CN115577568A - Method, device and storage medium for determining operation authority of simulation model - Google Patents

Method, device and storage medium for determining operation authority of simulation model Download PDF

Info

Publication number
CN115577568A
CN115577568A CN202211438803.6A CN202211438803A CN115577568A CN 115577568 A CN115577568 A CN 115577568A CN 202211438803 A CN202211438803 A CN 202211438803A CN 115577568 A CN115577568 A CN 115577568A
Authority
CN
China
Prior art keywords
encryption
simulation model
model
statement
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211438803.6A
Other languages
Chinese (zh)
Other versions
CN115577568B (en
Inventor
程旭
李旭
王妍
李丹丹
梅俊宇
张强
张聪聪
蒋荣
张鹏
侯庆坤
何绍清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sinotruk Data Co ltd
China Automotive Technology and Research Center Co Ltd
Original Assignee
Sinotruk Data Co ltd
China Automotive Technology and Research Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sinotruk Data Co ltd, China Automotive Technology and Research Center Co Ltd filed Critical Sinotruk Data Co ltd
Priority to CN202211438803.6A priority Critical patent/CN115577568B/en
Publication of CN115577568A publication Critical patent/CN115577568A/en
Application granted granted Critical
Publication of CN115577568B publication Critical patent/CN115577568B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Geometry (AREA)
  • Evolutionary Computation (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of electric digital data processing, and discloses a method, equipment and a storage medium for determining operation authority of a simulation model. The method comprises the following steps: the method comprises the steps of determining an encryption statement of each simulation model in a target source code file by obtaining a target source code file corresponding to a simulation model library, further determining an encryption value corresponding to each encryption attribute of each simulation model based on the encryption statement, and obtaining a use authority corresponding to each user operation function of the simulation model through the encryption value corresponding to each encryption attribute, thereby realizing the determination of each operation authority of each simulation model, solving the problem that the user use is greatly limited by the integral encryption of the model in the prior art, and solving the safety problems of model embezzlement, technical disclosure and the like existing when the model is not encrypted; corresponding use permission can be determined for different users, various scene requirements are met, and the method has good extensibility.

Description

Method, device and storage medium for determining operation authority of simulation model
Technical Field
The invention relates to the field of electric digital data processing, in particular to a method, equipment and a storage medium for determining operation authority of a simulation model.
Background
The model simulation is widely applied to the fields of automobiles, fuel, battery industries and the like. The source code file of the simulation model library has high requirements on the visibility and the usability of the model or the calculation and the confidentiality of the core technology under the scenes of demonstration trial, sales, cooperative research and development and the like.
The traditional solution scheme that has now can only carry out whole encryption to simulation model or source code file, if carry out whole encryption, can make user in use receive a great deal of restriction, and then cause user experience poor, be unfavorable for technical popularization and model sale, if do not carry out whole encryption, just there is the model to steal, core technology leaks the scheduling problem.
In view of the above, the present invention is particularly proposed.
Disclosure of Invention
In order to solve the technical problems, the invention provides a method, equipment and a storage medium for determining the operation authority of a simulation model, so that the determination of each operation authority of the simulation model is realized, the problem that the use of a user is greatly limited due to the integral encryption of the model in the prior art is solved, and the safety problems of model embezzlement, technology leakage and the like existing in the case of not encrypting the model are solved.
The embodiment of the invention provides a method for determining operation authority of a simulation model, which comprises the following steps:
acquiring a target source code file corresponding to a simulation model library, wherein the simulation model library comprises various simulation models;
determining an encryption statement of each simulation model in the target source code file, and determining an encryption value corresponding to each encryption attribute of each simulation model based on the encryption statement for each simulation model;
and determining the use permission corresponding to each user operation function of the simulation model based on the encryption value corresponding to each encryption attribute.
An embodiment of the present invention provides an electronic device, including:
a processor and a memory;
the processor is used for executing the steps of the operation authority determination method of the simulation model according to any embodiment by calling the program or the instruction stored in the memory.
Embodiments of the present invention provide a computer-readable storage medium, which stores a program or instructions, where the program or instructions cause a computer to execute steps of a method for determining operation permissions of a simulation model according to any embodiment.
The embodiment of the invention has the following technical effects:
the method comprises the steps of determining an encryption statement of each simulation model in a target source code file by obtaining a target source code file corresponding to a simulation model library, further determining an encryption value corresponding to each encryption attribute of each simulation model based on the encryption statement, and obtaining a use authority corresponding to each user operation function of the simulation model through the encryption value corresponding to each encryption attribute, thereby realizing the determination of each operation authority of each simulation model, solving the problem that the user use is greatly limited by the integral encryption of the model in the prior art, and solving the safety problems of model embezzlement, technical disclosure and the like existing when the model is not encrypted; corresponding use permission can be determined for different users, various scene requirements are met, and the method has good extensibility.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flowchart of a method for determining operation authority of a simulation model according to an embodiment of the present invention;
FIG. 2 is a flowchart of another method for determining operation authority of a simulation model according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below. It is to be understood that the disclosed embodiments are merely exemplary of the invention, and are not intended to be exhaustive or exhaustive. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The method for determining the operation authority of the simulation model provided by the embodiment of the invention is mainly suitable for determining the condition of each operation authority of each simulation model in the simulation model library by a user. The operation authority determining method of the simulation model provided by the embodiment of the invention can be executed by electronic equipment integrated in a computer or a server.
Before describing the operation authority determining method of the simulation model provided by the embodiment of the present invention in detail, the technical problem solved by the operation authority determining method of the simulation model provided by the embodiment of the present invention will be described.
The traditional simulation model encryption method generally adopts a model integral encryption mode, and mainly comprises the following two modes: 1. the file is encrypted, so that a user cannot perform any operation on the model and only can solve the operation, the cognition and understanding of the user on the model are greatly limited, parameters cannot be calculated in a trial mode, the model cannot be adjusted to be tested deeply, and the model cannot be improved and recombined; 2. and model encryption, including means of code obfuscation, secondary packaging and the like. Thus, although the leakage of the core technology can be prevented to some extent, there is a risk that the key model is disassembled due to the excessive user authority. Meanwhile, the icon and the embezzlement model can be possibly tampered.
The above conventional solutions can only restrict the access rights of the user, but cannot set restrictions on specific operation functions individually. Once access is allowed, namely all rights are obtained and all functions are available, when access is not allowed, a user cannot perform any operation and cannot meet the requirements of specific scenes such as demonstration trial use, business sales or cooperative research and development.
Therefore, in order to solve the above technical problem, an embodiment of the present invention provides a method for determining operation permissions of a simulation model, which can determine each operation permission of each simulation model in a simulation model library. Corresponding use permission can be determined for different users, various scene requirements are met, and the method has good extensibility.
For example, in a scene of providing demonstration and trial for a user, the method can cancel the use permission of the main functions, so that the user can view the model and solve the model, and can have comprehensive understanding and comprehension on the model library architecture, and the core technology (source code, view and the like) has no leakage risk. Under the scene of selling and popularizing the simulation model library, the method can set the use permission of the specific function as authorized encryption so as to dynamically adjust the use permission of each function of the model in real time according to the user, time and security level through the network server. Under the scenes of cooperative research and development and secondary development, the method can set the use permission of the necessary functions as the permission of the functions, and the user can decide the encryption strategy of the subsequent model and the calculation example.
Fig. 1 is a flowchart of an operation authority determining method for a simulation model according to an embodiment of the present invention. Referring to fig. 1, the method for determining the operation authority of the simulation model specifically includes:
s110, obtaining a target source code file corresponding to a simulation model library, wherein the simulation model library comprises all simulation models.
In the present embodiment, each simulation model included in the simulation model library may be a vehicle simulation model; such as a simulation model of an autonomous driving system, a simulation model of a vehicle battery, etc. The simulation model may be provided to a user for development, testing, or application.
The target source code file corresponding to the simulation model library may be a file including a model editing statement of each simulation model. Specifically, one simulation model library may correspond to one target source code file, and each simulation model may exist in the form of each folder in the target source code file; where the name of the folder may be the name of the corresponding simulation model.
In this embodiment, the encryption statements of each simulation model may be written into the target source code file in advance, and then the target source code file is issued to the user terminal, and when the user loads the target source code file through the simulation software, the encryption statements therein are read.
Specifically, the simulation software can read the target source code file and decrypt the target source code file into a plaintext for interface operation and solver operation.
S120, determining the encryption sentences of the simulation models in the target source code file, and determining the encryption values corresponding to the encryption attributes of the simulation models based on the encryption sentences for each simulation model.
The encryption statement may be an authority setting statement for each user operation function in each simulation model. For example, when the target source code file is loaded, the simulation software may determine an encryption statement of each simulation model in the target source code file to determine a usage right corresponding to each user operation function under each simulation model.
Specifically, the encryption statements of the simulation models can be determined by positioning each encryption field in the target source code file; or, positioning a custom comment statement in the target source code file, positioning each encrypted field from the custom comment statement, and determining the encrypted statement of each simulation model.
Illustratively, the encryption statement may be: encrypt (encryption attribute = encryption value, … …); the encrypted field may be: encrypt. Alternatively, the encryption statement Encrypt () may also be written into the custom comment statement annotation ().
Specifically, after the encryption statement is located, the encryption value corresponding to each encryption attribute of each simulation model can be determined according to the encryption statement. Wherein each encryption attribute may comprise each user operation function.
Illustratively, the user-operated function may be modifying an icon, modifying source code, modifying a view, modifying a document, or copying a model. Wherein, the modification icon can be an icon style of the user modification simulation model. The modified source code may be source code text of the user-modified simulation model. The modified view may be a user modified simulation model view modeling; the view is canvas which comprises sub-model icons and connecting lines among the sub-model icons, and the sub-model icons and the connecting lines form an integral simulation model. Model replication may be a user copying a simulation model to a new model.
Optionally, the encryption attribute may further include at least one of model hiding property and encryption validation property. The model hiding property can be that the simulation model is invisible to a user, namely the user cannot perform any operation on the simulation model or even see the simulation model, the existence of the simulation model is unknown to the user, but the simulation model can participate in solving operation. The encryption effectiveness can be the model hiding performance of the simulation model and whether the encryption of each user operation function is effective or not.
Illustratively, the cryptographic attributes of the simulation model include a modified Icon (Icon), a modified Source code (Source), a modified view (Canvas), a modified Document (Document), a model copy (ModelCopy), a model hide (ModelHide), and a cryptographic validation (Enabled).
In this embodiment, each encryption attribute may have a corresponding encryption value. The encryption value can be used to represent whether the encryption attribute is encrypted. For example, the encrypted value may be a value corresponding to no encryption, must encryption, or authorized encryption. For example, false indicates no encryption is required, true indicates encryption is required, and License indicates authorized encryption.
Specifically, if the encryption attribute is a user operation function, such as icon modification, source code modification, view modification, document modification or model copying, encryption is not required to indicate that the user operation function is available, that is, the function is allowed to be used, encryption is required to indicate that the user operation function is unavailable, that is, the function is not allowed to be used, authorization encryption indicates that the authority of the user needs to be verified, and whether the user operation function is available is determined according to a verification result.
If the encryption attribute is model hiding, encryption is not needed to indicate that the simulation model is visible, the simulation model is hidden through encryption, authorization encryption indicates that the authority of a user needs to be verified, and whether the simulation model is hidden is judged according to a verification result. If the encryption attribute is encryption effectiveness, encryption is not needed to indicate that encryption of all user operation functions and encryption of model hiding are invalid, encryption is needed to indicate that the encryption of all user operation functions and the encryption of model hiding are effective, authorization encryption indicates that the authority of the user needs to be verified, and whether all encryption is effective is judged according to a verification result.
And S130, determining the use permission corresponding to each user operation function of the simulation model based on the encryption value corresponding to each encryption attribute.
Specifically, if each encryption attribute of the simulation model only includes each user operation function, the usage permission corresponding to each user operation function under the simulation model can be determined directly according to the encryption value corresponding to each user operation function.
For example, if the encryption value corresponding to the user operation function indicates that encryption is not required, determining that the use permission corresponding to the user operation function is function permission; if the encryption value corresponding to the user operation function indicates that the encryption is necessary, determining that the use permission corresponding to the user operation function is that the function is not allowed to be used; if the encryption fetching value corresponding to the user operation function is represented as authorized encryption, whether the use permission of the user operation function is allowed to be used by the function can be determined according to the authorization verification result.
It should be noted that, in this embodiment, each encryption attribute of one simulation model may only include modifying an icon, modifying a source code, modifying a view, modifying a document, or copying a model; alternatively, the encryption attributes may also include model hiding and encryption validation.
The purpose of setting model hiding is: the priority of the model hiding performance is higher than that of all user operation functions in the encryption attribute, and under the condition that the use permission corresponding to all the user operation functions is not allowed to be used, the encryption value corresponding to the model hiding performance is set to be encrypted, so that the shielding of all the user operation functions is realized, the encryption values corresponding to all the user operation functions are prevented from being independently set, the simulation software is prevented from reading the encryption value corresponding to each user operation function one by one, and the determination efficiency of each user operation permission is improved while the generation efficiency of the target source code file is improved.
The purpose of setting the validity of encryption is to: the priority of the encryption effectiveness is higher than that of the model hiding performance, under the condition that the use permission corresponding to all the user operation functions is required to be set to be function permission use, the encryption value corresponding to the encryption effectiveness can be set to be not required to be encrypted, the supply of all the user operation functions is realized, the encryption values corresponding to all the user operation functions are prevented from being independently set, the simulation software is also prevented from reading the encryption value corresponding to each user operation function one by one, the generation efficiency of the target source code file is improved, and meanwhile, the determination efficiency of the user operation permission is also improved.
In a specific embodiment, the determining, based on an encryption value corresponding to each encryption attribute, a usage right corresponding to each user operation function of the simulation model includes:
for each simulation model, if the simulation model is determined to be encrypted to be effective based on the encryption value corresponding to the encryption effectiveness, determining whether the simulation model is hidden based on the encryption value corresponding to the model hiding performance; and if not, determining the use permission corresponding to each user operation function based on the encryption value corresponding to each user operation function.
That is, when the encryption value corresponding to the encryption validity is the necessary encryption, it may be determined that the simulation model encryption is valid, and the encryption value corresponding to the model hiding property needs to be further determined, and if the encryption value corresponding to the model hiding property is not the necessary encryption, it may be determined that the simulation model is visible, and further, the usage right corresponding to each user operation function may be determined according to the encryption value corresponding to each user operation function in all the encryption attributes.
In a specific embodiment, the determining, based on the encrypted value corresponding to each user operation function, the usage right corresponding to each user operation function includes at least one of the following:
if the encryption value corresponding to the user operation function is detected to be a value corresponding to the encryption-free state, determining that the use permission corresponding to the user operation function is the function permission;
if the encryption value corresponding to the user operation function is detected to be the value corresponding to the necessary encryption, determining that the use permission corresponding to the user operation function is that the function is not allowed to be used;
and if the encryption value corresponding to the user operation function is detected to be the value corresponding to the authorized encryption, generating an authorized verification request and sending the authorized verification request to the network server, acquiring an authorized verification result fed back by the network server, and determining the use permission corresponding to the user operation function based on the authorized verification result.
The authorization verification request may include information such as user information, current time, simulation model to be verified, and user operation function to be verified. Specifically, the emulation software may generate an authorization verification request to send to the network server upon detecting that the encryption fetch value indicates authorization encryption.
Further, the network server can verify the user information and the current time in the authorization verification request according to the authorized user and the authorization time corresponding to the authorization simulation model in the authorization file, if the user information passes the verification and the current time is within the authorization time, the authorized verification result passing the authorization can be fed back to the simulation software, and then the simulation software can determine that the use permission corresponding to the user operation function is the function permission.
In this embodiment, the advantage of setting the encryption value as authorized encryption is that: the dynamic real-time adjustment of each operation authority of the simulation model can be realized through the network server, and a flexible and free encryption strategy is realized for a user. For example, a consistent target source code file can be issued for all users, encryption values corresponding to encryption attributes under each simulation model of an encryption statement in the target source code file are all set as authorization encryption, authorization files of different users are set in a network server, when the users use a simulation model library through simulation software, an authorization verification result is sent to the network server, and the network server can perform authority verification through the authorization files of the users and feed back the authorization verification result, so that the setting of operation authorities of different users is realized.
By the method, the encryption value corresponding to the encryption effectiveness represents that encryption is necessary, and the encryption value corresponding to the model hiding performance represents that the use authority of each user operation function is determined under the condition that encryption is not needed.
Optionally, determining, based on the encryption value corresponding to each encryption attribute, a usage right corresponding to each user operation function of the simulation model, further including: if the simulation model encryption is determined not to be valid based on the encryption value corresponding to the encryption validity, determining that the use permission corresponding to each user operation function is function permission; or if the simulation model hiding is determined based on the encryption value corresponding to the model hiding property, determining that the use permission corresponding to each user operation function is that the function is not allowed to be used.
That is, when the encryption value corresponding to the encryption validity is not required to be encrypted, it may be determined that the simulation model is invalid to encrypt, and it is not necessary to further determine the encryption values corresponding to other encryption attributes, and it may be considered that the encryption values corresponding to other encryption attributes are not required to be encrypted, and it may be determined that the usage right corresponding to each user operation function is allowed to be used by the function.
Or when the encryption value corresponding to the encryption effectiveness is the necessary encryption and the encryption value corresponding to the model hiding performance is the necessary encryption, the simulation model hiding can be determined, further, the encryption values corresponding to other encryption attributes can be regarded as the necessary encryption, and further, the use permission corresponding to each user operation function can be determined as the function disallowed use.
In the above embodiment, the encryption validity has the highest priority, the model hiding has the high priority, and each user operation function has the normal priority. Through the judgment process of the encryption values of the encryption attributes, the encryption effectiveness can be set to be encrypted, the model hiding performance is set to be not encrypted, and different use permissions of the operation functions of the users can be set.
Moreover, the encryption effectiveness can be set to be not encrypted, so that all user operation functions are provided for the user, the encryption values corresponding to the user operation functions are not required to be set independently, and the number of items in the encryption field is reduced and optimized; and the model hiding performance can be set to be encrypted, all user operation functions of the user can be realized, the encryption value corresponding to each user operation function does not need to be set independently, and the number of items in the encryption field is reduced and optimized. By the method, the generation efficiency of the target source code file can be improved, the memory occupied by the encrypted fields in the target source code file is reduced, and the determination efficiency of the operation permission of each user is improved.
Further, after determining the use permission corresponding to each user operation function under each simulation model, the simulation software can provide the user operation permission allowed by the functions under each simulation model for the user; or shielding the user operation authority which is not allowed to be used by the functions under the simulation models for the user. Specifically, the simulation software encrypts the source code information corresponding to each user operation function according to the use permission corresponding to each user operation function under each simulation model.
In this embodiment, the target source code file may be used as an implementation carrier, and the emulation software may be used as an application carrier, so as to achieve encryption effects of visibility and usability. For example, the following effects may be included: 1. the screen user modifies the user operation function of the icon according to the requirement; 2. shielding the user operation function of modifying the source code by the user according to the requirement; 3. shielding the user operation function of the user modification view according to the requirement; 4. shielding the user operation function of the user for modifying the document according to the requirement; 5. shielding the user operation function of user model copying according to the requirement; 6. opening the hidden function of the user model as required, namely the model is invisible (the five items are limited at the same time); 7. the user encryption validation setting is turned off as required, namely the encryption field is invalid (the above six items are simultaneously limited); 8. the free collocation and the random combination of the encryption attributes are realized according to the requirements so as to meet the requirement coverage of the whole scene; 9. secondary development is supported, and the action range of the encryption strategy is expanded.
The method provided by the embodiment can set the use permission of all the user operation functions in the simulation development, application and popularization processes so as to realize full-function permission coverage; in addition, the use permission of the user operation function under each simulation model can be independently set, and the user operation functions can be freely combined and matched to realize the coverage of the whole scene requirement; the network server dynamically manages in real time, scene requirements are flexibly met, and the core model technology is prevented from being disclosed; the number of entries defined by the encrypted field is greatly reduced by priority.
The embodiment has the following technical effects: the method comprises the steps of determining an encryption statement of each simulation model in a target source code file by obtaining a target source code file corresponding to a simulation model library, further determining an encryption value corresponding to each encryption attribute of each simulation model based on the encryption statement, and obtaining a use authority corresponding to each user operation function of the simulation model through the encryption value corresponding to each encryption attribute, thereby realizing the determination of each operation authority of each simulation model, solving the problem that the user use is greatly limited by the integral encryption of the model in the prior art, and solving the safety problems of model embezzlement, technical disclosure and the like existing when the model is not encrypted; corresponding use permission can be determined for different users, various scene requirements are met, and the method has good extensibility.
Fig. 2 is a flowchart of another method for determining operation permissions of a simulation model according to an embodiment of the present invention. On the basis of the foregoing embodiments, the embodiment of the present invention exemplarily illustrates a process of determining an encryption value corresponding to each encryption attribute of a simulation model according to an encryption statement. Referring to fig. 2, the method for determining the operation authority of the simulation model specifically includes:
s210, obtaining a target source code file corresponding to a simulation model library, wherein the simulation model library comprises all simulation models.
In a specific implementation manner, before obtaining a target source code file corresponding to a simulation model library, the method provided in the embodiment of the present invention further includes: generating a root file encryption statement in response to detecting an encryption setting operation for the root folder, determining a first writing position based on an ending statement of the root folder in the target source code file, and writing the root file encryption statement to the first writing position in the target source code file; and/or generating a model encryption statement corresponding to the simulation model in response to detecting an encryption setting operation for the simulation model in the root folder, determining a second writing position based on an ending statement of the folder corresponding to the simulation model in the target source code file, and writing the model encryption statement into the second writing position in the target source code file.
In the embodiment, each simulation model exists in a target source code file in a folder form; the root folder may be the root folder in the target source code file. Specifically, the user can set an encryption value corresponding to each encryption attribute through the visual interface.
Specifically, if an encryption setting operation for the root folder is detected, a root file encryption statement may be generated, and an end statement of the root folder in the target source code file, such as an end statement beginning with end under the root folder, may be located, and a previous line of the end statement of the root folder may be used as a first write position, so as to write the root file encryption statement into the previous line of the end statement of the root folder, for example, an addition indication (EnCrypt ()) statement is added to the previous line of the end statement under the root folder.
Alternatively, if an encryption setting operation for the simulation model is detected, a model encryption statement corresponding to the simulation model may be generated, and an end statement of a folder corresponding to the simulation model may be located, for example, an end statement beginning with end under the folder corresponding to the simulation model, and a previous line of the end statement of the folder corresponding to the simulation model may be used as the second write position to write the model encryption statement into the previous line of the end statement of the folder, for example, an addition of an indication (EnCrypt ()) statement into the previous line of the end statement of the folder corresponding to the simulation model.
The root file encryption statement or the model encryption statement may be a statement obtained by writing an encryption field in a custom comment statement annotation () in the modelca language. Illustratively, the custom comment statement added with the encrypted field EnCrypt () may be:
annotation (EnCrypt(ModelCopy = true,
Icon = true,
Source = "License0000",
Canvas = true,
Document = true,
ModelHide = true,
Enabled = true
));
more specifically, the custom comment statement that is not written in the encrypted field may be: annotation (A1 = 1, A2 = true, A3 = "3"), B (B1 = 1, B2 = false, B3 = "3")); the custom comment statement written in the encrypted field may be: an (A1 = 1, A2 = true, A3 = "3"), B (B1 = 1, B2 = false, B3 = "3"), enCrypt (Icon = true, source = false, canvas = true, document = false, model copy = true, model hide = "License0001", enabled = true)). Where a () and B () are other custom fields, for example only.
Through the implementation mode, the writing of the root file encryption statement and the model encryption statement of each simulation model is realized. And if the model encryption statement of the simulation model is written into the target source code file, the encryption statement in the target source code file comprises the model encryption statement. The model encryption statement can be used for determining an encryption value corresponding to each encryption attribute under the simulation model corresponding to the model encryption statement; the root file encryption statement can enable a user to determine an encryption value corresponding to a default encryption attribute under each simulation model.
It should be noted that, in this embodiment, multiple sets of encryption policies may also be set by using the encryption attribute of encryption validity, that is, multiple sets of encryption statements are inserted, each set of encryption statements has different users, for example, each set of encryption statements may be allocated to different users, when it is necessary to allocate a user to a user, the encryption validity of the encryption policy corresponding to the user is set to be valid encryption, and the encryption validity of other encryption policies is set to be no encryption, so that free switching of multiple sets of encryption policies is achieved.
Optionally, before the obtaining of the target source code file corresponding to the simulation model library, the method provided in the embodiment of the present invention further includes: if the number of the root file encryption sentences is multiple, determining a first target sentence in each root file encryption sentence based on the user attribute of the target user, setting the first target sentence to be effective in encryption, and setting other root file encryption sentences except the first target sentence to be ineffective in encryption; or if the number of the model encryption statements corresponding to the simulation model is multiple, determining a second target statement in each model encryption statement based on the user attribute of the target user, setting the second target statement to be valid for encryption, and setting other model encryption statements except the second target statement to be invalid for encryption.
That is, when the number of the root file encryption statements is multiple, a first target statement corresponding to a target user may be determined according to a user attribute of the target user, an encryption value corresponding to the encryption validity in the first target statement is set as an encryption necessity, an encryption value corresponding to the encryption validity in the root file encryption statements other than the first target statement is set as an encryption unnecessity, so that the first target statement is set as an encryption validity, and the root file encryption statements other than the first target statement are set as an encryption invalidity.
Or when the number of the model encryption sentences is multiple, determining a second target sentence corresponding to the user according to the user attribute of the target user, setting an encryption value corresponding to the encryption validity in the second target sentence as an encryption necessity, setting an encryption value corresponding to the encryption validity in the root file encryption sentences except the second target sentence as an encryption unnecessity, setting the second target sentence as an encryption validity, and setting the root file encryption sentences except the second target sentence as an encryption invalidity.
Correspondingly, when a user loads a target source code file through simulation software, if the number of root file encryption statements is multiple, or a plurality of model encryption statements corresponding to one simulation model, the root file encryption statement or the model encryption statement whose encryption value is necessary to be encrypted may be determined as a first target statement or a second target statement according to the encryption value corresponding to the encryption validity, and then the encryption value corresponding to each encryption attribute is determined through the first target statement or the second target statement.
By the mode, free switching of multiple sets of encryption strategies is realized, different encryption statements do not need to be configured for each user independently, and only the encryption values corresponding to the encryption effectiveness in each set of encryption strategies are modified.
S220, determining the encryption statements of the simulation models in the target source code file.
And S230, judging whether an encryption value corresponding to each encryption attribute of the simulation model is obtained based on the model encryption statement corresponding to the simulation model or not for each simulation model, and if not, determining that the default encryption attribute corresponding to the encryption value is not obtained.
Specifically, if a simulation model has a model encryption statement corresponding to the simulation model, an encryption value corresponding to each encryption attribute of the simulation model may be determined according to the corresponding model encryption statement.
If a simulation model does not have a corresponding model encryption statement, or if the encryption values corresponding to all the encryption attributes of the simulation model cannot be determined through the model encryption statement corresponding to the simulation model, the encryption attributes of which the encryption values are not determined can be used as default encryption attributes.
For example, if the simulation model a does not have a corresponding model encryption statement, the default encryption attribute includes each user operation function, model hiding property, and encryption effectiveness; if the simulation model B has the corresponding model encryption statement, the encryption effectiveness is determined to be the necessary encryption according to the model encryption statement, the model hiding property is the unnecessary encryption, the icon modification, the source code modification, the view modification and the document modification are the necessary encryption, and the encryption value corresponding to the model copying is unknown, the default encryption attribute comprises the model copying.
Of course, in the process of determining the encryption value corresponding to each encryption attribute based on the model encryption statement, the determination may also be performed according to the rule of priority. For example, if the encryption effectiveness is determined to be encryption-free according to a model encryption statement corresponding to a simulation model, the model hiding performance and the encryption value corresponding to each user operation function can be automatically determined to be encryption-free; or, if the encryption effectiveness is determined to be the necessary encryption and the model hiding performance is determined to be the necessary encryption, the encryption value corresponding to each user operation function can be automatically determined to be the necessary encryption.
S240, determining a parent simulation model corresponding to the simulation model, judging whether the default encryption attribute of the parent simulation model is default, and if not, taking the encryption value corresponding to the default encryption attribute of the parent simulation model as the encryption value corresponding to the default encryption attribute of the simulation model.
Specifically, after each default encryption attribute under the simulation model is determined, the parent simulation model corresponding to the simulation model may be determined. It should be noted that, in this embodiment, the number of parent simulation models corresponding to one simulation model may be multiple; the parent-level simulation model may be a simulation model on an inheritance chain corresponding to the simulation model, that is, the parent-level simulation model includes a first model inherited by the simulation model, a second model inherited by the first model, a third model inherited by the second model, …, and so on.
In this embodiment, if one simulation model has the default encryption attribute, the encryption value corresponding to the default encryption attribute of the parent simulation model may be used as the encryption value corresponding to the default encryption attribute of the simulation model. Along with the above example, the parent simulation model of the simulation model B is the simulation model X, and if the model copy of the simulation model X has the corresponding encryption value, the corresponding encryption value can be copied from the model of the simulation model X as the encryption value corresponding to the model copy of the simulation model B.
It should be noted that, when the number of the parent simulation models corresponding to the simulation models is multiple, the encryption value corresponding to the default encryption attribute of the directly inherited parent simulation model may be read from the directly inherited parent simulation model according to the inheritance relationship between the simulation model and each parent simulation model, and if not, the encryption value corresponding to the default encryption attribute of the directly inherited parent simulation model of the parent simulation model may be continuously read until the encryption value is read, and the encryption value is used as the encryption value corresponding to the default encryption attribute of the simulation model.
Considering the situation that the default encryption attributes of all the parent simulation models do not have corresponding encryption values, namely the default encryption attributes of all the parent simulation models are default, the encryption values corresponding to the default encryption attributes of the simulation models can be determined according to the root file encryption statement.
In a specific implementation manner, after determining whether the default cryptographic attribute of the parent-level simulation model is default, the method provided in the embodiment of the present invention further includes: if the default encryption attribute of each parent-level simulation model is default, determining the encryption value corresponding to the default encryption attribute of the simulation model based on the root file encryption statement, or taking the preset default value corresponding to the default encryption attribute as the encryption value corresponding to the default encryption attribute.
That is, when the encryption value corresponding to the default encryption attribute of the parent-level simulation model cannot be determined according to the encryption values corresponding to the default encryption attributes of all parent-level simulation models, the encryption value corresponding to the default encryption attribute of the simulation model may be determined according to the root file encryption statement, or the encryption value corresponding to the default encryption attribute of the simulation model may be determined according to the preset default value corresponding to the default encryption attribute.
Optionally, if a root file encryption statement is provided and an encryption value corresponding to the default encryption attribute exists in the root file encryption statement, the encryption value corresponding to the default encryption attribute of the simulation model can be determined directly according to the root file encryption statement; if the root file encryption statement is not provided, or the encryption value corresponding to the default encryption attribute does not exist in the root file encryption statement, the encryption value corresponding to the default encryption attribute of the simulation model can be determined according to a preset default value corresponding to the default encryption attribute.
Illustratively, as shown in table 1, a preset default value corresponding to each encryption attribute is shown.
TABLE 1 Preset Default values corresponding to various encryption attributes
Encryption attributes Presetting default values Encryption attributes Presetting default values
Modifying icons false Model replication false
Modifying source code false Model hiding property false
Modifying views false Encryption effectivity true
Modifying a document false
In the above embodiment, the encryption value corresponding to the default encryption attribute of each simulation model can be determined by the root file encryption statement or the preset default value corresponding to each encryption attribute, and under the condition that the number of the simulation models in the simulation model library is large and the operation authorities corresponding to most simulation models are consistent, the setting of the operation authority of each simulation model can be quickly realized, the encryption setting of each simulation model is not required one by one, only the simulation models with inconsistent operation authorities are encrypted, the number of the model encryption statements in the target source code file is reduced, the encryption setting efficiency of the simulation model library is improved, and the operation authority determining efficiency of each simulation model is improved.
Exemplarily, in a model encryption statement corresponding to the simulation model X, the encryption attribute X1 and the encryption attribute X2 are provided with corresponding encryption values, and the encryption value corresponding to the encryption attribute X3 is not included, then X1 and X2 may directly take the encryption value in the model encryption statement, X3 takes the encryption value in the parent simulation model of the simulation model X, if no encryption value corresponding to X3 is provided under each parent simulation model of the simulation model X, a value corresponding to each encryption attribute in the root file encryption statement may be further obtained, and if no encryption value corresponding to X3 is provided, a preset default value corresponding to X3 may be used as the encryption value corresponding to X3.
And S250, determining the use permission corresponding to each user operation function of the simulation model based on the encryption value corresponding to each encryption attribute.
It should be noted that the encryption method provided in this embodiment may also support providing an encryption policy for subsequent model development on the basis that the existing simulation model library is encrypted, has good extensibility, and provides support for subsequent development of the simulation model library.
Specifically, in cooperative development and secondary development, the following relationship may be provided between the developed simulation model and the newly developed simulation model: 1. in the developed simulation model, the encryption values corresponding to the encryption attributes are kept unchanged; 2. according to a new simulation model obtained by copying a developed simulation model, the encryption values corresponding to the encryption attributes are the same as those of the copied simulation model; 3. in the newly developed simulation model, the encryption values corresponding to the encryption attributes can be customized; 4. according to the new simulation model obtained by inheritance of the developed simulation model, the encryption values corresponding to the encryption attributes can be independently defined, and the inherited simulation model is not influenced.
The embodiment has the following technical effects: for each simulation model, whether an encryption value corresponding to each encryption attribute is determined according to a corresponding model encryption statement is judged, if not, a default encryption attribute corresponding to the encryption value is not obtained, and then whether the default encryption attribute of a parent-level simulation model corresponding to the simulation model is default is judged, if not, the encryption value corresponding to the default encryption attribute of the parent-level simulation model is used as the encryption value corresponding to the default encryption attribute of the simulation model, when a plurality of simulation models with inheritance relationship exist in a simulation model library, encryption setting is not needed to be carried out on each simulation model one by one, only encryption setting is carried out on the simulation model on the upper layer, the number of model encryption statements in a target source code file is reduced, the number of items of encryption fields is further reduced and optimized, the encryption setting efficiency of the simulation model library is improved, and the operation permission determining efficiency of each simulation model is improved.
According to the method for determining the operation authority of the simulation model, provided by the embodiment of the invention, the use authority setting of each user operation function under each simulation model is supported through the encryption statement in the target source code file; the use permission of each user operation function under each simulation model is quickly defined according to the priority or inheritance relationship; the network server verifies each encrypted attribute authorized to be encrypted, dynamic real-time management of the use permission of each user operation function is achieved, encryption requirements under various scenes are met, the core model technology is guaranteed not to be leaked, and meanwhile good extensibility is achieved.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 3, the electronic device 300 includes one or more processors 301 and memory 302.
The processor 301 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 300 to perform desired functions.
Memory 302 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, etc. One or more computer program instructions may be stored on the computer-readable storage medium and executed by the processor 301 to implement the operation authority determination method of the simulation model of any of the embodiments of the present invention described above and/or other desired functions. Various contents such as initial external parameters, threshold values, etc. may also be stored in the computer-readable storage medium.
In one example, the electronic device 300 may further include: an input device 303 and an output device 304, which are interconnected by a bus system and/or other form of connection mechanism (not shown). The input means 303 may comprise, for example, a keyboard, a mouse, etc. The output device 304 can output various information to the outside, including warning prompt information, braking force, etc. The output devices 304 may include, for example, a display, speakers, a printer, and a communication network and its connected remote output devices, among others.
Of course, for simplicity, only some of the components of the electronic device 300 relevant to the present invention are shown in fig. 3, and components such as buses, input/output interfaces, and the like are omitted. In addition, electronic device 300 may include any other suitable components depending on the particular application.
In addition to the above-described methods and apparatus, embodiments of the present invention may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps of the method for determining operation rights of a simulation model provided by any of the embodiments of the present invention.
The computer program product may write program code for carrying out operations for embodiments of the present invention in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, an embodiment of the present invention may also be a computer-readable storage medium, on which computer program instructions are stored, which, when executed by a processor, cause the processor to execute the steps of the operation authority determination method of the simulation model provided by any embodiment of the present invention.
The computer readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
It is to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to limit the scope of the present application. As used in the specification and claims of this application, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of additional like elements in a process, method, or apparatus that comprises the element.
It is further noted that the terms "center," "upper," "lower," "left," "right," "vertical," "horizontal," "inner," "outer," and the like are used in the orientation or positional relationship indicated in the drawings for convenience in describing the invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the invention. Unless expressly stated or limited otherwise, the terms "mounted," "connected," "coupled," and the like are to be construed broadly and encompass, for example, both fixed and removable coupling or integral coupling; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions deviate from the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for determining operation authority of a simulation model is characterized by comprising the following steps:
acquiring a target source code file corresponding to a simulation model library, wherein the simulation model library comprises various simulation models;
determining an encryption statement of each simulation model in the target source code file, and determining an encryption value corresponding to each encryption attribute of each simulation model based on the encryption statement for each simulation model;
and determining the use permission corresponding to each user operation function of the simulation model based on the encryption value corresponding to each encryption attribute.
2. The method of claim 1, wherein the encryption attributes include user operation functions, model hiding performance and encryption effectiveness, and determining the usage right corresponding to each user operation function of the simulation model based on the encryption value corresponding to each encryption attribute comprises:
for each simulation model, if the simulation model is determined to be encrypted to be effective based on the encryption value corresponding to the encryption effectiveness, determining whether the simulation model is hidden based on the encryption value corresponding to the model hiding performance;
and if not, determining the use permission corresponding to each user operation function based on the encryption value corresponding to each user operation function.
3. The method of claim 2, wherein determining the usage right corresponding to each user operation function of the simulation model based on the encryption value corresponding to each encryption attribute further comprises:
if the simulation model is determined to be encrypted and not to be valid based on the encryption value corresponding to the encryption validity, determining that the use permission corresponding to each user operation function is function permission; or,
and if the simulation model hiding is determined based on the encryption value corresponding to the model hiding performance, determining that the use permission corresponding to each user operation function is that the function is not allowed to be used.
4. The method of claim 1, wherein prior to said obtaining the target source code file corresponding to the simulation model library, the method further comprises:
generating a root file encryption statement in response to detecting an encryption setting operation for a root folder, determining a first writing position based on an ending statement of the root folder in the target source code file, and writing the root file encryption statement to the first writing position in the target source code file; and/or the presence of a gas in the gas,
and in response to detecting an encryption setting operation for the simulation model in the root folder, generating a model encryption statement corresponding to the simulation model, determining a second writing position based on an ending statement of the folder corresponding to the simulation model in the target source code file, and writing the model encryption statement into the second writing position in the target source code file.
5. The method of claim 4, wherein before the obtaining the target source code file corresponding to the simulation model library, the method further comprises:
if the number of the root file encryption statements is multiple, determining a first target statement in each root file encryption statement based on the user attribute of a target user, setting the first target statement to be in effect in encryption, and setting other root file encryption statements except the first target statement to be not in effect in encryption; or,
if the number of the model encryption statements corresponding to the simulation model is multiple, determining a second target statement in each model encryption statement based on the user attribute of the target user, setting the second target statement to be valid for encryption, and setting other model encryption statements except the second target statement to be invalid for encryption.
6. The method of claim 4, wherein the determining, for each of the simulation models, an encrypted value corresponding to each encryption attribute of the simulation model based on the encryption statement comprises:
judging whether an encryption value corresponding to each encryption attribute of the simulation model is obtained based on a model encryption statement corresponding to the simulation model or not for each simulation model, and if not, determining that a default encryption attribute corresponding to the encryption value is not obtained;
determining a parent simulation model corresponding to the simulation model, judging whether the default encryption attribute of the parent simulation model is default, and if not, taking the encryption value corresponding to the default encryption attribute of the parent simulation model as the encryption value corresponding to the default encryption attribute of the simulation model.
7. The method of claim 6, wherein after said determining whether said default cryptographic attribute of said parent simulation model is default, said method further comprises:
if the default encryption attribute of each parent-level simulation model is default, determining an encryption value corresponding to the default encryption attribute of the simulation model based on a root file encryption statement, or taking a preset default value corresponding to the default encryption attribute as the encryption value corresponding to the default encryption attribute.
8. The method according to claim 2, wherein the determining the usage right corresponding to each of the user operation functions based on the encrypted value corresponding to each of the user operation functions includes at least one of:
if the encryption value corresponding to the user operation function is detected to be a value corresponding to the encryption-free state, determining that the use permission corresponding to the user operation function is function permission;
if the encryption value corresponding to the user operation function is detected to be a value corresponding to the necessary encryption, determining that the use permission corresponding to the user operation function is that the function is not allowed to be used;
and if the encryption value corresponding to the user operation function is detected to be the value corresponding to the authorized encryption, generating an authorized verification request and sending the authorized verification request to a network server, acquiring an authorized verification result fed back by the network server, and determining the use permission corresponding to the user operation function based on the authorized verification result.
9. An electronic device, characterized in that the electronic device comprises:
a processor and a memory;
the processor is configured to execute the steps of the operation authority determination method of the simulation model according to any one of claims 1 to 8 by calling a program or instructions stored in the memory.
10. A computer-readable storage medium characterized by storing a program or instructions for causing a computer to execute the steps of the operation authority determination method of a simulation model according to any one of claims 1 to 8.
CN202211438803.6A 2022-11-17 2022-11-17 Method, device and storage medium for determining operation authority of simulation model Active CN115577568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211438803.6A CN115577568B (en) 2022-11-17 2022-11-17 Method, device and storage medium for determining operation authority of simulation model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211438803.6A CN115577568B (en) 2022-11-17 2022-11-17 Method, device and storage medium for determining operation authority of simulation model

Publications (2)

Publication Number Publication Date
CN115577568A true CN115577568A (en) 2023-01-06
CN115577568B CN115577568B (en) 2023-03-28

Family

ID=84588561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211438803.6A Active CN115577568B (en) 2022-11-17 2022-11-17 Method, device and storage medium for determining operation authority of simulation model

Country Status (1)

Country Link
CN (1) CN115577568B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117972758A (en) * 2024-03-27 2024-05-03 中汽研汽车检验中心(广州)有限公司 Modelica application program protection method, device and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778383A (en) * 2014-02-21 2014-05-07 武汉大学 Sketch based computer-aided design (CAD) model local encryption method
CN105530236A (en) * 2014-10-20 2016-04-27 帝斯贝思数字信号处理和控制工程有限公司 Protection of software models
CN108459788A (en) * 2018-03-15 2018-08-28 维沃移动通信有限公司 A kind of image display method and terminal
CN109586963A (en) * 2018-11-30 2019-04-05 北京仿真中心 A kind of cloud emulation platform safe-guard system, server, terminal and method
CN110619220A (en) * 2019-08-09 2019-12-27 北京小米移动软件有限公司 Method and device for encrypting neural network model and storage medium
CN111433775A (en) * 2017-12-07 2020-07-17 三星电子株式会社 Security enhancement method and electronic device thereof
CN113645172A (en) * 2020-04-27 2021-11-12 杨雪峰 Three-dimensional model data transmission method, server and user terminal
CN114201770A (en) * 2021-12-14 2022-03-18 天翼电信终端有限公司 Mobile terminal data security protection method and device based on cloud control
CN114386058A (en) * 2021-12-15 2022-04-22 航天信息股份有限公司 Model file encryption and decryption method and device
WO2022126644A1 (en) * 2020-12-18 2022-06-23 华为技术有限公司 Model protection device, method, and computing device
CN114840521A (en) * 2022-04-22 2022-08-02 北京友友天宇系统技术有限公司 Database authority management and data protection method, device, equipment and storage medium
CN115019008A (en) * 2022-05-30 2022-09-06 深圳市鸿普森科技股份有限公司 Intelligent 3D model design analysis service management platform
CN115099068A (en) * 2022-07-28 2022-09-23 中国石油大学(华东) Oil reservoir numerical simulation system based on metauniverse
CN115150063A (en) * 2022-06-30 2022-10-04 北京百度网讯科技有限公司 Model encryption method and device and electronic equipment

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778383A (en) * 2014-02-21 2014-05-07 武汉大学 Sketch based computer-aided design (CAD) model local encryption method
CN105530236A (en) * 2014-10-20 2016-04-27 帝斯贝思数字信号处理和控制工程有限公司 Protection of software models
CN111433775A (en) * 2017-12-07 2020-07-17 三星电子株式会社 Security enhancement method and electronic device thereof
CN108459788A (en) * 2018-03-15 2018-08-28 维沃移动通信有限公司 A kind of image display method and terminal
CN109586963A (en) * 2018-11-30 2019-04-05 北京仿真中心 A kind of cloud emulation platform safe-guard system, server, terminal and method
CN110619220A (en) * 2019-08-09 2019-12-27 北京小米移动软件有限公司 Method and device for encrypting neural network model and storage medium
CN113645172A (en) * 2020-04-27 2021-11-12 杨雪峰 Three-dimensional model data transmission method, server and user terminal
WO2022126644A1 (en) * 2020-12-18 2022-06-23 华为技术有限公司 Model protection device, method, and computing device
CN114201770A (en) * 2021-12-14 2022-03-18 天翼电信终端有限公司 Mobile terminal data security protection method and device based on cloud control
CN114386058A (en) * 2021-12-15 2022-04-22 航天信息股份有限公司 Model file encryption and decryption method and device
CN114840521A (en) * 2022-04-22 2022-08-02 北京友友天宇系统技术有限公司 Database authority management and data protection method, device, equipment and storage medium
CN115019008A (en) * 2022-05-30 2022-09-06 深圳市鸿普森科技股份有限公司 Intelligent 3D model design analysis service management platform
CN115150063A (en) * 2022-06-30 2022-10-04 北京百度网讯科技有限公司 Model encryption method and device and electronic equipment
CN115099068A (en) * 2022-07-28 2022-09-23 中国石油大学(华东) Oil reservoir numerical simulation system based on metauniverse

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117972758A (en) * 2024-03-27 2024-05-03 中汽研汽车检验中心(广州)有限公司 Modelica application program protection method, device and medium
CN117972758B (en) * 2024-03-27 2024-06-21 中汽研汽车检验中心(广州)有限公司 Modelica application program protection method, device and medium

Also Published As

Publication number Publication date
CN115577568B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN110414268B (en) Access control method, device, equipment and storage medium
CN105408912B (en) Handle certification and resource grant
WO2017024957A1 (en) Method and device for data processing
US11907941B2 (en) Anonymization of data fields in transactions
CN113297550A (en) Authority control method, device, equipment, storage medium and program product
TW200945096A (en) Secure browser-based applications
JP2020087419A (en) Electronic labor contract method using unmanned information terminal, device, and computer readable recording medium
CN115577568B (en) Method, device and storage medium for determining operation authority of simulation model
WO2018184353A1 (en) Method for application security authentication, terminal, and storage medium
US20120233712A1 (en) Method and Device for Accessing Control Data According to Provided Permission Information
CN104318176A (en) Terminal and data management method and device thereof
CN113468576B (en) Role-based data security access method and device
US11151226B2 (en) Managing application specific feature rights
TWI594133B (en) File processing system and method
JP6670318B2 (en) Classification and IRM implementation in software applications
US20220405068A1 (en) Managing asset packages for interactive bot development
TW200905516A (en) Method and system for protecting file data against divulgence
CA2784896C (en) Securing execution of computational resources
CN107967430B (en) A kind of document protection method, equipment and system
CN106657385A (en) Plug-in calling method, plug-in management method, client side and management server
CN113761478B (en) Authorization method and device for software product
KR20120055371A (en) Method and apparatus for protecting digital contents
CN114528563A (en) Authority management method, device, electronic device and medium
CN117972758B (en) Modelica application program protection method, device and medium
KR100716719B1 (en) Method and apparatus for providing package contents using d.r.m

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant