CN116468860B - Three-dimensional model file generation method, device, equipment and storage medium - Google Patents

Three-dimensional model file generation method, device, equipment and storage medium Download PDF

Info

Publication number
CN116468860B
CN116468860B CN202310733602.7A CN202310733602A CN116468860B CN 116468860 B CN116468860 B CN 116468860B CN 202310733602 A CN202310733602 A CN 202310733602A CN 116468860 B CN116468860 B CN 116468860B
Authority
CN
China
Prior art keywords
dimensional model
information
model file
target
rights
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310733602.7A
Other languages
Chinese (zh)
Other versions
CN116468860A (en
Inventor
李志�
伍琦
李志刚
谭龙
陈宇
覃怡铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zihai Technology Chengdu Co ltd
Original Assignee
Zihai Technology Chengdu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zihai Technology Chengdu Co ltd filed Critical Zihai Technology Chengdu Co ltd
Priority to CN202310733602.7A priority Critical patent/CN116468860B/en
Publication of CN116468860A publication Critical patent/CN116468860A/en
Application granted granted Critical
Publication of CN116468860B publication Critical patent/CN116468860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/5866Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/77Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
    • G06V10/774Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2210/00Indexing scheme for image generation or computer graphics
    • G06T2210/32Image data format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Artificial Intelligence (AREA)
  • Multimedia (AREA)
  • Medical Informatics (AREA)
  • Evolutionary Computation (AREA)
  • Computer Graphics (AREA)
  • Geometry (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a three-dimensional model file generation method, a device, equipment and a storage medium, wherein the method comprises the steps of obtaining rights and interests information, asset information and labeling information of a target three-dimensional model; encrypting the asset information and the labeling information by using an encryption public key; storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information; and converting the updated equity information, the asset information and the annotation information into a JSON format to generate a three-dimensional model file. According to the application, the rights and interests information, the asset information and the labeling information are set in the three-dimensional model, the asset information is encrypted in an encryption mode, and the corresponding private key is used for decryption when the three-dimensional model is used, so that the legal compliance use of asset resources can be effectively ensured, and compared with the traditional mode of separating the asset from the ticket, the legal rights and interests of the ticket owner can be effectively ensured. The tradable nature of the usage rights further ensures the long-term benefits of the purchaser.

Description

Three-dimensional model file generation method, device, equipment and storage medium
Technical Field
The present application relates to the field of three-dimensional model construction, and in particular, to a method, an apparatus, a device, and a storage medium for generating a three-dimensional model file.
Background
The conventional three-dimensional model format refers to three file formats commonly used in three-dimensional modeling software, namely OBJ, 3DS and FBX. The three-dimensional modeling software is in a file format commonly used in the three-dimensional modeling software, and is widely applied to the fields of game development, film and television production, architectural design, industrial design and the like.
OBJ (Wavefront Object) format
The OBJ format is an open 3D graphic file format originally developed by the company Wavefront Technologies. It is a text file format that may contain geometric information, texture coordinates, normal vectors, etc. An OBJ file is a basic 3D file format that does not support animation and other high-level functions.
3DS (3D Studio) format
The 3DS format is a binary file format developed by Autodesk corporation, and can store geometric information, texture coordinates, materials and other information in three-dimensional modeling software, while supporting animation and other advanced functions. The 3DS format is commonly used in game development and movie production.
FBX (film box) format
The FBX format is a binary file format developed by Autodesk corporation, and can store geometric information, texture coordinates, materials, animation, etc. information in three-dimensional modeling software. FBX format is commonly used in the fields of game development, movie production, industrial design, and the like.
NFT technology
NFT (Non-funnelable Token) is a digital asset, typically a unique identifier that exists on a blockchain in the form of cryptocurrency. Unlike traditional cryptocurrency, NFTs are not interchangeable, each NFT having its unique identity and value.
NFTs are commonly used for the trading and storage of digital assets, such as digital artwork, virtual game items, music, video, and the like. NFT is becoming an important digital asset in the digital world due to its uniqueness and irreplaceability, and its market size and value is expanding.
RSA algorithm
The RSA algorithm is an asymmetric encryption algorithm designed based on the mathematical principle of the large number decomposition problem (factorization problem). The algorithm employs a pair of keys, one of which is a public key and the other of which is a private key, that can be used to encrypt and decrypt data.
The following is a brief introduction of the RSA algorithm:
generating an RSA key pair: two large primes p and q are selected and their product n=p×q is calculated. Then an integer e is chosen such that 1<e < (p-1): (q-1) and e is compatible with (p-1): (q-1). And calculating the modulo inverse element d of the (p-1) x (q-1) of e. The public key is (n, e), and the private key is (n, d).
Encrypting data: the data to be encrypted is converted into an integer m, satisfying 0< = m < n. Then, encrypting m by using a parameter e in the public key to obtain a ciphertext c, wherein the formula is as follows: c=m≡mod n.
Decrypting the data: decrypting the ciphertext c by using a parameter d in the private key to obtain a plaintext m, wherein the formula is as follows: m=c≡mod n.
The security of the RSA algorithm is based on the problem of large number decomposition, i.e. the private key cannot be effectively decomposed by the known public key. Thus, the security of the RSA algorithm is related to the key length. Generally, the longer the key length, the more secure the algorithm, but the longer the time required for encryption and decryption.
The patent CN201910333551.2 adds an attribute name definition module to the above-mentioned model information to define the entity attributes of the model.
However, the creation of existing three-dimensional model format files has the following problems:
(1) The traditional three-dimensional model format only comprises three-dimensional information such as grid information, textures, skins, animations and the like, does not comprise attribute information in the model, and the related patent related mode also only comprises entity attribute information of the model, lacks labeling information required by the use of the model, and is not beneficial to programming use or AI application.
(2) After the traditional NFT technology is applied to the field of three-dimensional models, corresponding NFT certificates are generated by using three-dimensional model data. When in use, the certificate and the resource are separated, the validity of the certificate cannot be effectively detected, and the circulation and the transaction of the digital asset are inconvenient.
(3) In conventional NFT technology, unique NFT credentials are generated only for a particular digital asset and do not distinguish ownership from ownership of the digital asset. Different types of rights and trade-off for digital class assets are inconvenient.
Disclosure of Invention
The application mainly aims to provide a three-dimensional model file generation method, device, equipment and storage medium, and aims to solve the technical problems of the establishment of the current three-dimensional model format file.
In order to achieve the above object, the present application provides a three-dimensional model file generating method, the method comprising the steps of:
s1: acquiring rights and interests information, asset information and labeling information of the target three-dimensional model;
s2: encrypting the asset information and the labeling information by using an encryption public key;
s3: storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information;
s4: and converting the updated equity information, the asset information and the annotation information into a JSON format to generate a three-dimensional model file.
Optionally, after obtaining the three-dimensional model file, the method further includes step S5: the use of the three-dimensional model file specifically comprises:
s51: a target user submits a target three-dimensional model file and a private key of the target three-dimensional model file;
s52: and decrypting the target three-dimensional model file by using the private key, and if the decryption is successful, allowing the target user to access asset information and labeling information in the target three-dimensional model.
Optionally, after obtaining the three-dimensional model file, the method further includes step S6: the transaction of the three-dimensional model file specifically comprises the following steps:
s61: the method comprises the steps that a seller submits a target three-dimensional model file, transaction contents and a private key for encrypting the target three-dimensional model file, and a buyer submits transaction currency and a public key thereof;
s62: decrypting the target three-dimensional model file by using a private key of the target three-dimensional model file provided by the seller;
s63: encrypting the decrypted target three-dimensional model file using the buyer-provided public key;
s64: the encrypted target three-dimensional model is sent to the buyer account, and transaction currency is written into the seller account.
Optionally, the updated rights information includes rights information of the target three-dimensional model; the ownership information includes ownership information and usage rights information.
Optionally, when the transaction content is ownership, the step S6 further includes:
s65: after the encrypting step of the decrypted target three-dimensional model file using the public key provided by the buyer, the ownership information of the target three-dimensional model is updated to the buyer.
Optionally, the method further includes step S7: ownership rights include:
s71: submitting asset information, labeling information and ownership public keys of the target three-dimensional model file;
s72: calculating hash values of asset information and labeling information in the target three-dimensional model, and judging whether a library has a homologous confirmed right file or not according to the hash values;
s73: if yes, the right fails to be confirmed, and ownership information of the homologous confirmed file is returned;
s74: if not, the right is successfully confirmed, and the public key of the ownership is used for encrypting the asset information and the labeling information.
Optionally, the method further comprises step S8: the right to use confirms the right, include specifically:
s81: submitting a target three-dimensional model file with the determined rights and the right type being ownership, an ownership person private key and a use right person public key;
s82: decrypting the target three-dimensional model file by using the proprietary private key, calculating hash values of the asset information and the labeling information, and judging whether the proprietary information is consistent or not according to the hash values;
s83: if yes, the asset information and the labeling information are encrypted by using the public key of the use right person, and a file with the use right ticket is generated.
In addition, in order to achieve the above object, the present application also provides a three-dimensional model file generating apparatus including:
the acquisition module is used for acquiring the rights and interests information, the asset information and the labeling information of the target three-dimensional model;
the encryption module is used for encrypting the asset information and the labeling information by utilizing an encryption public key;
the storage module is used for storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information;
and the generation module is used for converting the updated equity information, the asset information and the annotation information into a JSON format so as to generate a three-dimensional model file.
In addition, in order to achieve the above object, the present application also provides a three-dimensional model file generating apparatus including: the three-dimensional model file generating device comprises a memory, a processor and a three-dimensional model file generating program which is stored in the memory and can run on the processor, wherein the three-dimensional model file generating program realizes the steps of the three-dimensional model file generating method when being executed by the processor.
In addition, in order to achieve the above object, the present application also provides a storage medium having stored thereon a three-dimensional model file generation program which, when executed by a processor, implements the steps of the three-dimensional model file generation method described above.
The application has the beneficial effects that:
(1) The part of labeling information is added on the basis of the traditional model, and the data materials after labeling the three-dimensional model data of different types can be rapidly utilized by a computer algorithm model and an AI model and can be used for training the corresponding model.
(2) In combination with NFT technology, the NFT ticket is innovatively divided into ownership and usage rights, and a party owning the ownership can create multiple copy assets owning the usage rights, and can freely trade ownership rights and copy of the usage rights. While the party having the right of use only has the right of use of the asset, the right of use may be traded.
(3) The method has the advantages that the asymmetric encryption mode is used, different public keys are used for encrypting the asset information during the right confirmation, and the corresponding private keys are used for decryption during the use, so that the legal compliance use of asset resources can be effectively ensured, and compared with the traditional mode of separating the asset from the ticket, the legal rights and interests of the ticket owner can be effectively ensured. The tradable nature of the usage rights further ensures the long-term benefits of the purchaser.
Drawings
FIG. 1 is a schematic diagram of a device structure of a hardware operating environment according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of an embodiment of a method for generating a three-dimensional model file according to the present application;
fig. 3 is a block diagram of a three-dimensional model file generating apparatus according to an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Referring to fig. 1, fig. 1 is a schematic diagram of an apparatus structure of a hardware running environment according to an embodiment of the present application.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the arrangement of the apparatus shown in fig. 1 is not limiting and may include more or fewer components than shown, or certain components may be combined, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a three-dimensional model file generation program may be included in the memory 1005 as one type of computer storage medium.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call a three-dimensional model file generation program stored in the memory 1005 and perform the following operations:
acquiring rights and interests information, asset information and labeling information of the target three-dimensional model;
encrypting the asset information and the labeling information by using an encryption public key;
storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information;
and converting the updated equity information, the asset information and the annotation information into a JSON format to generate a three-dimensional model file.
The specific embodiment of the present application applied to the apparatus is substantially the same as each embodiment of the method for generating a three-dimensional model file described below, and will not be described herein.
The embodiment of the application provides a three-dimensional model file generation method, and referring to fig. 2, fig. 2 is a schematic flow chart of an embodiment of the three-dimensional model file generation method.
In this embodiment, a method for generating a three-dimensional model file includes the following steps:
s1: acquiring rights and interests information, asset information and labeling information of the target three-dimensional model;
s2: encrypting the asset information and the labeling information by using an encryption public key;
s3: storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information;
s4: and converting the updated equity information, the asset information and the annotation information into a JSON format to generate a three-dimensional model file.
In a preferred embodiment, after obtaining the three-dimensional model file, the method further comprises step S5: the use of the three-dimensional model file specifically comprises:
s51: a target user submits a target three-dimensional model file and a private key of the target three-dimensional model file;
s52: and decrypting the target three-dimensional model file by using the private key, and if the decryption is successful, allowing the target user to access asset information and labeling information in the target three-dimensional model.
In a preferred embodiment, after obtaining the three-dimensional model file, the method further comprises step S6: the transaction of the three-dimensional model file specifically comprises the following steps:
s61: the method comprises the steps that a seller submits a target three-dimensional model file, transaction contents and a private key for encrypting the target three-dimensional model file, and a buyer submits transaction currency and a public key thereof;
s62: decrypting the target three-dimensional model file by using a private key of the target three-dimensional model file provided by the seller;
s63: encrypting the decrypted target three-dimensional model file using the buyer-provided public key;
s64: the encrypted target three-dimensional model is sent to the buyer account, and transaction currency is written into the seller account.
In a preferred embodiment, the updated rights information includes rights information for the target three-dimensional model; the ownership information includes ownership information and usage rights information.
In a preferred embodiment, when the transaction content is ownership, the step S6 further includes:
s65: after the encrypting step of the decrypted target three-dimensional model file using the public key provided by the buyer, the ownership information of the target three-dimensional model is updated to the buyer.
In a preferred embodiment, the method further comprises step S7: ownership rights include:
s71: submitting asset information, labeling information and ownership public keys of the target three-dimensional model file;
s72: calculating hash values of asset information and labeling information in the target three-dimensional model, and judging whether a library has a homologous confirmed right file or not according to the hash values;
s73: if yes, the right fails to be confirmed, and ownership information of the homologous confirmed file is returned;
s74: if not, the right is successfully confirmed, and the public key of the ownership is used for encrypting the asset information and the labeling information.
In a preferred embodiment, step S8 is further included: the right to use confirms the right, include specifically:
s81: submitting a target three-dimensional model file with the determined rights and the right type being ownership, an ownership person private key and a use right person public key;
s82: decrypting the target three-dimensional model file by using the proprietary private key, calculating hash values of the asset information and the labeling information, and judging whether the proprietary information is consistent or not according to the hash values;
s83: if yes, the asset information and the labeling information are encrypted by using the public key of the use right person, and a file with the use right ticket is generated.
Specifically, the embodiment splits the model file into three main parts for storage:
1. the first part is the rights information of the model, and comprises the information of the model, such as the type of the right, the account, the encryption key and the like, and the corresponding information can be empty when missing. The second part is model asset information, which contains related data such as geometry, texture, material, animation, attribute and the like. The third part is labeling information of the model and is used for labeling the functional labels of the relevant attributes of the corresponding region, the object, the face, the edge, the point and the like in the model.
2. The above-mentioned related information is stored using JSON format.
3. And encrypting asset information and label information of the model by using an RSA algorithm, and storing an RSA public key into the information of the first part.
For the labeling information, in the format file of the embodiment, points, edges, faces, elements and the like of the three-dimensional model can be labeled, and the labeling information is embodied in the form of JSON key value pairs, wherein the left side of the key value pairs is labeling area information, and the right side of the key value pairs is functional information, such as "{" V1, V2, V3, V4 ":" pedestrian area "," V4, V5, V6, V7":" non-motor vehicle lane "}.
The embodiment relates to a model right determining process, which specifically comprises the following steps:
(1) Ownership determination process:
1. and submitting asset information and label information of the model and public keys of all owners.
2. And calculating the hash value of the related asset, judging whether the homologous authorized asset exists, if so, considering that the right cannot be authorized, and otherwise, the right can be authorized.
3. If the judgment result is that the right can be confirmed, the right is confirmed successfully. And encrypting and storing the resource by using the public key data of the ownership, returning a file after the ownership is confirmed, and recording the information of the ownership in a library.
4. And if the judgment result is that the right cannot be confirmed, returning ownership person information of the homologous asset, and prompting that the current asset cannot be confirmed.
(2) Usage rights validation process:
1. submitting an asset file which is confirmed and has the right type of ownership, and a private key of an owner and a public key of a using owner.
2. And decrypting the ownership resource by using the ownership private key, calculating an asset hash value, and judging whether the ownership information registered by the resource is consistent.
3. And under the condition that the judgment is passed, encrypting the resource by using the public key of the use right person, and returning a corresponding file with the use right ticket.
Asset use process in the present application:
1. the seller submits the file of the transaction asset, the purchase content and the corresponding private key, and the buyer submits the currency and its own public key.
2. Unlocking the corresponding asset using the private key provided by the seller and verifying whether the buyer has agreed purchase content governance. If the corresponding rights are not available, the transaction is terminated and the currency is returned to the buyer.
3. If the transaction right is provided, the buyer provides a secret key for encryption, and the file after the right is returned.
4. If the content of the transaction is ownership, the ownership information is modified in the library.
5. The transaction is concluded and currency is entered into the seller's account and the asset file is sent to the buyer's account.
In this embodiment, a method, an apparatus, a device, and a storage medium for generating a three-dimensional model file are provided, where the method includes obtaining rights information, asset information, and labeling information of a target three-dimensional model; encrypting the asset information and the labeling information by using an encryption public key; storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information; and converting the updated equity information, the asset information and the annotation information into a JSON format to generate a three-dimensional model file. According to the application, the rights and interests information, the asset information and the labeling information are set in the three-dimensional model, the asset information is encrypted in an encryption mode, and the corresponding private key is used for decryption when the three-dimensional model is used, so that the legal compliance use of asset resources can be effectively ensured, and compared with the traditional mode of separating the asset from the ticket, the legal rights and interests of the ticket owner can be effectively ensured. The tradable nature of the usage rights further ensures the long-term benefits of the purchaser.
Referring to fig. 3, fig. 3 is a block diagram illustrating a three-dimensional model file generating apparatus according to an embodiment of the present application.
As shown in fig. 3, the three-dimensional model file generating device provided by the embodiment of the application includes:
the acquisition module 10 is used for acquiring rights and interests information, asset information and labeling information of the target three-dimensional model;
an encryption module 20, configured to encrypt the asset information and the annotation information by using an encryption public key;
the storage module 30 is configured to store the encrypted public key to the rights and interests information of the target three-dimensional model, and obtain updated rights and interests information;
the generating module 40 is configured to convert the updated rights information, the asset information and the labeling information into JSON format, so as to generate a three-dimensional model file.
Other embodiments or specific implementation manners of the three-dimensional model file generating device of the present application may refer to the above method embodiments, and are not described herein again.
In addition, the application also provides a three-dimensional model file generating device, which comprises: the three-dimensional model file generating device comprises a memory, a processor and a three-dimensional model file generating program which is stored in the memory and can run on the processor, wherein the three-dimensional model file generating program realizes the steps of the three-dimensional model file generating method when being executed by the processor.
The specific implementation manner of the three-dimensional model file generating device of the present application is basically the same as the above embodiments of the three-dimensional model file generating method, and will not be described herein again.
Furthermore, the present application also proposes a readable storage medium including a computer-readable storage medium having stored thereon a three-dimensional model file generation program. The readable storage medium may be a Memory 1005 in the terminal of fig. 1, or may be at least one of a ROM (Read-Only Memory)/RAM (Random Access Memory ), a magnetic disk, and an optical disk, and the readable storage medium includes a plurality of instructions for causing a three-dimensional model file generating apparatus having a processor to perform the three-dimensional model file generating method according to the embodiments of the present application.
The specific implementation of the three-dimensional model file generating program in the readable storage medium of the present application is substantially the same as the embodiments of the three-dimensional model file generating method described above, and will not be described herein again.
It is appreciated that in the description herein, reference to the terms "one embodiment," "another embodiment," "other embodiments," or "first through nth embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A method for generating a three-dimensional model file, the method comprising the steps of:
s1: acquiring rights and interests information, asset information and labeling information of the target three-dimensional model;
s2: encrypting the asset information and the labeling information by using an encryption public key;
s3: storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information;
s4: and converting the updated equity information, the asset information and the annotation information into a JSON format to generate a three-dimensional model file.
2. The three-dimensional model file generation method according to claim 1, wherein after obtaining the three-dimensional model file, the method further comprises step S5: the use of the three-dimensional model file specifically comprises:
s51: a target user submits a target three-dimensional model file and a private key of the target three-dimensional model file;
s52: and decrypting the target three-dimensional model file by using the private key, and if the decryption is successful, allowing the target user to access asset information and labeling information in the target three-dimensional model.
3. The three-dimensional model file generation method according to claim 1, wherein after obtaining the three-dimensional model file, the method further comprises step S6: the transaction of the three-dimensional model file specifically comprises the following steps:
s61: the method comprises the steps that a seller submits a target three-dimensional model file, transaction contents and a private key for encrypting the target three-dimensional model file, and a buyer submits transaction currency and a public key thereof;
s62: decrypting the target three-dimensional model file by using a private key of the target three-dimensional model file provided by the seller;
s63: encrypting the decrypted target three-dimensional model file using the buyer-provided public key;
s64: the encrypted target three-dimensional model is sent to the buyer account, and transaction currency is written into the seller account.
4. The three-dimensional model file generation method of claim 3, wherein the updated rights information includes rights information of a target three-dimensional model; the ownership information includes ownership information and usage rights information.
5. The method for generating a three-dimensional model file according to claim 4, wherein when the transaction content is ownership, the step S6 further comprises:
s65: after the encrypting step of the decrypted target three-dimensional model file using the public key provided by the buyer, the ownership information of the target three-dimensional model is updated to the buyer.
6. The three-dimensional model file generation method according to claim 4, characterized in that the method further comprises step S7: ownership rights include:
s71: submitting asset information, labeling information and ownership public keys of the target three-dimensional model file;
s72: calculating hash values of asset information and labeling information in the target three-dimensional model, and judging whether a library has a homologous confirmed right file or not according to the hash values;
s73: if yes, the right fails to be confirmed, and ownership information of the homologous confirmed file is returned;
s74: if not, the right is successfully confirmed, and the public key of the ownership is used for encrypting the asset information and the labeling information.
7. The three-dimensional model file generation method according to claim 6, characterized in that the method further comprises step S8: the right to use confirms the right, include specifically:
s81: submitting a target three-dimensional model file with the determined rights and the right type being ownership, an ownership person private key and a use right person public key;
s82: decrypting the target three-dimensional model file by using the proprietary private key, calculating hash values of the asset information and the labeling information, and judging whether the proprietary information is consistent or not according to the hash values;
s83: if yes, the asset information and the labeling information are encrypted by using the public key of the use right person, and a file with the use right ticket is generated.
8. A three-dimensional model file generation device, characterized in that the three-dimensional model file generation device includes:
the acquisition module is used for acquiring the rights and interests information, the asset information and the labeling information of the target three-dimensional model;
the encryption module is used for encrypting the asset information and the labeling information by utilizing an encryption public key;
the storage module is used for storing the encrypted public key to the rights and interests information of the target three-dimensional model to obtain updated rights and interests information;
and the generation module is used for converting the updated equity information, the asset information and the annotation information into a JSON format so as to generate a three-dimensional model file.
9. A three-dimensional model file generating apparatus, characterized in that the three-dimensional model file generating apparatus comprises: a memory, a processor, and a three-dimensional model file generation program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the three-dimensional model file generation method according to any one of claims 1 to 7.
10. A storage medium having stored thereon a three-dimensional model file generation program which, when executed by a processor, implements the steps of the three-dimensional model file generation method according to any one of claims 1 to 7.
CN202310733602.7A 2023-06-20 2023-06-20 Three-dimensional model file generation method, device, equipment and storage medium Active CN116468860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310733602.7A CN116468860B (en) 2023-06-20 2023-06-20 Three-dimensional model file generation method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310733602.7A CN116468860B (en) 2023-06-20 2023-06-20 Three-dimensional model file generation method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116468860A CN116468860A (en) 2023-07-21
CN116468860B true CN116468860B (en) 2023-08-11

Family

ID=87179304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310733602.7A Active CN116468860B (en) 2023-06-20 2023-06-20 Three-dimensional model file generation method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116468860B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117557871B (en) * 2024-01-11 2024-03-19 子亥科技(成都)有限公司 Three-dimensional model labeling method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2019100079A4 (en) * 2018-01-24 2019-02-28 Apple Inc. Devices, methods, and graphical user interfaces for system-wide behavior for 3D models
CN113420317A (en) * 2021-03-20 2021-09-21 贵州北斗空间信息技术有限公司 Encryption storage method and system for three-dimensional model
CN115039058A (en) * 2020-02-03 2022-09-09 苹果公司 Systems, methods, and graphical user interfaces for annotating, measuring, and modeling an environment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010047251A1 (en) * 2000-03-03 2001-11-29 Kemp William H. CAD system which designs 3-D models
US9025860B2 (en) * 2012-08-06 2015-05-05 Microsoft Technology Licensing, Llc Three-dimensional object browsing in documents
WO2014031899A1 (en) * 2012-08-22 2014-02-27 Goldrun Corporation Augmented reality virtual content platform apparatuses, methods and systems
US11923070B2 (en) * 2019-11-28 2024-03-05 Braid Health Inc. Automated visual reporting technique for medical imaging processing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2019100079A4 (en) * 2018-01-24 2019-02-28 Apple Inc. Devices, methods, and graphical user interfaces for system-wide behavior for 3D models
CN115039058A (en) * 2020-02-03 2022-09-09 苹果公司 Systems, methods, and graphical user interfaces for annotating, measuring, and modeling an environment
CN113420317A (en) * 2021-03-20 2021-09-21 贵州北斗空间信息技术有限公司 Encryption storage method and system for three-dimensional model

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3D Modeling of SelectedAssets, Security Zones and Conduits;Simon Seibt等;INFORMATIK 2016, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn 2016;第571-580页 *

Also Published As

Publication number Publication date
CN116468860A (en) 2023-07-21

Similar Documents

Publication Publication Date Title
TWI253265B (en) Multi-level, multi-dimensional content protection
US20040005060A1 (en) Certification method using variable encryption key system based on encryption key of certification medium and inherent information of computer hardware, and certification medium for storing the same and indicating effective term and authorization thereof
CN105610578A (en) Block chain information archiving and privacy protection method
CN116468860B (en) Three-dimensional model file generation method, device, equipment and storage medium
WO2020051710A1 (en) System and process for managing digitized security tokens
CN110401542A (en) Electronic identity voucher generation method, terminal and server
CN105721156A (en) General Encoding Functions For Modular Exponentiation Encryption Schemes
CN109615376B (en) Transaction method and device based on zero-knowledge proof
CN111988149B (en) Data sharing method, device and system in industrial internet
Zhao et al. Application of digital twin combined with artificial intelligence and 5G technology in the art design of digital museums
CN112435026A (en) Method and device for protecting file transaction information by using zero-knowledge proof and electronic equipment
CN111368196A (en) Model parameter updating method, device, equipment and readable storage medium
CN114417364A (en) Data encryption method, federal modeling method, apparatus and computer device
CN107306254A (en) Digital literary property protection method and system based on double layer encryption
CN116503070B (en) Digital asset right-determining and trading method, device, equipment and storage medium
JP5913041B2 (en) Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program
CN109635905B (en) Two-dimensional code generation method, device and system
JP2020052990A (en) Ownership management method of virtual object and related interactive platform
CN107026841B (en) Method and device for publishing works in network
CN115203647A (en) Stereoscopic model right protection and tracing method
CN115599959A (en) Data sharing method, device, equipment and storage medium
CN111460466A (en) Block chain-based electronic ticket management method, device and medium
KR102346023B1 (en) Service providing server that provides a donation accumulation service that accumulates a portion of the sale product&#39;s payment as donations to the school and operating method thereof
CN115952473A (en) Intelligent algorithm copyright authentication method and device based on NFT technology and related medium
CN117744158B (en) Access method, device, equipment and medium based on industrial Internet identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant