CN114978525B - BIM-based data security authentication method and system - Google Patents

BIM-based data security authentication method and system Download PDF

Info

Publication number
CN114978525B
CN114978525B CN202210449923.XA CN202210449923A CN114978525B CN 114978525 B CN114978525 B CN 114978525B CN 202210449923 A CN202210449923 A CN 202210449923A CN 114978525 B CN114978525 B CN 114978525B
Authority
CN
China
Prior art keywords
bim
file
bim file
user
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210449923.XA
Other languages
Chinese (zh)
Other versions
CN114978525A (en
Inventor
邹瀚霆
黄永强
郭超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhu City Technology Shenzhen Co ltd
Original Assignee
Shenzhu City Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhu City Technology Shenzhen Co ltd filed Critical Shenzhu City Technology Shenzhen Co ltd
Priority to CN202210449923.XA priority Critical patent/CN114978525B/en
Publication of CN114978525A publication Critical patent/CN114978525A/en
Application granted granted Critical
Publication of CN114978525B publication Critical patent/CN114978525B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a BIM-based data security authentication method and system, which relate to the technical field of data security authentication and comprise a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; the problems of BIM file theft caused by overlong encryption and decryption time, identity verification of a file sender and account theft are solved by firstly compressing and then encrypting the BIM file, generating a Hash abstract of the BIM file by using a Hash function and performing authority control on access of a private key.

Description

BIM-based data security authentication method and system
Technical Field
The invention belongs to the field of data security, relates to a data encryption technology, and in particular relates to a BIM-based data security authentication method and system.
Background
The building information model (Building Information Modeling) is a new tool for architecture, engineering and civil engineering. The term building information model or building information model is created by Autodesk. It is a computer aided design mainly based on three-dimensional graphics, object-oriented and architecture-related. The building information model file is used as a professional file, and the risk of being stolen exists in the uploading platform and the downloading process, so that the building information model file needs to be subjected to data security authentication;
in the existing data security authentication technology for BIM files, the following problems exist in most cases:
1. the problem that the general BIM file is relatively large is not considered, so that a great amount of time is required in the encryption and decryption process;
2. the problem of identity verification is not considered, namely the possibility that the downloaded BIM file is pirated exists;
3. the possibility of theft of the user account is not considered, so that the previously downloaded BIM file can be opened, and the BIM file is stolen;
therefore, a BIM-based data security authentication method and system are provided.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the invention provides a BIM-based data security authentication method and a BIM-based data security authentication system, which solve the problems of BIM file theft caused by overlong encryption and decryption time, authentication of a file sender and account theft by compressing and then encrypting the BIM file and generating a Hash digest of the BIM file by using a Hash function and performing authority control on access of a private key.
To achieve the above objective, according to an embodiment of the first aspect of the present invention, a method and a system for secure authentication of BIM-based data are provided, wherein the method comprises a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; wherein, each module is connected with each other by a wireless network and/or electrically;
the client is mainly used for registering and logging in of the user and communicating with the management background;
the user registers an account through a client; the management background stores the user login information in the data storage module;
after each user registers an account successfully, the management background generates a group of public and private keys for the user; marking the public key as Pi and the private key as Ki; wherein i represents a user; the management background sends the public key Pi to the client, and the private key Ki is limited in receiving; after the user passes the authority authentication of the received private key Ki, the management background sends the private key Ki to the client;
the user sends the BIM file title, the uploading user, the BIM file and the private key Ki to be uploaded to a BIM file uploading module through the client;
the BIM file uploading module is mainly used for providing a function of uploading BIM files for users;
specifically, the uploading the BIM file includes the following steps:
step S1, a private key Ki is obtained from a management background;
step S2: converting binary expressions of BIM files into Hash digests by using a Hash function; the Hash function comprises MD5 and SHA-1, and the Hash digest is a Hash value with 160 or 256 bits of fixed length by using the Hash function;
step S3: compressing the BIM file by using a lossless compression algorithm, wherein the lossless compression algorithm comprises a Huffman compression algorithm and a geometric coding algorithm;
step S4: encrypting the hash digest by using a private key Ki to obtain a hash digest ciphertext;
step S5: encrypting the compressed BIM file by using a private key Ki to obtain a BIM file ciphertext;
step S6: transmitting the BIM file title, the uploading person, the hash digest ciphertext and the BIM file ciphertext to a data storage module;
the data storage module sends a file title and an uploading person to a management background after receiving the hash digest ciphertext and the BIM file ciphertext; the management background sends the file title and the uploading user to the client of each user and displays the file title and the uploading user to the user;
before a user downloads a BIM file, the user needs to perform one-time authority verification;
after the user who is to download the BIM file passes the authority verification, the client held by the BIM file uploading user sends the public key Pi to the user; marking public and private keys of users to be downloaded with BIM files as Pj and Kj respectively;
after passing the authority verification, the management background sends the address of the file to be downloaded in the data storage module to the user client, and the user client downloads the BIM file ciphertext and the hash digest ciphertext from the address to the local client and then uploads the BIM file ciphertext to the BIM file decryption module; further, the client sends the public key Pi and the public key Pj to the BIM file decryption module;
the BIM file decryption module is mainly used for file verification and decryption of BIM file ciphertext; the file verification and decryption of BIM file ciphertext comprises the following steps:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key Pi to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending BIM file binary expression to the user client;
in another preferred embodiment, the user client receives a binary representation of the BIM file, opened using the corresponding BIM file format; it can be understood that, in order to prevent the account from being stolen, the downloaded BIM file needs to be protected;
compared with the prior art, the invention has the beneficial effects that:
1. the method reduces the encryption and decryption time of the BIM file by compressing and then encrypting the BIM;
2. the invention solves the problem that the downloaded BIM file is stolen due to the theft of the account number by performing access protection on the private key.
Drawings
FIG. 1 is a schematic diagram of the present invention;
fig. 2 is a flow chart of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the BIM-based data security authentication system includes a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; wherein, each module is connected with each other by a wireless network and/or electrically;
the client is mainly used for registering and logging in of the user and communicating with the management background;
it can be appreciated that a user first registers an account through a client; the method of registering account numbers can be to provide user names, login passwords and/or face recognition registration; the management background stores the user login information in the data storage module;
after each user registers an account successfully, the management background generates a group of public and private keys for the user; marking the public key as Pi and the private key as Ki; wherein i represents a user; the management background sends the public key Pi to the client, and the private key Ki is limited in receiving;
in a preferred embodiment, the user's access to the private key Ki sets an additional password protection; firstly filling an access password before receiving a private key Ki, and if and only if the filled access password is the same as a preset access password, sending the private key Ki to a client by a management background; the access password set in advance is a password which is set by a user, is different from a login password and consists of numbers, english letters and characters;
in a further preferred embodiment, the user's access to the private key Ki is provided with an additional face recognition and/or fingerprint recognition protection; firstly, before receiving a private key Ki, the user needs to identify face and/or fingerprint through preset face recognition and/or fingerprint recognition; after the user is identified by face recognition and/or fingerprint recognition, the management background sends the private key Ki to the client;
the user sends the BIM file title, the uploading user, the BIM file and the private key Ki to be uploaded to a BIM file uploading module through the client;
the BIM file uploading module is mainly used for providing a function of uploading BIM files for users;
specifically, the uploading the BIM file includes the following steps:
step S1, a private key Ki is obtained from a management background;
step S2: converting binary expressions of BIM files into Hash digests by using a Hash function; the Hash function comprises MD5 and SHA-1, and the Hash digest is a Hash value with 160 or 256 bits of fixed length by using the Hash function;
step S3: compressing the BIM file by using a lossless compression algorithm, wherein the lossless compression algorithm comprises a Huffman compression algorithm and a geometric coding algorithm;
step S4: encrypting the hash digest by using a private key Ki to obtain a hash digest ciphertext;
step S5: encrypting the compressed BIM file by using a private key Ki to obtain a BIM file ciphertext;
step S6: transmitting the BIM file title, the uploading person, the hash digest ciphertext and the BIM file ciphertext to a data storage module;
the data storage module sends a file title and an uploading person to a management background after receiving the hash digest ciphertext and the BIM file ciphertext; the management background sends the file title and the uploading user to the client of each user and displays the file title and the uploading user to the user;
before a user downloads a BIM file, the user needs to perform one-time authority verification; in a specific embodiment, the authority verification may be purchase, offline communication, entry of an access password, etc.;
after the user who is to download the BIM file passes the authority verification, the client held by the BIM file uploading user sends the public key Pi to the user; marking public and private keys of users to be downloaded with BIM files as Pj and Kj respectively;
after passing the authority verification, the management background sends the address of the file to be downloaded in the data storage module to the user client, and the user client downloads the BIM file ciphertext and the hash digest ciphertext from the address to the local client and then uploads the BIM file ciphertext to the BIM file decryption module; further, the client sends the public key Pi and the public key Pj to the BIM file decryption module;
the BIM file decryption module is mainly used for file verification and decryption of BIM file ciphertext; the file verification and decryption of BIM file ciphertext comprises the following steps:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key Pi to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending BIM file binary expression to the user client;
in a preferred embodiment, the user client receives a false alarm of the file, and optionally complains to the platform or communicates with the file uploading user;
in another preferred embodiment, the user client receives a binary representation of the BIM file, opened using the corresponding BIM file format; it can be understood that, in order to prevent the account from being stolen, the downloaded BIM file needs to be protected; specifically, the protection for the downloaded BIM file includes the following steps:
step Z1: when a user closes a client, the public key Pj is used for compressing and encrypting the decrypted BIM file;
step Z2: when a user opens a client, all the downloaded BIM files are compressed and encrypted; when a user needs to open the BIM file, the user needs to pass through the identity verification of the private key Kj; after the identity verification is passed, decrypting the encrypted BIM file by using the obtained private key Kj to obtain a BIM file plaintext;
decompressing the obtained BIM file plaintext to obtain a BIM file;
step Z3: marking the decrypted BIM file as the decrypted BIM file, and repeating the steps Z1 and Z2.
As shown in fig. 2, the data security authentication method based on BIM specifically includes the following steps:
step one: the user registers an account through the client and distributes a group of public and private keys;
step two: the user obtains the BIM file ciphertext by acquiring the identity verification of the private key and encrypting the compressed BIM file to be uploaded by using the private key; encrypting the BIM file to be uploaded through the Hash function to obtain a Hash digest ciphertext;
step three: uploading the BIM file ciphertext and the hash digest ciphertext to a data storage module;
step four: the user passes the authority verification of the downloaded BIM file, obtains the address of the BIM file to be downloaded in the data storage module, and downloads the ciphertext of the BIM file and the ciphertext of the hash digest;
step five: the client sends the downloaded BIM file ciphertext and the hash digest ciphertext to a BIM file decryption module, and verifies and decrypts the BIM file ciphertext;
step six: and when the client is closed, the decrypted BIM file is encrypted by using a public key, so that the BIM file is protected.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.

Claims (5)

1. BIM-based data security authentication system, characterized by comprising: the system comprises a client, a data storage module, a management background, a BIM file uploading module and a BIM file decrypting module; wherein, each module is connected with each other by a wireless network and/or electrically;
the client is used for registering and logging in the user and communicating with the management background;
the management background stores the user login information in the data storage module;
after each user registers an account successfully, the management background generates a group of public and private keys for the user; the method comprises the steps that a management background sends a public key to a client, the management background carries out limited receiving management on a private key, and the limited receiving of the private key by the management background comprises the steps of setting additional password protection and/or setting additional face recognition and/or fingerprint recognition protection;
the additional password protection is that before receiving the private key, firstly filling in an access password, and if and only if the filled access password is the same as a preset access password, the management background sends the private key to the client; the access password set in advance is a password which is set by a user, is different from a login password and consists of numbers, english letters and characters;
the additional face recognition and/or fingerprint recognition protection is set, namely, before the private key is received, the face recognition and/or fingerprint recognition is needed to be performed through the preset face recognition and/or fingerprint recognition; after the user is identified by face recognition and/or fingerprint recognition, the management background sends the private key to the client;
the user sends the BIM file title, the uploading user, the BIM file and the private key Ki to be uploaded to a BIM file uploading module through the client;
the BIM file uploading module is used for uploading BIM files by a user;
wherein, the user uploads the BIM file comprising the following steps:
s1, acquiring a private key from a management background;
step S2: converting binary expressions of BIM files into Hash digests by using a Hash function;
step S3: compressing the BIM file by using a lossless compression algorithm;
step S4: encrypting the hash digest by using the private key to obtain a hash digest ciphertext;
step S5: encrypting the compressed BIM file by using a private key to obtain a BIM file ciphertext;
step S6: transmitting the BIM file title, the uploading person, the hash digest ciphertext and the BIM file ciphertext to a data storage module;
the data storage module sends a file title and an uploading person to a management background after receiving the hash digest ciphertext and the BIM file ciphertext; the management background displays file titles and uploaders to other users;
before a user downloads a BIM file, the user needs to perform one-time authority verification;
after the user who waits to download the BIM file passes the authority verification, downloading the BIM file ciphertext and the hash digest ciphertext from the data storage module to the local client, and uploading the BIM file ciphertext and the hash digest ciphertext to the BIM file decryption module; the client sends the public key of the BIM file uploading user and the public key of the BIM file user to be downloaded to the BIM file decryption module;
the BIM file decryption module is used for verifying the file and decrypting the ciphertext of the BIM file; and protecting the downloaded BIM file, including:
step Z1: when a user closes a client, the public key is used for compressing and encrypting the decrypted BIM file;
step Z2: when a user opens a client, all the downloaded BIM files are compressed and encrypted; when a user needs to open the BIM file, the user needs to pass through the identity verification of the private key; after the identity verification is passed, decrypting the encrypted BIM file by using the obtained private key to obtain a BIM file plaintext;
decompressing the obtained BIM file plaintext to obtain a BIM file;
step Z3: marking the decrypted BIM file as the decrypted BIM file, and repeating the steps Z1 and Z2.
2. The BIM-based data security authentication system of claim 1, wherein the client registration account method provides a user with a user name, a login password, and/or a face recognition registration.
3. The BIM-based data security authentication system of claim 1, wherein the rights verification is purchasing and/or offline communication and/or entry of an access password.
4. The BIM-based data security authentication system of claim 1, wherein the file verification and decryption of BIM file ciphertext includes the steps of:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending the binary expression of the BIM file to the user client.
5. The BIM-based data security authentication method is characterized by comprising the following steps of:
step one: the user registers an account through the client and distributes a group of public and private keys;
step two: the user obtains the BIM file ciphertext by acquiring the identity verification of the private key and encrypting the compressed BIM file to be uploaded by using the private key; encrypting the BIM file to be uploaded through the Hash function to obtain a Hash digest ciphertext;
step three: uploading the BIM file ciphertext and the hash digest ciphertext to a data storage module;
step four: the user passes the authority verification of the downloaded BIM file, obtains the address of the BIM file to be downloaded in the data storage module, and downloads the ciphertext of the BIM file and the ciphertext of the hash digest;
step five: the client sends the downloaded BIM file ciphertext and the hash digest ciphertext to a BIM file decryption module, and verifies and decrypts the BIM file ciphertext, and the process comprises the following steps:
step Q1: decrypting the BIM file ciphertext and the hash digest ciphertext by using the public key to obtain a BIM file plaintext and a hash digest;
step Q2: decompressing the plaintext of the BIM file by using a decompression algorithm corresponding to the compressed BIM file to obtain binary expression of the BIM file;
step Q3: converting binary expressions of BIM files by using a hash function; the hash function is the same as the hash function used in the process of obtaining the hash abstract; comparing the converted result with the hash abstract obtained in the step Q1, and if the difference exists, sending a false warning of the file to the user client; otherwise, sending BIM file binary expression to the user client;
step six: and when the client is closed, the decrypted BIM file is encrypted by using a public key, so that the BIM file is protected.
CN202210449923.XA 2022-04-26 2022-04-26 BIM-based data security authentication method and system Active CN114978525B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210449923.XA CN114978525B (en) 2022-04-26 2022-04-26 BIM-based data security authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210449923.XA CN114978525B (en) 2022-04-26 2022-04-26 BIM-based data security authentication method and system

Publications (2)

Publication Number Publication Date
CN114978525A CN114978525A (en) 2022-08-30
CN114978525B true CN114978525B (en) 2023-10-13

Family

ID=82978774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210449923.XA Active CN114978525B (en) 2022-04-26 2022-04-26 BIM-based data security authentication method and system

Country Status (1)

Country Link
CN (1) CN114978525B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117235812A (en) * 2023-10-10 2023-12-15 重庆城投曙光湖建设有限公司 System for realizing big data security by using BIM
CN117371048B (en) * 2023-12-08 2024-03-29 深圳市研盛芯控电子技术有限公司 Remote access data processing method, device, equipment and storage medium
CN117852004B (en) * 2024-03-07 2024-05-28 中建三局集团华南有限公司 Modeling method, device and equipment for building curtain wall and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072134A (en) * 2015-08-31 2015-11-18 成都卫士通信息产业股份有限公司 Cloud disk system file secure transmission method based on three-level key
CN107666389A (en) * 2017-09-16 2018-02-06 杭州弼木建筑科技有限公司 A kind of structural strengthening model lightweight secrecy system based on BIM
CN108650210A (en) * 2018-03-14 2018-10-12 深圳市中易通安全芯科技有限公司 A kind of Verification System and method
CN108804768A (en) * 2018-05-08 2018-11-13 中建隧道建设有限公司 One kind making the light-weighted method of BIM models

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016012859A1 (en) * 2014-07-25 2016-01-28 Snapfile Ltd. System and method for securely managing integrity-verifiable and authenticable information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072134A (en) * 2015-08-31 2015-11-18 成都卫士通信息产业股份有限公司 Cloud disk system file secure transmission method based on three-level key
CN107666389A (en) * 2017-09-16 2018-02-06 杭州弼木建筑科技有限公司 A kind of structural strengthening model lightweight secrecy system based on BIM
CN108650210A (en) * 2018-03-14 2018-10-12 深圳市中易通安全芯科技有限公司 A kind of Verification System and method
CN108804768A (en) * 2018-05-08 2018-11-13 中建隧道建设有限公司 One kind making the light-weighted method of BIM models

Also Published As

Publication number Publication date
CN114978525A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN114978525B (en) BIM-based data security authentication method and system
CA2267395C (en) Method and system for managing keys for encrypted data
CN102111274B (en) A platform and method for establishing provable identities while maintaining privacy
CN107147652A (en) A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
JP2000124887A (en) Enciphering/decoding method for group unit, and method and device for signature
CN112732695B (en) Cloud storage data security deduplication method based on block chain
US20080098214A1 (en) Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media
CN107528689B (en) Password modification method based on Ukey
CN101350718A (en) Method for protecting play content authority range base on user identification module
CN112906056A (en) Cloud storage key security management method based on block chain
CN114267100A (en) Unlocking authentication method and device, security chip and electronic key management system
CN111625800A (en) Digital identity authentication method and system based on in-vivo detection
CN114205090A (en) Safe file sharing method and system based on state cryptographic algorithm
CN113079177B (en) Remote sensing data sharing method based on time and decryption frequency limitation
CN111597521B (en) Method and system for safely processing data of mobile terminal of transformer substation
JP3724071B2 (en) Electronic signature method
JP4350961B2 (en) Data processing device
CN112507355B (en) Personal health data storage system based on block chain
CN115021927A (en) Cipher machine cluster-oriented administrator identity control method and system
CN114244635A (en) Encryption type data coding method of communication equipment
CN114928469A (en) IDaaS system for access control based on mutual authentication mechanism
TW201843613A (en) Personal identity authentication method and system using graphic lock capable of ensuring a high-security identity authentication
CN108235807B (en) Software encryption terminal, payment terminal, software package encryption and decryption method and system
CN117852008B (en) Electronic evidence storage and sharing method, system, equipment and readable storage medium based on lattice proxy re-encryption of biological characteristics
CN100546242C (en) A kind of generation of super code and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230906

Address after: 518000, 1002, 10th Floor, Building A, Chuanglingtong Technology Building, Shihua Road, Fubao Community, Futian District, Shenzhen City, Guangdong Province

Applicant after: Shenzhu City Technology (Shenzhen) Co.,Ltd.

Address before: 10th Floor, Huimei Park Street, Xintang Town, Zengcheng, Guangzhou City, Guangdong Province, 511338

Applicant before: Zou Hanting

GR01 Patent grant
GR01 Patent grant