CN114978525B - BIM-based data security authentication method and system - Google Patents
BIM-based data security authentication method and system Download PDFInfo
- Publication number
- CN114978525B CN114978525B CN202210449923.XA CN202210449923A CN114978525B CN 114978525 B CN114978525 B CN 114978525B CN 202210449923 A CN202210449923 A CN 202210449923A CN 114978525 B CN114978525 B CN 114978525B
- Authority
- CN
- China
- Prior art keywords
- bim
- file
- bim file
- user
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a BIM-based data security authentication method and system, which relate to the technical field of data security authentication and comprise a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; the problems of BIM file theft caused by overlong encryption and decryption time, identity verification of a file sender and account theft are solved by firstly compressing and then encrypting the BIM file, generating a Hash abstract of the BIM file by using a Hash function and performing authority control on access of a private key.
Description
Technical Field
The invention belongs to the field of data security, relates to a data encryption technology, and in particular relates to a BIM-based data security authentication method and system.
Background
The building information model (Building Information Modeling) is a new tool for architecture, engineering and civil engineering. The term building information model or building information model is created by Autodesk. It is a computer aided design mainly based on three-dimensional graphics, object-oriented and architecture-related. The building information model file is used as a professional file, and the risk of being stolen exists in the uploading platform and the downloading process, so that the building information model file needs to be subjected to data security authentication;
in the existing data security authentication technology for BIM files, the following problems exist in most cases:
1. the problem that the general BIM file is relatively large is not considered, so that a great amount of time is required in the encryption and decryption process;
2. the problem of identity verification is not considered, namely the possibility that the downloaded BIM file is pirated exists;
3. the possibility of theft of the user account is not considered, so that the previously downloaded BIM file can be opened, and the BIM file is stolen;
therefore, a BIM-based data security authentication method and system are provided.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the invention provides a BIM-based data security authentication method and a BIM-based data security authentication system, which solve the problems of BIM file theft caused by overlong encryption and decryption time, authentication of a file sender and account theft by compressing and then encrypting the BIM file and generating a Hash digest of the BIM file by using a Hash function and performing authority control on access of a private key.
To achieve the above objective, according to an embodiment of the first aspect of the present invention, a method and a system for secure authentication of BIM-based data are provided, wherein the method comprises a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; wherein, each module is connected with each other by a wireless network and/or electrically;
the client is mainly used for registering and logging in of the user and communicating with the management background;
the user registers an account through a client; the management background stores the user login information in the data storage module;
after each user registers an account successfully, the management background generates a group of public and private keys for the user; marking the public key as Pi and the private key as Ki; wherein i represents a user; the management background sends the public key Pi to the client, and the private key Ki is limited in receiving; after the user passes the authority authentication of the received private key Ki, the management background sends the private key Ki to the client;
the user sends the BIM file title, the uploading user, the BIM file and the private key Ki to be uploaded to a BIM file uploading module through the client;
the BIM file uploading module is mainly used for providing a function of uploading BIM files for users;
specifically, the uploading the BIM file includes the following steps:
step S1, a private key Ki is obtained from a management background;
step S2: converting binary expressions of BIM files into Hash digests by using a Hash function; the Hash function comprises MD5 and SHA-1, and the Hash digest is a Hash value with 160 or 256 bits of fixed length by using the Hash function;
step S3: compressing the BIM file by using a lossless compression algorithm, wherein the lossless compression algorithm comprises a Huffman compression algorithm and a geometric coding algorithm;
step S4: encrypting the hash digest by using a private key Ki to obtain a hash digest ciphertext;
step S5: encrypting the compressed BIM file by using a private key Ki to obtain a BIM file ciphertext;
step S6: transmitting the BIM file title, the uploading person, the hash digest ciphertext and the BIM file ciphertext to a data storage module;
the data storage module sends a file title and an uploading person to a management background after receiving the hash digest ciphertext and the BIM file ciphertext; the management background sends the file title and the uploading user to the client of each user and displays the file title and the uploading user to the user;
before a user downloads a BIM file, the user needs to perform one-time authority verification;
after the user who is to download the BIM file passes the authority verification, the client held by the BIM file uploading user sends the public key Pi to the user; marking public and private keys of users to be downloaded with BIM files as Pj and Kj respectively;
after passing the authority verification, the management background sends the address of the file to be downloaded in the data storage module to the user client, and the user client downloads the BIM file ciphertext and the hash digest ciphertext from the address to the local client and then uploads the BIM file ciphertext to the BIM file decryption module; further, the client sends the public key Pi and the public key Pj to the BIM file decryption module;
the BIM file decryption module is mainly used for file verification and decryption of BIM file ciphertext; the file verification and decryption of BIM file ciphertext comprises the following steps:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key Pi to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending BIM file binary expression to the user client;
in another preferred embodiment, the user client receives a binary representation of the BIM file, opened using the corresponding BIM file format; it can be understood that, in order to prevent the account from being stolen, the downloaded BIM file needs to be protected;
compared with the prior art, the invention has the beneficial effects that:
1. the method reduces the encryption and decryption time of the BIM file by compressing and then encrypting the BIM;
2. the invention solves the problem that the downloaded BIM file is stolen due to the theft of the account number by performing access protection on the private key.
Drawings
FIG. 1 is a schematic diagram of the present invention;
fig. 2 is a flow chart of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the BIM-based data security authentication system includes a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; wherein, each module is connected with each other by a wireless network and/or electrically;
the client is mainly used for registering and logging in of the user and communicating with the management background;
it can be appreciated that a user first registers an account through a client; the method of registering account numbers can be to provide user names, login passwords and/or face recognition registration; the management background stores the user login information in the data storage module;
after each user registers an account successfully, the management background generates a group of public and private keys for the user; marking the public key as Pi and the private key as Ki; wherein i represents a user; the management background sends the public key Pi to the client, and the private key Ki is limited in receiving;
in a preferred embodiment, the user's access to the private key Ki sets an additional password protection; firstly filling an access password before receiving a private key Ki, and if and only if the filled access password is the same as a preset access password, sending the private key Ki to a client by a management background; the access password set in advance is a password which is set by a user, is different from a login password and consists of numbers, english letters and characters;
in a further preferred embodiment, the user's access to the private key Ki is provided with an additional face recognition and/or fingerprint recognition protection; firstly, before receiving a private key Ki, the user needs to identify face and/or fingerprint through preset face recognition and/or fingerprint recognition; after the user is identified by face recognition and/or fingerprint recognition, the management background sends the private key Ki to the client;
the user sends the BIM file title, the uploading user, the BIM file and the private key Ki to be uploaded to a BIM file uploading module through the client;
the BIM file uploading module is mainly used for providing a function of uploading BIM files for users;
specifically, the uploading the BIM file includes the following steps:
step S1, a private key Ki is obtained from a management background;
step S2: converting binary expressions of BIM files into Hash digests by using a Hash function; the Hash function comprises MD5 and SHA-1, and the Hash digest is a Hash value with 160 or 256 bits of fixed length by using the Hash function;
step S3: compressing the BIM file by using a lossless compression algorithm, wherein the lossless compression algorithm comprises a Huffman compression algorithm and a geometric coding algorithm;
step S4: encrypting the hash digest by using a private key Ki to obtain a hash digest ciphertext;
step S5: encrypting the compressed BIM file by using a private key Ki to obtain a BIM file ciphertext;
step S6: transmitting the BIM file title, the uploading person, the hash digest ciphertext and the BIM file ciphertext to a data storage module;
the data storage module sends a file title and an uploading person to a management background after receiving the hash digest ciphertext and the BIM file ciphertext; the management background sends the file title and the uploading user to the client of each user and displays the file title and the uploading user to the user;
before a user downloads a BIM file, the user needs to perform one-time authority verification; in a specific embodiment, the authority verification may be purchase, offline communication, entry of an access password, etc.;
after the user who is to download the BIM file passes the authority verification, the client held by the BIM file uploading user sends the public key Pi to the user; marking public and private keys of users to be downloaded with BIM files as Pj and Kj respectively;
after passing the authority verification, the management background sends the address of the file to be downloaded in the data storage module to the user client, and the user client downloads the BIM file ciphertext and the hash digest ciphertext from the address to the local client and then uploads the BIM file ciphertext to the BIM file decryption module; further, the client sends the public key Pi and the public key Pj to the BIM file decryption module;
the BIM file decryption module is mainly used for file verification and decryption of BIM file ciphertext; the file verification and decryption of BIM file ciphertext comprises the following steps:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key Pi to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending BIM file binary expression to the user client;
in a preferred embodiment, the user client receives a false alarm of the file, and optionally complains to the platform or communicates with the file uploading user;
in another preferred embodiment, the user client receives a binary representation of the BIM file, opened using the corresponding BIM file format; it can be understood that, in order to prevent the account from being stolen, the downloaded BIM file needs to be protected; specifically, the protection for the downloaded BIM file includes the following steps:
step Z1: when a user closes a client, the public key Pj is used for compressing and encrypting the decrypted BIM file;
step Z2: when a user opens a client, all the downloaded BIM files are compressed and encrypted; when a user needs to open the BIM file, the user needs to pass through the identity verification of the private key Kj; after the identity verification is passed, decrypting the encrypted BIM file by using the obtained private key Kj to obtain a BIM file plaintext;
decompressing the obtained BIM file plaintext to obtain a BIM file;
step Z3: marking the decrypted BIM file as the decrypted BIM file, and repeating the steps Z1 and Z2.
As shown in fig. 2, the data security authentication method based on BIM specifically includes the following steps:
step one: the user registers an account through the client and distributes a group of public and private keys;
step two: the user obtains the BIM file ciphertext by acquiring the identity verification of the private key and encrypting the compressed BIM file to be uploaded by using the private key; encrypting the BIM file to be uploaded through the Hash function to obtain a Hash digest ciphertext;
step three: uploading the BIM file ciphertext and the hash digest ciphertext to a data storage module;
step four: the user passes the authority verification of the downloaded BIM file, obtains the address of the BIM file to be downloaded in the data storage module, and downloads the ciphertext of the BIM file and the ciphertext of the hash digest;
step five: the client sends the downloaded BIM file ciphertext and the hash digest ciphertext to a BIM file decryption module, and verifies and decrypts the BIM file ciphertext;
step six: and when the client is closed, the decrypted BIM file is encrypted by using a public key, so that the BIM file is protected.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.
Claims (5)
1. BIM-based data security authentication system, characterized by comprising: the system comprises a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; wherein, each module is connected with each other by a wireless network and/or electrically;
the client is used for registering and logging in the user and communicating with the management background;
the management background stores the user login information in the data storage module;
after each user registers an account successfully, the management background generates a group of public and private keys for the user; the method comprises the steps that a management background sends a public key to a client, the management background carries out limited receiving management on a private key, and the limited receiving of the private key by the management background comprises the steps of setting additional password protection and/or setting additional face recognition and/or fingerprint recognition protection;
the additional password protection is that before receiving the private key, firstly filling in an access password, and if and only if the filled access password is the same as a preset access password, the management background sends the private key to the client; the access password set in advance is a password which is set by a user, is different from a login password and consists of numbers, english letters and characters;
the additional face recognition and/or fingerprint recognition protection is set, namely, before the private key is received, the face recognition and/or fingerprint recognition is needed to be performed through the preset face recognition and/or fingerprint recognition; after the user is identified by face recognition and/or fingerprint recognition, the management background sends the private key to the client;
the user sends the BIM file title, the uploading user, the BIM file and the private key Ki to be uploaded to a BIM file uploading module through the client;
the BIM file uploading module is used for uploading BIM files by a user;
wherein, the user uploads the BIM file comprising the following steps:
s1, acquiring a private key from a management background;
step S2: converting binary expressions of BIM files into Hash digests by using a Hash function;
step S3: compressing the BIM file by using a lossless compression algorithm;
step S4: encrypting the hash digest by using the private key to obtain a hash digest ciphertext;
step S5: encrypting the compressed BIM file by using a private key to obtain a BIM file ciphertext;
step S6: transmitting the BIM file title, the uploading person, the hash digest ciphertext and the BIM file ciphertext to a data storage module;
the data storage module sends a file title and an uploading person to a management background after receiving the hash digest ciphertext and the BIM file ciphertext; the management background displays file titles and uploaders to other users;
before a user downloads a BIM file, the user needs to perform one-time authority verification;
after the user who waits to download the BIM file passes the authority verification, downloading the BIM file ciphertext and the hash digest ciphertext from the data storage module to the local client, and uploading the BIM file ciphertext and the hash digest ciphertext to the BIM file decryption module; the client sends the public key of the BIM file uploading user and the public key of the BIM file user to be downloaded to the BIM file decryption module;
the BIM file decryption module is used for verifying the file and decrypting the ciphertext of the BIM file; and protecting the downloaded BIM file, including:
step Z1: when a user closes a client, the public key is used for compressing and encrypting the decrypted BIM file;
step Z2: when a user opens a client, all the downloaded BIM files are compressed and encrypted; when a user needs to open the BIM file, the user needs to pass through the identity verification of the private key; after the identity verification is passed, decrypting the encrypted BIM file by using the obtained private key to obtain a BIM file plaintext;
decompressing the obtained BIM file plaintext to obtain a BIM file;
step Z3: marking the decrypted BIM file as the decrypted BIM file, and repeating the steps Z1 and Z2.
2. The BIM-based data security authentication system of claim 1, wherein the client registration account method provides a user with a user name, a login password, and/or a face recognition registration.
3. The BIM-based data security authentication system of claim 1, wherein the rights verification is purchasing and/or offline communication and/or entry of an access password.
4. The BIM-based data security authentication system of claim 1, wherein the file verification and decryption of BIM file ciphertext includes the steps of:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending the binary expression of the BIM file to the user client.
5. The BIM-based data security authentication method is characterized by comprising the following steps of:
step one: the user registers an account through the client and distributes a group of public and private keys;
step two: the user obtains the BIM file ciphertext by acquiring the identity verification of the private key and encrypting the compressed BIM file to be uploaded by using the private key; encrypting the BIM file to be uploaded through the Hash function to obtain a Hash digest ciphertext;
step three: uploading the BIM file ciphertext and the hash digest ciphertext to a data storage module;
step four: the user passes the authority verification of the downloaded BIM file, obtains the address of the BIM file to be downloaded in the data storage module, and downloads the ciphertext of the BIM file and the ciphertext of the hash digest;
step five: the client sends the downloaded BIM file ciphertext and the hash digest ciphertext to a BIM file decryption module, and verifies and decrypts the BIM file ciphertext, and the process comprises the following steps:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending BIM file binary expression to the user client;
step six: and when the client is closed, the decrypted BIM file is encrypted by using a public key, so that the BIM file is protected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210449923.XA CN114978525B (en) | 2022-04-26 | 2022-04-26 | BIM-based data security authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210449923.XA CN114978525B (en) | 2022-04-26 | 2022-04-26 | BIM-based data security authentication method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114978525A CN114978525A (en) | 2022-08-30 |
CN114978525B true CN114978525B (en) | 2023-10-13 |
Family
ID=82978774
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210449923.XA Active CN114978525B (en) | 2022-04-26 | 2022-04-26 | BIM-based data security authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114978525B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117235812A (en) * | 2023-10-10 | 2023-12-15 | 重庆城投曙光湖建设有限公司 | System for realizing big data security by using BIM |
CN117371048B (en) * | 2023-12-08 | 2024-03-29 | 深圳市研盛芯控电子技术有限公司 | Remote access data processing method, device, equipment and storage medium |
CN117852004B (en) * | 2024-03-07 | 2024-05-28 | 中建三局集团华南有限公司 | Modeling method, device and equipment for building curtain wall and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072134A (en) * | 2015-08-31 | 2015-11-18 | 成都卫士通信息产业股份有限公司 | Cloud disk system file secure transmission method based on three-level key |
CN107666389A (en) * | 2017-09-16 | 2018-02-06 | 杭州弼木建筑科技有限公司 | A kind of structural strengthening model lightweight secrecy system based on BIM |
CN108650210A (en) * | 2018-03-14 | 2018-10-12 | 深圳市中易通安全芯科技有限公司 | A kind of Verification System and method |
CN108804768A (en) * | 2018-05-08 | 2018-11-13 | 中建隧道建设有限公司 | One kind making the light-weighted method of BIM models |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016012859A1 (en) * | 2014-07-25 | 2016-01-28 | Snapfile Ltd. | System and method for securely managing integrity-verifiable and authenticable information |
-
2022
- 2022-04-26 CN CN202210449923.XA patent/CN114978525B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072134A (en) * | 2015-08-31 | 2015-11-18 | 成都卫士通信息产业股份有限公司 | Cloud disk system file secure transmission method based on three-level key |
CN107666389A (en) * | 2017-09-16 | 2018-02-06 | 杭州弼木建筑科技有限公司 | A kind of structural strengthening model lightweight secrecy system based on BIM |
CN108650210A (en) * | 2018-03-14 | 2018-10-12 | 深圳市中易通安全芯科技有限公司 | A kind of Verification System and method |
CN108804768A (en) * | 2018-05-08 | 2018-11-13 | 中建隧道建设有限公司 | One kind making the light-weighted method of BIM models |
Also Published As
Publication number | Publication date |
---|---|
CN114978525A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114978525B (en) | BIM-based data security authentication method and system | |
CA2267395C (en) | Method and system for managing keys for encrypted data | |
CN102111274B (en) | A platform and method for establishing provable identities while maintaining privacy | |
CN107147652A (en) | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain | |
JP2000124887A (en) | Enciphering/decoding method for group unit, and method and device for signature | |
CN112732695B (en) | Cloud storage data security deduplication method based on block chain | |
US20080098214A1 (en) | Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media | |
CN107528689B (en) | Password modification method based on Ukey | |
CN101350718A (en) | Method for protecting play content authority range base on user identification module | |
CN112906056A (en) | Cloud storage key security management method based on block chain | |
CN114267100A (en) | Unlocking authentication method and device, security chip and electronic key management system | |
CN111625800A (en) | Digital identity authentication method and system based on in-vivo detection | |
CN114205090A (en) | Safe file sharing method and system based on state cryptographic algorithm | |
CN113079177B (en) | Remote sensing data sharing method based on time and decryption frequency limitation | |
CN111597521B (en) | Method and system for safely processing data of mobile terminal of transformer substation | |
JP3724071B2 (en) | Electronic signature method | |
JP4350961B2 (en) | Data processing device | |
CN112507355B (en) | Personal health data storage system based on block chain | |
CN115021927A (en) | Cipher machine cluster-oriented administrator identity control method and system | |
CN114244635A (en) | Encryption type data coding method of communication equipment | |
CN114928469A (en) | IDaaS system for access control based on mutual authentication mechanism | |
TW201843613A (en) | Personal identity authentication method and system using graphic lock capable of ensuring a high-security identity authentication | |
CN108235807B (en) | Software encryption terminal, payment terminal, software package encryption and decryption method and system | |
CN117852008B (en) | Electronic evidence storage and sharing method, system, equipment and readable storage medium based on lattice proxy re-encryption of biological characteristics | |
CN100546242C (en) | A kind of generation of super code and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230906 Address after: 518000, 1002, 10th Floor, Building A, Chuanglingtong Technology Building, Shihua Road, Fubao Community, Futian District, Shenzhen City, Guangdong Province Applicant after: Shenzhu City Technology (Shenzhen) Co.,Ltd. Address before: 10th Floor, Huimei Park Street, Xintang Town, Zengcheng, Guangzhou City, Guangdong Province, 511338 Applicant before: Zou Hanting |
|
GR01 | Patent grant | ||
GR01 | Patent grant |