the editing authority function and ownership identification function of the group file by setting the visibility of the group parameter, setting whether the group file can be driven by the group parameter, setting the ownership identification of the group file and the like.

Description

Processing method for Revit family file
Technical Field
The invention relates to the field of Revit family files, in particular to a processing method for a Revit family file.
Background
In the use of the Revit platform, the family file is a basic unit for creating an informationized building, and can be flexibly applied to Revit projects. The method can provide individuals with different attributes and shapes for the project, so that the project forms a complete three-dimensional model, and also contains geometric shapes and building professional data information, so as to establish informationized data support for the three-dimensional model. The family files can be created by users, and important resource wealth is formed by the continuous accumulation of the users. And storing the huge number of parameters in the family file, wherein some parameters relate to confidentiality, which relates to encryption of the family file and also relates to decryption of the corresponding encrypted family file.
The huge amount of data assets are stored in the family file, and some data assets relate to confidentiality. However, in circulation of the Reivt project, the protection of the information security aspect of the family file in the prior art is still insufficient, so that the family file has risks of leaking and embezzling data resources in the circulation process. And, for the encrypted family file, a corresponding decryption method is needed to decrypt so as to facilitate circulation of the Reivt item.
Therefore, a processing method for a Revit family file is needed, which can encrypt and decrypt the family file, and solves the problems of data resource leakage, difficult decryption and the like of the family file in circulation.
Disclosure of Invention
The invention provides a processing method for a Revit family file, which can encrypt and decrypt the family file, and can process the editing authority function of the family file and the ownership identification function of the family file by setting the visibility of the family parameter, setting whether the family file can be driven by the family parameter, setting the ownership identification of the family file and other methods, thereby achieving the effects of encryption and decryption. Powerful data resource protection is provided for a user of the Revit platform, and the problems in the prior art are solved.
A processing method for a Revit family file, comprising the steps of:
establishing a Revit environment required by target file processing, and then judging whether the target file needs encryption or decryption;
step one, judging whether the target file is encrypted, if so, outputting encrypted information, and ending encryption; if the judgment result is negative, carrying out encryption operation on the target file;
step A, judging whether the target file is encrypted, if not, outputting unencrypted information, and ending decryption; if the judgment result is yes, performing decryption operation on the target file;
the decryption operation in step a includes:
Step A1, resetting the visibility of the graphic elements in the target file;
step A2, resetting the workability of the second group parameters in the target file;
and step A3, deleting the encrypted identification in the target file.
By adopting the method, the group file can be encrypted and decrypted, and the editing authority function of the group file and the ownership identification function of the group file are processed by the methods of setting the visibility of the group parameters, setting whether the group file can be driven by the group parameters, setting the ownership identification of the group file and the like, so that the effects of encryption and decryption are achieved. Powerful data resource protection is provided for Revit platform users.
On the one hand, the encryption operation comprises the following specific steps:
establishing a Revit environment required for executing encryption operation;
judging whether the target file is encrypted, if so, outputting encrypted information, and ending encryption; if the judgment result is negative, carrying out encryption operation on the target file;
the encryption operation includes:
step 1, performing visibility setting on a first primitive Element in the target file;
step 2, setting the working performance of the first group of parameters in the target file;
and step 3, adding encryption identification data to the target file.
Further, under the Revit environment, reading built-in UIApplication, built-in UIDocument and built-in Document in the Revit environment; the built-in uiaplication is a currently active Revit session; the built-in UIDOCUMENT comprises document information and operations related to the UI, wherein the document information and the operations comprise an active view, a document, a built-in filter and the like; the built-in Document is a source of references to data and methods in encryption operations. The built-in filter includes a first filter and a second filter.
Further, the encrypting operation further includes:
step a, judging the type of the target file, reading the target file, and acquiring an IsFamilyDocument attribute of the target file when the target file is not empty;
when the IsFamilyDocument attribute is true, the target file is a family file, otherwise, a TaskDialog. Show () function is called to inform a user that the target file is not a family file;
b, when the target file in the step a is a family file, judging whether the target file is encrypted, reading the target file, and acquiring a family manager under the target file; when it is not null, the get_parameter () function is called based on family manager to obtain the imprint Parameter; then judging the imprinting parameters;
If the imprinting parameter is not null and the value of the imprinting parameter is consistent with the set value of the imprinting parameter in the encryption operation, the target file is encrypted, and a task dialog () function is called to inform a user that the family file is encrypted;
and if the imprinting parameter is empty or the value of the imprinting parameter is inconsistent with the set value of the imprinting parameter in the encryption operation, performing the encryption operation.
Further, the step 1 specifically includes the following steps:
step 1.1, a first filter is established, a target file is screened, and a first View object View is screened out;
step 1.2, judging a first primitive Element in the first View object View, traversing the first primitive Element when the first primitive Element is not null, and then selecting the first primitive Element which can be displayed by judging the printable attribute CanBePrinted of the first primitive Element; then a second filter is established, and the first primitive Element is screened out;
step 1.3, judging the first primitive Element, and judging a first Label attribute Label of the first primitive Element when the first primitive Element is not empty; when the first Label attribute Label is not empty, namely the first primitive Element is related by a first group parameter, then the first primitive Element related by the first group parameter is stored in a list, the list is marked as a first primitive Element list, and the first primitive Element list is driven by the first group parameter;
The first primitive Element includes: the first Dimension, the first reference plane, the first geometry GenericForm, the first geometry combination GeomCombination or the first family instance,
the first primitive Element list comprises: the first Dimension list, the first reference plane list, the first geometry combination list, or the first family instance list.
Preferably, in step 1.3, the first primitive Element id associated with the first group of parameters may be stored in a list, and the corresponding first primitive Element may be obtained through the first primitive Element id.
Further, the step 1 further includes:
step 1.4, traversing the first View object View, judging a first primitive Element list in the first View object View through an Element IsHidden (View) function, and judging whether a corresponding first primitive Element in the first primitive Element list is hidden or not; if not, recording the first primitive Element which is not hidden into a list, and recording the list as a hidden list;
step 1.5, setting the first primitive Element which is not hidden as hidden in the first View object View by using a View.
Further, the step 2 specifically includes:
screening a first group parameter in the target file, screening a group parameter which can be modified and can drive a first Dimension, and marking the group parameter as an encryptable group parameter; then establishing a mapping family parameter which is the same as the encryptable family parameter, and binding the mapping family parameter with a corresponding first Dimension marking Dimension so as to replace the binding between the encryptable family parameter and the corresponding first Dimension marking Dimension; then limiting the mapping family parameter, and setting the mapping family parameter to be inoperable; so that the operating encryptable family parameters cannot drive the corresponding first Dimension, thereby realizing the protection of the working property of the first family parameters.
Further, the step 2 specifically includes the following steps:
step 2.1, searching the encryptable family parameters in the query target file:
reading a target file and acquiring a family manager of the target file, acquiring a list of all first family parameters in the family manager, wherein the list is a first family parameter list, and inquiring the attribute of the family parameters in the first family parameter list; inquiring Definition attribute Definition and editable attribute userModifiable of the first group of parameters when the data type and the driving attribute IsDeterminedByformula of the first group of parameters are respectively double-precision numerical value and formula driving;
When Definition attribute Definition and editable attribute userModifiable are respectively defined internally
Inquiring whether the first group parameter is an embedded group parameter build InParameter or not when the InternalDefinition and the user cannot edit; if the first group parameter is the built-in group parameter, the encryption operation is not executed, and if the first group parameter is not the built-in group parameter, the first related group parameter related to the first group parameter is queried through the first related group parameter attribute AssociatedParameters of the first group parameter; judging the first related family parameter, and encrypting the first family parameter if the attribute of the first related family parameter is not a connection primitive connectignel element and the first related family parameter can be associated, namely the first related family parameter is a non-reporting parameter; the first family parameter that can be encrypted is noted as an encryptable family parameter and added to the list, which is noted as an encrypted list.
Further, the step 2 further includes a step 2.2, and the step 2.2 includes:
step 2.2.1, traversing a first Dimension list through a document/getelement () function, obtaining a first Dimension, obtaining a tag definition name attribute of the first Dimension, storing the first Dimension having different tag definition names Label/definition/names into different lists, and establishing a corresponding Tuple according to a correspondence between the tag definition/name and the first Dimension, wherein the Tuple is in a form of: (tag definition name, first Dimension);
Step 2.2.2, then establishing a Dictionary, taking the tag definition name as a key of the Dictionary, and taking the Tuple as a value of the Dictionary; calculating the number of dictionaries by dictionary.count, wherein when the number is more than or equal to 1, the corresponding relation exists between the encryptable group parameter and the first Dimension;
each item of the dictionary is then traversed using a foreach loop, the name of the encryptable family parameter is extracted, and a unified and identifiable characteristic field is added as a prefix/suffix as the name of the mapping family parameter. The foreach loop is foreach (KeyValuePair < tag definition name, tuple < encryptable family parameter, corresponding first size label Dimension list > > keyValuePair dictionary)
Then, performing external definition of the mapping family parameters through a C# statement in the form of externalDefinitionCreationoperations [ mapping family parameters ] = new ExternalDefinitionCreationOptions ([ name of encryptable family parameters with added prefix/suffix ], [ encryptable family parameter type in dictionary ]), setting Visible attribute Visible of the mapping family parameters as invisible, namely gray display, and setting editable attribute UserModifiable of the mapping family parameters as non-editable; then adding the map group parameters into a target file through a document.family manager.AddParameter (the map group parameters), the group parameter groups and the block values, and setting the parameter values of the map group parameters through the document.family manager.set (the map group parameters and the parameter values), thereby completing the creation of the map group parameters; the mapping family parameters and the corresponding encryptable family parameters have uniform parameter types and are named by fixed prefixes/suffixes;
Step 2.2.3, then associating the mapping family parameters with the corresponding first Dimension according to the dictionary; the method comprises the following specific steps:
and adopting a foreach loop to define labels of a corresponding first Dimension list of the Dimension in the dictionary, and realizing association of the first Dimension and the map parameters by using a [ first Dimension ]. Family label= [ map parameters ] function item by item aiming at the first Dimension.
Step 2.2.4, then obtaining the related group parameter attribute AssociatedParameters of the encryptable group parameter, judging the related group parameter of the encryptable group parameter by using a foreach loop, and when the judging result is not null and the number is more than 0, indicating that the related group parameter exists, determining that the related group parameter exists by
And (3) establishing an association relation between the mapping family parameter and the first related family parameter of the encryptable family parameter by using a document.family manager.associate element parameter To family parameter ([ first related family parameter ], [ mapping family parameter ]) function.
Further, the step 2 further includes:
step 2.3, obtaining an original formula object of the encryptable family parameter, obtaining a formula with a character string as an obtained result, adding a prefix/suffix to the name of the encryptable family parameter to obtain the name of the corresponding mapping family parameter, then modifying the name of the encryptable family parameter in the original formula object into the name of the mapping family parameter by using a Replace () function to obtain a new formula object, and then setting the new formula object for the mapping family parameter by using a document.family manager.setformula ([ mapping family parameter ], [ new formula object ]) function to complete the association of the new formula object of the mapping family parameter; associating a first Dimension of the Dimension with a map family parameter,
The map family parameters are then set to invisible and user inoperable, thereby achieving workable protection of the family parameters in the target file.
Further, the step 3 specifically includes: adding identification parameters with identification characteristics to the target file and adding Logo identifications to the target file, wherein the Logo identifications comprise Logo identification thumbnail and Logo identification shape graphic primitives in the target file; the encrypted identification data comprises the identification parameter and the Logo identification;
the adding of the identification parameters specifically comprises the following steps:
performing external definition of the identification parameters through C# sentences in the form of externalDefinitionCreationoperations [ identification parameters ] = newexternalDefinitionoperations ([ identification parameter names ], [ parameter types ]), wherein the parameter types are usually Text, namely Text types, and then setting Visible attributes Visible of the identification parameters to be invisible, namely gray display, and setting editable attributes userModifiable of the identification parameters to be non-editable by a user; the identification parameters are then passed through
The document.family manager.addparameter ([ identification parameter ], [ identification parameter group ], [ body value ]) is added to the target file, and then the setting of the parameter value of the identification parameter is performed through the document.family manager.set ([ identification parameter ], [ identification parameter value ]).
On the other hand, the decryption operation specifically comprises the following steps:
step A, when the target file needs to be decrypted, judging whether the target file is encrypted, if not, outputting unencrypted information, and ending the decryption; if the judgment result is yes, performing decryption operation on the target file;
the decryption operation in step a includes:
step A1, resetting the visibility of the graphic elements in the target file;
step A2, resetting the workability of the second group parameters in the target file;
and step A3, deleting the encrypted identification in the target file.
Further, the step a specifically includes:
the encryption identification comprises identification parameters, whether the identification parameters exist in the target file is judged by using a document. Family manager. Get_parameter function, and when a return result is null, namely the target file is not encrypted, a user is informed that the target file is not encrypted by calling a task dialog. Show () function; and when the judgment result is that the target file is encrypted, performing decryption operation on the target file.
Further, the step A1 includes:
a1.1, a third filter is established, and target files are screened to obtain a second View object View;
A1.2, judging a second primitive Element in the second View object View, traversing the second primitive Element when the second primitive Element is not null, and then selecting the printable second primitive Element by judging the printable attribute CanBePrinted of the second primitive Element; a fourth filter is then created by FilteredElementCollector filter name newFilteredElementCollector (Document), the second primitive Element is queried and filtered by class,
a1.3, judging the second primitive Element, and judging a second Label attribute Label of the second primitive Element when the second primitive Element is not empty; when the second Label attribute Label is not empty, namely the second primitive Element is related by a second group parameter, then the second primitive Element related by the second group parameter is saved into a list, the list is marked as a second primitive Element list, and the second primitive Element list is driven by the second group parameter;
the second primitive Element includes: second Dimension, second reference plane, second geometry GenericForm, second geometry combination GeomCombination or second family instance,
The second primitive Element list includes: a second list of annotations, a second list of reference planes, a second list of geometries, a second list of combinations of geometries, or a second list of family instances.
Further, the step A1 further includes:
step A1.4, traversing the second View object View, judging a second primitive Element list in the second View object View through an Element IsHidden (View) function, and judging whether a corresponding second primitive Element in the second primitive Element list is hidden or not; if so, recording the hidden second primitive Element into a list, and recording the list as a hidden list;
step a1.5, then setting the hidden second primitive Element to un-hidden in the second View object View using a View. Unhideelements (list) function.
Further, the step A2 includes:
a2.1, traversing each second group parameter in the second dimension marking list, obtaining the name of the second group parameter, judging whether the second group parameter contains a prefix/suffix set by encryption operation or not according to the name of the second group parameter, and if the second group parameter contains the prefix/suffix, judging that each second group parameter in the second dimension marking list is an encrypted group parameter; the first group of parameters before encryption corresponding to the encrypted group of parameters are recorded as encryptable group of parameters;
A2.2, judging whether the encrypted group Parameter exists or not through a document.family manager.get_parameter () function, when the result returns to be not equal to null, indicating that the encrypted group Parameter exists, deleting the prefix/suffix in the name of the encrypted group Parameter, and recording the encrypted group Parameter as a reduction group Parameter;
a2.3, converting the association relation of the group parameters of the second dimension marking list, and associating the dimension-marked second tag attribute Label with the reduction group parameters through a dimension.family Label= (reduction group parameters) function, so as to release the association of the dimension-marked second tag attribute Label with the encrypted group parameters;
step A2.4, obtaining the second related group parameter through the attribute associtdParameters of the second related group parameter, then judging the second related group parameter, if the attribute of the second related group parameter is not the connection primitive connectignement and the second related group parameter can be associated, using
A document.family manager.associate element parameter to family parameter ([ second related family parameter ], [ reduction family parameter ]) function, setting the reduction family parameter to the second related family parameter; and then use
The document.family manager.removeparameter () function cancels the setting of the encrypted family parameter as the second related family parameter;
A2.5, obtaining a formula attribute of the encrypted family parameter, judging whether the formula attribute is false by using a function string. IsNullOrempty (), if so, storing the encrypted family parameter comprising the new formula object and the corresponding restoring family parameter into a list, and marking the list as a formula parameter list;
step A2.6, obtaining a new Formula object in the Formula parameter list through a Formula function, then replacing an encrypted family parameter associated with the new Formula object with a reduction family parameter by using a Replace ([ prefix/suffix ], ") function, and marking the new Formula object as an original Formula object after replacement; the original formula object is the formula object before encryption operation
A2.7, associating the reduction group parameter with the original formula object through a document.family manager.setformula ([ reduction group parameter ], [ original formula object ]) function to finish the reset of the new formula object; the reduction group parameter associated with the original formula object is the first group parameter before encryption operation, and the resetting of the workability of the second group parameter is completed.
Further, step A3 includes:
judging whether the identification Parameter exists in the target file or not through the identification Parameter of document family manager, namely whether the target file is identified by encryption or not, and when the return result is not null, judging whether the target file exists in the target file or not through the identification Parameter
The identification parameter is deleted by document.family manager.removeparameter.
The beneficial effects of the invention are as follows:
the invention increases the editing authority function of the family file and the ownership identification function of the family file by the methods of setting the visibility of the family parameters, setting whether the family file can be driven by the family parameters, setting the ownership identification of the family file and the like, thereby achieving the effects of encrypting and decrypting the Revit family file and providing powerful data resource protection for Revit platform users.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
It will be apparent that the embodiments described below are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In the description of the present invention, it should be noted that the terms "mounted," "connected," and "connected" are to be construed broadly, unless otherwise specifically defined and limited.
In addition, the technical features of the different embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
A processing method for a Revit family file, comprising the steps of:
establishing a Revit environment required by target file processing, and then judging whether the target file needs encryption or decryption;
step one, judging whether the target file is encrypted, if so, outputting encrypted information, and ending encryption; if the judgment result is negative, carrying out encryption operation on the target file;
step A, judging whether the target file is encrypted, if not, outputting unencrypted information, and ending decryption; if the judgment result is yes, performing decryption operation on the target file;
the decryption operation in step a includes:
step A1, resetting the visibility of the graphic elements in the target file;
step A2, resetting the workability of the second group parameters in the target file;
and step A3, deleting the encrypted identification in the target file.
Example 1
This embodiment is an encryption operation in the present invention.
Establishing a Revit environment required for executing encryption operation;
judging whether the target file is encrypted, if so, outputting encrypted information, and ending encryption; if the judgment result is negative, carrying out encryption operation on the target file;
The encryption operation includes:
step 1, performing visibility setting on a first primitive Element in the target file;
step 2, setting the working performance of the first group of parameters in the target file;
and step 3, adding encryption identification data to the target file.
Reading built-in UIApplication, built-in UIDocument and built-in Document in the Revit environment; the built-in uiaplication is a currently active Revit session; the built-in UIDOCUMENT comprises document information and operations related to the UI, wherein the document information and the operations comprise an active view, a document, a built-in filter and the like; the built-in Document is a source of references to data and methods in encryption operations. The built-in filter includes a first filter and a second filter.
The encryption operation further includes:
step a, judging the type of the target file, reading the target file, and acquiring an IsFamilyDocument attribute of the target file when the target file is not empty;
when the IsFamilyDocument attribute is true, the target file is a family file, otherwise, a TaskDialog. Show () function is called to inform a user that the target file is not a family file;
b, when the target file in the step a is a family file, judging whether the target file is encrypted, reading the target file, and acquiring a family manager under the target file; when it is not null, the get_parameter () function is called based on family manager to obtain the imprint Parameter; then judging the imprinting parameters;
If the imprinting parameter is not null and the value of the imprinting parameter is consistent with the set value of the imprinting parameter in the encryption operation, the target file is encrypted, and a task dialog () function is called to inform a user that the family file is encrypted;
and if the imprinting parameter is empty or the value of the imprinting parameter is inconsistent with the set value of the imprinting parameter in the encryption operation, performing the encryption operation.
The step 1 specifically comprises the following steps:
step 1.1, a first filter is established, a target file is screened, and a first View object View is screened out;
step 1.2, judging a first primitive Element in the first View object View, traversing the first primitive Element when the first primitive Element is not null, and then selecting the first primitive Element which can be displayed by judging the printable attribute CanBePrinted of the first primitive Element; then a second filter is established, and the first primitive Element is screened out;
step 1.3, judging the first primitive Element, and judging a first Label attribute Label of the first primitive Element when the first primitive Element is not empty; when the first Label attribute Label is not empty, namely the first primitive Element is related by a first group parameter, then the first primitive Element related by the first group parameter is stored in a list, the list is marked as a first primitive Element list, and the first primitive Element list is driven by the first group parameter;
The first primitive Element includes: the first Dimension, the first reference plane, the first geometry GenericForm, the first geometry combination GeomCombination or the first family instance,
the first primitive Element list comprises: the first Dimension list, the first reference plane list, the first geometry combination list, or the first family instance list.
Preferably, in step 1.3, the first primitive Element id associated with the first group of parameters may be stored in a list, and the corresponding first primitive Element may be obtained through the first primitive Element id.
The step 1 further includes:
step 1.4, traversing the first View object View, judging a first primitive Element list in the first View object View through an Element IsHidden (View) function, and judging whether a corresponding first primitive Element in the first primitive Element list is hidden or not; if not, recording the first primitive Element which is not hidden into a list, and recording the list as a hidden list;
step 1.5, setting the first primitive Element which is not hidden as hidden in the first View object View by using a View.
The step 2 specifically includes:
screening a first group parameter in the target file, screening a group parameter which can be modified and can drive a first Dimension, and marking the group parameter as an encryptable group parameter; then establishing a mapping family parameter which is the same as the encryptable family parameter, and binding the mapping family parameter with a corresponding first Dimension marking Dimension so as to replace the binding between the encryptable family parameter and the corresponding first Dimension marking Dimension; then limiting the mapping family parameter, and setting the mapping family parameter to be inoperable; so that the operating encryptable family parameters cannot drive the corresponding first Dimension, thereby realizing the protection of the working property of the first family parameters.
The step 2 specifically comprises the following steps:
step 2.1, searching the encryptable family parameters in the query target file:
reading a target file and acquiring a family manager of the target file, acquiring a list of all first family parameters in the family manager, wherein the list is a first family parameter list, and inquiring the attribute of the family parameters in the first family parameter list; inquiring Definition attribute Definition and editable attribute userModifiable of the first group of parameters when the data type and the driving attribute IsDeterminedByformula of the first group of parameters are respectively double-precision numerical value and formula driving;
When Definition attribute Definition and editable attribute userModifiable are respectively defined internally by InternalDefinite and uneditable by a user, inquiring whether the first group parameter is an embedded group parameter building InParameter; if the first group parameter is the built-in group parameter, the encryption operation is not executed, and if the first group parameter is not the built-in group parameter, the first related group parameter related to the first group parameter is queried through the first related group parameter attribute AssociatedParameters of the first group parameter; judging the first related family parameter, and encrypting the first family parameter if the attribute of the first related family parameter is not a connection primitive connectignel element and the first related family parameter can be associated, namely the first related family parameter is a non-reporting parameter; the first family parameter that can be encrypted is noted as an encryptable family parameter and added to the list, which is noted as an encrypted list.
Step 2 further comprises step 2.2, the step 2.2 comprising:
step 2.2.1, traversing a first Dimension list through a document/getelement () function, obtaining a first Dimension, obtaining a tag definition name attribute of the first Dimension, storing the first Dimension having different tag definition names Label/definition/names into different lists, and establishing a corresponding Tuple according to a correspondence between the tag definition/name and the first Dimension, wherein the Tuple is in a form of: (tag definition name, first Dimension);
Step 2.2.2, then establishing a Dictionary, taking the tag definition name as a key of the Dictionary, and taking the Tuple as a value of the Dictionary; calculating the number of dictionaries by dictionary.count, wherein when the number is more than or equal to 1, the corresponding relation exists between the encryptable group parameter and the first Dimension;
each item of the dictionary is then traversed using a foreach loop, the name of the encryptable family parameter is extracted, and a unified and identifiable characteristic field is added as a prefix/suffix as the name of the mapping family parameter. The foreach loop is foreach (KeyValuePair < tag definition name, tuple < encryptable family parameter, corresponding first size label Dimension list > > keyValuePair dictionary)
Then, performing external definition of the mapping family parameters through a C# statement in the form of externalDefinitionCreationoperations [ mapping family parameters ] = new ExternalDefinitionCreationOptions ([ name of encryptable family parameters with added prefix/suffix ], [ encryptable family parameter type in dictionary ]), setting Visible attribute Visible of the mapping family parameters as invisible, namely gray display, and setting editable attribute UserModifiable of the mapping family parameters as non-editable; then adding the map group parameters into a target file through a document.family manager.AddParameter (the map group parameters), the group parameter groups and the block values, and setting the parameter values of the map group parameters through the document.family manager.set (the map group parameters and the parameter values), thereby completing the creation of the map group parameters; the mapping family parameters and the corresponding encryptable family parameters have uniform parameter types and are named by fixed prefixes/suffixes;
Step 2.2.3, then associating the mapping family parameters with the corresponding first Dimension according to the dictionary; the method comprises the following specific steps:
and adopting a foreach loop to define labels of a corresponding first Dimension list of the Dimension in the dictionary, and realizing association of the first Dimension and the map parameters by using a [ first Dimension ]. Family label= [ map parameters ] function item by item aiming at the first Dimension.
Step 2.2.4, then obtaining the related group parameter attribute AssociatedParameters of the encryptable group parameter, judging the related group parameter of the encryptable group parameter by using a foreach loop, and when the judging result is not null and the number is more than 0, indicating that the related group parameter exists, determining that the related group parameter exists by
And (3) establishing an association relation between the mapping family parameter and the first related family parameter of the encryptable family parameter by using a document.family manager.associate element parameter To family parameter ([ first related family parameter ], [ mapping family parameter ]) function.
The step 2 further includes:
step 2.3, obtaining an original formula object of the encryptable family parameter, obtaining a formula with a character string as an obtained result, adding a prefix/suffix to the name of the encryptable family parameter to obtain the name of the corresponding mapping family parameter, then modifying the name of the encryptable family parameter in the original formula object into the name of the mapping family parameter by using a Replace () function to obtain a new formula object, and then setting the new formula object for the mapping family parameter by using a document.family manager.setformula ([ mapping family parameter ], [ new formula object ]) function to complete the association of the new formula object of the mapping family parameter; associating a first Dimension of the Dimension with a map family parameter,
The map family parameters are then set to invisible and user inoperable, thereby achieving workable protection of the family parameters in the target file.
The step 3 specifically includes: adding identification parameters with identification characteristics to the target file and adding Logo identifications to the target file, wherein the Logo identifications comprise Logo identification thumbnail and Logo identification shape graphic primitives in the target file; the encrypted identification data comprises the identification parameter and the Logo identification;
the adding of the identification parameters specifically comprises the following steps:
performing external definition of the identification parameters through C# sentences in the form of externalDefinitionCreationoperations [ identification parameters ] = newexternalDefinitionoperations ([ identification parameter names ], [ parameter types ]), wherein the parameter types are usually Text, namely Text types, and then setting Visible attributes Visible of the identification parameters to be invisible, namely gray display, and setting editable attributes userModifiable of the identification parameters to be non-editable by a user; the identification parameters are then passed through
The document.family manager.addparameter ([ identification parameter ], [ identification parameter group ], [ body value ]) is added to the target file, and then the setting of the parameter value of the identification parameter is performed through the document.family manager.set ([ identification parameter ], [ identification parameter value ]).
Example 2
This embodiment is a decryption operation in the present invention.
Step A, when the target file needs to be decrypted, judging whether the target file is encrypted, if not, outputting unencrypted information, and ending the decryption; if the judgment result is yes, performing decryption operation on the target file;
the decryption operation in step a includes:
step A1, resetting the visibility of the graphic elements in the target file;
step A2, resetting the workability of the second group parameters in the target file;
and step A3, deleting the encrypted identification in the target file.
The step A specifically comprises the following steps:
the encryption identification comprises identification parameters, whether the identification parameters exist in the target file is judged by using a document. Family manager. Get_parameter function, and when a return result is null, namely the target file is not encrypted, a user is informed that the target file is not encrypted by calling a task dialog. Show () function; and when the judgment result is that the target file is encrypted, performing decryption operation on the target file.
The step A1 comprises the following steps:
a1.1, a third filter is established, and target files are screened to obtain a second View object View;
a1.2, judging a second primitive Element in the second View object View, traversing the second primitive Element when the second primitive Element is not null, and then selecting the printable second primitive Element by judging the printable attribute CanBePrinted of the second primitive Element; a fourth filter is then created by FilteredElementCollector filter name newFilteredElementCollector (Document), the second primitive Element is queried and filtered by class,
A1.3, judging the second primitive Element, and judging a second Label attribute Label of the second primitive Element when the second primitive Element is not empty; when the second Label attribute Label is not empty, namely the second primitive Element is related by a second group parameter, then the second primitive Element related by the second group parameter is saved into a list, the list is marked as a second primitive Element list, and the second primitive Element list is driven by the second group parameter;
the second primitive Element includes: second Dimension, second reference plane, second geometry GenericForm, second geometry combination GeomCombination or second family instance,
the second primitive Element list includes: a second list of annotations, a second list of reference planes, a second list of geometries, a second list of combinations of geometries, or a second list of family instances.
The step A1 further includes:
step A1.4, traversing the second View object View, judging a second primitive Element list in the second View object View through an Element IsHidden (View) function, and judging whether a corresponding second primitive Element in the second primitive Element list is hidden or not; if so, recording the hidden second primitive Element into a list, and recording the list as a hidden list;
Step a1.5, then setting the hidden second primitive Element to un-hidden in the second View object View using a View. Unhideelements (list) function.
The step A2 comprises the following steps:
a2.1, traversing each second group parameter in the second dimension marking list, obtaining the name of the second group parameter, judging whether the second group parameter contains a prefix/suffix set by encryption operation or not according to the name of the second group parameter, and if the second group parameter contains the prefix/suffix, judging that each second group parameter in the second dimension marking list is an encrypted group parameter; the first group of parameters before encryption corresponding to the encrypted group of parameters are recorded as encryptable group of parameters;
a2.2, judging whether the encrypted group Parameter exists or not through a document.family manager.get_parameter () function, when the result returns to be not equal to null, indicating that the encrypted group Parameter exists, deleting the prefix/suffix in the name of the encrypted group Parameter, and recording the encrypted group Parameter as a reduction group Parameter;
a2.3, converting the association relation of the group parameters of the second dimension marking list, and associating the dimension-marked second tag attribute Label with the reduction group parameters through a dimension.family Label= (reduction group parameters) function, so as to release the association of the dimension-marked second tag attribute Label with the encrypted group parameters;
Step A2.4, obtaining the second related group parameter through the attribute associtdParameters of the second related group parameter, then judging the second related group parameter, if the attribute of the second related group parameter is not the connection primitive connectignement and the second related group parameter can be associated, using
A document.family manager.associate element parameter to family parameter ([ second related family parameter ], [ reduction family parameter ]) function, setting the reduction family parameter to the second related family parameter; and then use
The document.family manager.removeparameter () function cancels the setting of the encrypted family parameter as the second related family parameter;
a2.5, obtaining a formula attribute of the encrypted family parameter, judging whether the formula attribute is false by using a function string. IsNullOrempty (), if so, storing the encrypted family parameter comprising the new formula object and the corresponding restoring family parameter into a list, and marking the list as a formula parameter list;
step A2.6, obtaining a new Formula object in the Formula parameter list through a Formula function, then replacing an encrypted family parameter associated with the new Formula object with a reduction family parameter by using a Replace ([ prefix/suffix ], ") function, and marking the new Formula object as an original Formula object after replacement; the original formula object is the formula object before encryption operation
A2.7, associating the reduction group parameter with the original formula object through a document.family manager.setformula ([ reduction group parameter ], [ original formula object ]) function to finish the reset of the new formula object; the reduction group parameter associated with the original formula object is the first group parameter before encryption operation, and the resetting of the workability of the second group parameter is completed.
The step A3 comprises the following steps:
judging whether the identification Parameter exists in the target file or not through the identification Parameter of document family manager, namely whether the target file is identified by encryption or not, and when the return result is not null, judging whether the target file exists in the target file or not through the identification Parameter
The identification parameter is deleted by document.family manager.removeparameter.
The beneficial effects of the invention are as follows:
the invention increases the editing authority function of the family file and the ownership identification function of the family file by the methods of setting the visibility of the family parameters, setting whether the family file can be driven by the family parameters, setting the ownership identification of the family file and the like, thereby achieving the effects of encrypting and decrypting the Revit family file and providing powerful data resource protection for Revit platform users.
It is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations or modifications of the above teachings will be apparent to those of ordinary skill in the art. It is not necessary here nor is it exhaustive of all embodiments. While still being apparent from variations or modifications that may be made by those skilled in the art are within the scope of the invention.

Claims (6)

1. A method for processing a Revit family file, comprising the steps of:
establishing a Revit environment required by target file processing, and then judging whether the target file needs encryption or decryption;
step one, judging whether the target file is encrypted, if so, outputting encrypted information, and ending encryption; if the judgment result is negative, carrying out encryption operation on the target file;
step A, judging whether the target file is encrypted, if not, outputting unencrypted information, and ending decryption; if the judgment result is yes, performing decryption operation on the target file;
the decryption operation in step a includes:
step A1, resetting the visibility of the graphic elements in the target file; a1 includes:
a1.1, a third filter is established, and target files are screened to obtain a second View object View;
a1.2, judging a second primitive Element in the second View object View, traversing the second primitive Element when the second primitive Element is not null, and then selecting the printable second primitive Element by judging the printable attribute CanBePrinted of the second primitive Element; a fourth filter is then created by FilteredElementCollector filter name new FilteredElementCollector (Document), the second primitive Element is queried and filtered by class,
A1.3, judging the second primitive Element, and judging a second Label attribute Label of the second primitive Element when the second primitive Element is not empty; when the second Label attribute Label is not empty, namely the second primitive Element is related by a second group parameter, then the second primitive Element related by the second group parameter is saved into a list, the list is marked as a second primitive Element list, and the second primitive Element list is driven by the second group parameter;
the second primitive Element includes: second Dimension, second reference plane, second geometry GenericForm, second geometry combination GeomCombination or second family instance,
the second primitive Element list includes: a second list of sizing, a second list of reference planes, a second list of geometries, a second list of combinations of geometries, or a second list of family instances;
step A1.4, traversing the second View object View, judging a second primitive Element list in the second View object View through an Element IsHidden (View) function, and judging whether a corresponding second primitive Element in the second primitive Element list is hidden or not; if so, recording the hidden second primitive Element into a list, and recording the list as a hidden list;
Step A1.5, setting the hidden second primitive Element as unhidden in the second View object View by using a View.Unhideelements (list) function;
step A2, resetting the workability of the second group parameters in the target file; a2 includes:
a2.1, traversing each second group parameter in the second dimension marking list, obtaining the name of the second group parameter, judging whether the second group parameter contains a prefix/suffix set by encryption operation or not according to the name of the second group parameter, and if the second group parameter contains the prefix/suffix, judging that each second group parameter in the second dimension marking list is an encrypted group parameter; the first group of parameters before encryption corresponding to the encrypted group of parameters are recorded as encryptable group of parameters;
a2.2, judging whether the encrypted group Parameter exists or not through a document.family manager.get_parameter () function, when the result returns to be not equal to null, indicating that the encrypted group Parameter exists, deleting the prefix/suffix in the name of the encrypted group Parameter, and recording the encrypted group Parameter as a reduction group Parameter;
a2.3, converting the association relation of the group parameters of the second dimension marking list, and associating the dimension-marked second tag attribute Label with the reduction group parameters through a dimension.family Label= (reduction group parameters) function, so as to release the association of the dimension-marked second tag attribute Label with the encrypted group parameters;
Step A2.4, obtaining the second related group parameter through the attribute associtdParameters of the second related group parameter, then judging the second related group parameter, if the attribute of the second related group parameter is not the connection primitive connectignement and the second related group parameter can be associated, using
A document.family manager.associate element parameter to family parameter ([ second related family parameter ], [ reduction family parameter ]) function, setting the reduction family parameter to the second related family parameter; then cancel setting the encrypted family parameter as the second related family parameter using the document. Family manager. Removeparameter () function;
a2.5, obtaining a formula attribute of the encrypted family parameter, judging whether the formula attribute is false by using a function string. IsNullOrempty (), if so, storing the encrypted family parameter comprising the new formula object and the corresponding restoring family parameter into a list, and marking the list as a formula parameter list;
step A2.6, obtaining a new Formula object in the Formula parameter list through a Formula function, then replacing an encrypted family parameter associated with the new Formula object with a reduction family parameter by using a Replace ([ prefix/suffix ], ") function, and marking the new Formula object as an original Formula object after replacement; the original formula object is the formula object before encryption operation;
A2.7, associating the reduction group parameter with the original formula object through a document.family manager.setformula ([ reduction group parameter ], [ original formula object ]) function to finish the reset of the new formula object; the reduction group parameter associated with the original formula object is the first group parameter before encryption operation, namely the resetting of the workability of the second group parameter is completed;
and step A3, deleting the encrypted identification in the target file.
2. The method for processing a Revit family file according to claim 1, wherein the encrypting operation in the step one specifically includes:
step a, judging the type of the target file, reading the target file, and acquiring an IsFamilyDocument attribute of the target file when the target file is not empty;
when the IsFamilyDocument attribute is true, the target file is a family file, otherwise, a TaskDialog. Show () function is called to inform a user that the target file is not a family file;
b, when the target file in the step a is a family file, judging whether the target file is encrypted or not, and acquiring a family manager under the target file; when it is not null, the get_parameter () function is called based on family manager to obtain the imprint Parameter; then judging the imprinting parameters;
If the imprinting parameter is not null and the value of the imprinting parameter is consistent with the set value of the imprinting parameter in the encryption operation, the target file is encrypted, and a task dialog () function is called to inform a user that the family file is encrypted;
and if the imprinting parameter is empty or the value of the imprinting parameter is inconsistent with the set value of the imprinting parameter in the encryption operation, performing the encryption operation.
3. The method for processing a Revit family file according to claim 1, wherein the step one further comprises: step 1, the step 1 specifically includes the following steps:
step 1.1, a first filter is established, a target file is screened, and a first View object View is screened out;
step 1.2, judging a first primitive Element in the first View object View, traversing the first primitive Element when the first primitive Element is not null, and then selecting the printable first primitive Element by judging the printable attribute CanBePrinted of the first primitive Element; then a second filter is established, and the first primitive Element is screened out;
step 1.3, judging the first primitive Element, and judging a first Label attribute Label of the first primitive Element when the first primitive Element is not empty; when the first Label attribute Label is not empty, namely the first primitive Element is related by a first group parameter, then the first primitive Element related by the first group parameter is stored in a list, the list is marked as a first primitive Element list, and the first primitive Element list is driven by the first group parameter;
The first primitive Element includes: the first Dimension, the first reference plane, the first geometry GenericForm, the first geometry combination GeomCombination or the first family instance,
the first primitive Element list comprises: the first Dimension list, the first reference plane list, the first geometry combination list, or the first family instance list.
4. A method for processing a Revit family file according to claim 3, wherein said step 1 further comprises:
step 1.4, traversing the first View object View, judging a first primitive Element list in the first View object View through an Element IsHidden (View) function, and judging whether a corresponding first primitive Element in the first primitive Element list is hidden or not; if not, recording the first primitive Element which is not hidden into a list, and recording the list as a hidden list;
step 1.5, setting the first primitive Element which is not hidden as hidden in the first View object View by using a View.
5. The method for processing a Revit family file according to claim 1, wherein the step a specifically includes:
The encryption identification comprises identification parameters, whether the identification parameters exist in the target file is judged by using a document. Family manager. Get_parameter function, and when a return result is null, namely the target file is not encrypted, a user is informed that the target file is not encrypted by calling a task dialog. Show () function; and when the judgment result is that the target file is encrypted, performing decryption operation on the target file.
6. The method for processing a Revit family file according to claim 1, wherein the step A3 includes:
judging whether the identification Parameter exists in the target file or not through the identification Parameter of document family manager, namely judging whether the target file is identified by encryption or not, and when the returned result is not null, judging whether the target file exists in the target file or not through the identification Parameter of document family manager
The identification parameter is deleted by document.family manager.removeparameter.
CN202111219731.1A 2021-10-20 2021-10-20 Processing method for Revit family file Active CN113946849B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111219731.1A CN113946849B (en) 2021-10-20 2021-10-20 Processing method for Revit family file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111219731.1A CN113946849B (en) 2021-10-20 2021-10-20 Processing method for Revit family file

Publications (2)

Publication Number Publication Date
CN113946849A CN113946849A (en) 2022-01-18
CN113946849B true CN113946849B (en) 2023-11-03

Family

ID=79331612

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111219731.1A Active CN113946849B (en) 2021-10-20 2021-10-20 Processing method for Revit family file

Country Status (1)

Country Link
CN (1) CN113946849B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117668878A (en) * 2022-10-13 2024-03-08 苏州浩辰软件股份有限公司 Local encryption method, system, storage medium and program product for CAD file
CN115906124B (en) * 2022-12-08 2023-08-18 广州优比建筑咨询有限公司 Encryption method, decryption method, device and equipment for Revit project file

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE1550463A1 (en) * 2015-04-17 2016-10-18 Kelicomp Ab Improved compression and / or encryption of a file
CN107145619A (en) * 2017-03-10 2017-09-08 宁波诺丁汉大学 Function plate design system based on the comprehensive integrated cloud platforms of BIM
CN109218295A (en) * 2018-08-22 2019-01-15 平安科技(深圳)有限公司 Document protection method, device, computer equipment and storage medium
CN109960947A (en) * 2019-03-29 2019-07-02 北京本源数创咨询有限公司 A kind of guard method of Revit item file
CN111832031A (en) * 2019-04-17 2020-10-27 久瓴(上海)智能科技有限公司 Family file processing method and device, computer equipment and storage medium
CN112231646A (en) * 2020-12-11 2021-01-15 北京本源云建科技有限公司 Family file protection method based on Revit software
CN112560063A (en) * 2020-12-21 2021-03-26 中建安装集团有限公司 Encryption method for BIM family library platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015087407A1 (en) * 2013-12-11 2015-06-18 三菱電機株式会社 File storage system, file storage apparatus, and user terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE1550463A1 (en) * 2015-04-17 2016-10-18 Kelicomp Ab Improved compression and / or encryption of a file
CN107145619A (en) * 2017-03-10 2017-09-08 宁波诺丁汉大学 Function plate design system based on the comprehensive integrated cloud platforms of BIM
CN109218295A (en) * 2018-08-22 2019-01-15 平安科技(深圳)有限公司 Document protection method, device, computer equipment and storage medium
CN109960947A (en) * 2019-03-29 2019-07-02 北京本源数创咨询有限公司 A kind of guard method of Revit item file
CN111832031A (en) * 2019-04-17 2020-10-27 久瓴(上海)智能科技有限公司 Family file processing method and device, computer equipment and storage medium
CN112231646A (en) * 2020-12-11 2021-01-15 北京本源云建科技有限公司 Family file protection method based on Revit software
CN112560063A (en) * 2020-12-21 2021-03-26 中建安装集团有限公司 Encryption method for BIM family library platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于企业架构的BIM族库管理系统研究与实践;李鑫;蒋绮琛;于鑫;陈滨津;;土木建筑工程信息技术(第01期);全文 *

Also Published As

Publication number Publication date
CN113946849A (en) 2022-01-18

Similar Documents

Publication Publication Date Title
CN113946849B (en) Processing method for Revit family file
CN113946866B (en) Encryption method for Revit family file
US11487885B2 (en) Enabling and validating data encryption
US8296840B2 (en) Providing permission to perform action on an electronic ticket
TW464817B (en) Technique for creating audience-specific views of documents
EP1965327A1 (en) A document data security management method and system
US8645344B2 (en) Document processing system and method therefor
JP4275772B2 (en) Database system, data management method, and recording medium recording data management software
US6327698B1 (en) Method for integrating models in a modelling tool into an object oriented repository
US20040049773A1 (en) Information processing system and method for communications between application systems
CN102033951B (en) WEB database platform
CN110162988A (en) A kind of sensitive data encryption method based on operation system
CN115525916A (en) Database encryption method and device, electronic equipment and storage medium
EP1965310A1 (en) Document processing method
JP5157505B2 (en) Information processing apparatus, file editing method, file editing program, and recording medium
JP2011133991A (en) Confidential data protection system, confidential data protection method, and confidential data protection program
CN101976381A (en) Method and system for managing application assets
JP2008052643A (en) Document processing system, and method for controlling document processing
JP2007193649A (en) Secret information leak prevention system and server therefor
JP6473864B1 (en) Confidential processing / restoration pre-processing application device, confidential processing / restoration pre-processing application device terminal, confidential processing / restoration pre-processing application device terminal Pre-processing method and confidentiality processing / restoration pre-processing method of the terminal
JP2011100294A (en) Information processor, control method, and program
JP2007109158A (en) Document processing system, document processing method, and computer readable storage medium, and program
JP2006318057A (en) Cad model information management device
JP4832132B2 (en) Access control device, access control simulation method, and access control simulation program
JP2003196430A (en) Environmental information management system, method and program for it

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant