CN116956247B - Information processing system based on BIM - Google Patents

Information processing system based on BIM Download PDF

Info

Publication number
CN116956247B
CN116956247B CN202311207656.6A CN202311207656A CN116956247B CN 116956247 B CN116956247 B CN 116956247B CN 202311207656 A CN202311207656 A CN 202311207656A CN 116956247 B CN116956247 B CN 116956247B
Authority
CN
China
Prior art keywords
data
virtual access
bim
access
project
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311207656.6A
Other languages
Chinese (zh)
Other versions
CN116956247A (en
Inventor
王学海
沈金田
刘喜友
罗亮
赵春华
毛云波
赵亮
凌明振
刘国旺
韩磊
杨星宇
刘永
张逸凡
唐梅棚
高浃清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCCC First Highway Engineering Co Ltd
CCCC First Highway Fifth Engineering Co Ltd
Original Assignee
CCCC First Highway Engineering Co Ltd
CCCC First Highway Fifth Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCCC First Highway Engineering Co Ltd, CCCC First Highway Fifth Engineering Co Ltd filed Critical CCCC First Highway Engineering Co Ltd
Priority to CN202311207656.6A priority Critical patent/CN116956247B/en
Publication of CN116956247A publication Critical patent/CN116956247A/en
Application granted granted Critical
Publication of CN116956247B publication Critical patent/CN116956247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/08Construction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to the field of information processing, and discloses an information processing system based on BIM, which comprises a data center, an authorization authentication center and a user terminal; the data center is configured into a distributed storage mode and comprises a plurality of servers and a control center, the authorization authentication center attributes users to different project groups, virtual access equipment is configured for project group access and access of the data center, different data access authorities are configured for different user terminals, the authorities are set in relation to BIM project management attributes and IT management attributes, verification of project management attributes is performed by uniformly configuring the virtual access equipment and distributing keys and caching, and safety and convenience of data access can be guaranteed.

Description

Information processing system based on BIM
Technical Field
The application relates to the field of information processing, in particular to an information processing system based on BIM.
Background
Building projects based on BIM technology generate a plurality of information volumes and various types, and the building projects comprise: digital, picture, text, drawing, audio, image and other information. The BIM information is applied to building project management and design, so that on one hand, each participant can fully utilize various information directly generated by the participant, meanwhile, the information transmitted from the outside can be integrated, the obtained information is stored in a BIM information center, and information sharing based on a BIM center database is promoted to be a focus of attention of large enterprises and research and development institutions.
In the prior art, information generated by the inside and the outside is unified into a BIM database and is processed, so that the cyclic utilization of the information is realized, and building project information based on BIM is generally unified into the BIM database and is processed, so that the cyclic utilization of the information is realized. In practice, information exchange is frequent during construction project implementation, and effective data information exchange standards are lacking, so that all users are not connected smoothly due to safety and other considerations, so that BIM information is not convenient enough to acquire, and the problem that attention is required is caused when how to realize information safety requirements of related parties and simultaneously ensure that various information generated in the construction project can be utilized and shared conveniently, quickly and safely.
Disclosure of Invention
In order to solve at least one of the above technical problems, the present application provides a BIM-based information processing system, which includes a data center, an authorization authentication center, and a user terminal;
the data center is configured into a distributed storage mode and comprises a plurality of servers and a control center, wherein the servers are connected with the control center, the control center performs balancing processing on access loads of the servers, distributes different access inlets of the access data center for virtual access devices corresponding to different user terminals, and issues address information domain names of the access inlets to the virtual access devices corresponding to the user terminals;
the authorization authentication center is used for attributing the user terminal to different project groups, responding to the access request of the project group access data center and configuring virtual access equipment, configuring different data access rights for different user terminals, wherein the rights are set in association with BIM project management attributes and IT management attributes, the BIM project management attributes correspond to management hierarchy attributes in enterprise projects, and the IT management attributes are physical configuration information of the user terminal;
the user terminal accesses BIM files of the data center through virtual access equipment distributed by the authorization authentication center; when the data center feeds back that the virtual access equipment can execute data downloading interaction, the virtual access equipment performs secondary verification according to the project management attribute of the user terminal, and sends a BIM file to the user terminal according to a verification result.
Optionally, the setting of the authority in association with the BIM item management attribute and the IT management attribute includes: and configuring permission for accessing the BIM file according to project positions and user roles.
Optionally, the authorization authentication center is further configured to provide an accessible server space for user terminals in the same project group and configure data access sharing rights; the data center distinguishes and configures shared file data and non-shared file data, and the authorization authentication center sets authority information for the shared file data.
Optionally, setting rights information for the shared file data includes: configuration for user terminals within a project group: read-write, read-only, off-line download, copy right.
Optionally, the authorization authentication center configures different identification information for different virtual access devices, the identification is used for distinguishing project groups formed by different user terminals, and the virtual access devices are used as a total interface of the project groups for accessing the data center storing the BIM file.
Optionally, the authorization and authentication center configures, for each virtual access device, a shared access key based on the corresponding virtual access device, and configures a communication key within a project group configured for communication between members of different teams and access communication between user terminals of different teams.
Optionally, when a user under the virtual access device accesses the data center, the authorization authentication center verifies the key information of the virtual access device, and when the group key verification is passed, the transmission of the BIM file is executed, and a buffer space is provided in the virtual access device, where the BIM file is buffered in the virtual access device.
Optionally, when the user under the virtual access device accesses the data center, the authorization authentication center verifies the key information of the virtual access device, and when the group key verification is passed, the transmission of the BIM file is executed, a buffer space is provided in the virtual access device, and after the BIM file is buffered in the virtual access device, the method further includes: when the virtual access device acquires the group key and passes verification, and receives the BIM file, the virtual access device executes verification on user BIM management information in the project group, and when the user BIM management attribute information passes verification, the virtual access device executes transmission of the BIM file.
Optionally, the virtual access device is a user terminal or a virtual access gateway in the project group.
Optionally, the virtual access device determines that the user terminal has the data access request through the MAC address and ID information of the user terminal and the pre-distributed key.
The system provided by the application is applied to BIM data processing in enterprises, and comprises a data center, an authorization authentication center and a user terminal; the data center is configured into a distributed storage mode and comprises a plurality of servers and a control center, an authorization authentication center is used for attributing users to different project groups, virtual access equipment is configured for project group access and access of the data center, different data access authorities are configured for different user terminals, authority setting is related to BIM project management attributes and IT management attributes, verification of project management attributes is performed by uniformly configuring the virtual access equipment and distributing keys and caching, and safety and convenience of enterprise BIM data access can be guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of the system;
fig. 2 is a schematic diagram of accessing a data center for a user terminal through a virtual access device.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Example 1
As shown in fig. 1, the present application proposes a network BIM-based information processing system, which includes a data center, an authorization authentication center, and a user terminal; the data center configures a distributed storage mode, sets a plurality of servers for user storage, the plurality of servers are connected with the control center, the control center configures to perform balance on access loads of the plurality of servers, the control center performs group access for an external network, allocates access inlets for accessing the data center for different clusters or groups, namely project groups where user terminals are located, and issues address information such as domain name information of the access inlets to corresponding project groups; after the domain name is registered in the domain name system, the domain name system configures the mapping relation between the domain name of the access entrance and the IP address. And after receiving the traffic in the external network cluster, namely the access traffic, the control center distributes the traffic to each server of the data center.
Optionally, the control center of the data center may be deployed with a plurality of load balancing modules, where a plurality of access ports of the control center are respectively disposed in the corresponding load balancing modules, and after the load balancing modules receive the traffic of each item group in the external network through the access ports, the load balancing modules distribute the traffic to the servers of the data center according to a load balancing policy. The load balancing module is optionally and independently arranged, and the access entrance can also be independently arranged and configured.
The data center monitors the flow received by the access portals respectively, if the flow of part of the access portals is abnormal, the part of the access portals are closed, and a message is sent to the authorization authentication center, the authorization authentication center initiates a re-key negotiation mechanism to the virtual access equipment, and stops the data transmission of the related BIM file, and simultaneously sends a control signaling, and verification disturbing data is configured in the data sent by the virtual access equipment.
As shown in fig. 2, the authorization authentication center is configured to assign the user terminal to different project groups, configure a virtual access device in response to an access request of the project group access data center, and configure different data access rights for different user terminals, where the rights are set in association with BIM project management attributes and IT management attributes, where the BIM project management attributes correspond to management hierarchy attributes in an enterprise project, and the IT management attributes are physical configuration information of devices where users are located;
the authorized authentication center is also used for configuring different data access rights for different users, flexibly setting the data access rights, rejecting unauthorized user access and malicious theft of safety equipment deployed at the network boundary of the data center line platform, setting a defined access control list, protecting data security and preventing malicious attack and data theft from an external network.
The authority information of the user comprises: the authorized authentication center provides accessible space for project members in the same gateway region group in a sharing mode, and configures data access rights. The access authority can be set according to the project, the post, the working property and the user role according to the actual needs.
The authority setting is associated with BIM project management and IT management, and by combining enterprise management layer information, hierarchical role attributes in project groups or IP address and MAC address information of project groups and user terminals in the division of network areas, a configuration user can access the data, access a data center for project group access and access, and virtual access equipment is configured, wherein the virtual access equipment can be a virtual access gateway, an SDN network technology is adopted, and the virtual access gateway configures an access port for the user terminals.
The data center sets shared file data and non-shared file data for lightening management data, and optionally only needs to control to the file data to be sharable and make identification under normal conditions, wherein the file shared data is configured at each server and sequentially configured at a high-bandwidth server which is preferentially accessed according to data access frequency, and the shared data is controlled in a data node mode, preferably is not controlled to a specific file, so as to optimize management workload.
The authority setting of the user is exemplified, and the authority table indexed for the shared file data according to the project requirement is added with the member and the access authority of the member, wherein the access authority can be read-write and/or read-only and/or off-line downloading.
IT can be known that the core of BIM management is data, the data security is very important, and efficiency and security mechanisms are considered, and the authorization and authentication center performs control on data access by using IT management information and item layering attribute as information for user communication, and the specific control is that a virtual access self-organizing network is built for access terminals in an enterprise in the authorization and authentication center, and the virtual access self-organizing network configures different virtual access devices for item groups where each user terminal is located.
And optionally, constructing different access terminal groups by taking virtual access equipment as an identifier in the access of the user terminal. Exemplary item a, item B, configures different virtual access devices for different groups. The virtual access device is used as a general interface of the project access data access device to access to a data center storing BIM files.
The authorization authentication center distinguishes data access to the data center, information data access sharing between the project group and project group members, thereby alleviating data access pressure. The authorization authentication center configures for each virtual access device a shared access key under the virtual access device, distributes a shared access key C for groups under each virtual access device, and configures for access terminals in the terminal a communication key S between devices among users, which performs association with each subgroup in the project group, namely the communication key S in the subgroup, and is configured for communication between different subgroups and for access communication with user terminals of different groups.
Based on the above transmission communication setting, when the network security device managed and controlled by the authorization authentication center among different project groups or in the project groups detects the transmission of the BIM file, the authorization authentication center can read the byte of the security message in the BIM file access or transmission configuration stage according to the communication destination node and the type of the access request through the security device proxy node set by the authorization authentication center, and can optionally only intercept and verify the information related to the authorized access level. Exemplary, when the access destination address is a data center, only the project communication group key is extracted, the project group key is verified to perform BIM file transmission and communication, and verification is performed on the communication key between user devices when BIM file transmission between project groups is performed.
Optionally, when different users, that is, corresponding user terminals, perform communication, the terminals configuring the two parties first exchange and negotiate a supported key set, if there is a key set supported by both parties, the key set is directly used for encryption, otherwise, a node communication key is applied to a virtual access device, that is, a gateway node, and the gateway node randomly selects a group of node communication keys from the maintained key set to be allocated to both parties, and both parties use the node communication key for encryption.
Optionally, controlling the spreading range of the communication keys of the user terminal nodes in the group, configuring the number N of node communication keys which can be allocated to each terminal node at most according to role information, wherein the role information configuration corresponds to a hierarchical structure in a project group or an enterprise group, and when the number N of node communication keys is up to N, the network node will allocate default inter-group communication keys for both communication parties when the network node needs to communicate with the terminal nodes without the same node communication keys.
When a user accesses data of a data center server, access is achieved through unified virtual access equipment, the authorization authentication center generates a plurality of keys or certificates, and the keys are matched according to the virtual access equipment corresponding to the project group. The key execution is configured in a segmented way, a communication group key and an intra-group communication key are respectively configured, and a key format is pre-configured in an authorized authentication center. The corresponding field is allowed to be hierarchically configured in a default mode in the communication access stage, when the corresponding key is in a default state, the corresponding key is supplemented in a default mode, and the user terminal obtains the corresponding communication key of the project group and the subgroup where the user terminal is located through the virtual access device.
The data center may define several public key encryption algorithms to form a public key encryption algorithm list, define several hash functions to form a hash function list, initialize them to virtual access devices in the project group, allocate a preset key S to each virtual access device, and allocate a buffer area to each access device of the project group and the access device of the access device, where the buffer area is used to store communication data generated in each communication process; the communication data includes a pre-downloaded BIM file.
For example, the data center may also generate several electronic certificates, where one of the electronic certificates remains in the data center, and the rest of the electronic certificates are distributed in the virtual access devices possibly participating in communication, as electronic certificates of the virtual access devices. When a user needs to access the data center, a communication request is initiated to the data center through the virtual access device, optionally, the following steps are performed: the public key encryption algorithm list, the hash function list, the electronic certificate and/or a random large integer RA which are installed by the virtual access equipment form a data message which is sent to the virtual access equipment, and the data of the message is simultaneously stored in the cache space of the virtual access equipment;
the data center receives the data message sent by the virtual access device, stores the data of the message into a cache space of the data center, takes out an electronic certificate of the virtual access device in the message, verifies the validity of the certificate and whether the certificate is issued by the user, and refuses the communication request if the verification is passed.
For example, when a data user requests to access a data BIM file of a data center, a data access request is made to an authorized authentication center; after the authorization authentication center authenticates the identity validity of the virtual access equipment, transmitting data to a cache check area of the virtual access equipment, wherein the virtual access equipment verifies the user attribute, the accessed data file attribute, the environment attribute and the related access control strategy from the management information side in the project group again, and judges whether a user of the data user terminal, namely the user terminal, has the access right of the data file; after verification is passed, the virtual access device distributes the attribute key of the corresponding file for the data user by the data authentication center, and sends the key ciphertext to the data user; after receiving the attribute key and the key ciphertext, the data user decrypts the key ciphertext by using the attribute key to obtain a symmetric encryption key of the data file, and then decrypts the data file ciphertext obtained from the data center, thereby completing access to the data file.
Optionally, checking whether the data file is tampered or not is further included, a hash code of information of the corresponding file is obtained through a hash function, whether hash values of data before and after transmission are equal or not is compared, whether the data is modified or not is judged, and if the hash values are equal, no tampering occurs; otherwise, the received data is indicated as potentially dangerous.
Optionally, a verification secondary verification step of the virtual access device is set, and when the data center feeds back that the virtual access device can execute data downloading interaction, attribute verification of a data user is executed in parallel, and parallel processing is adopted to improve information access efficiency. By setting the buffer space at the virtual access device, uninterrupted data downloading in the verification process is realized, and meanwhile, high-speed data transmission through the buffer space is realized after verification is passed, so that high efficiency and convenience for data transmission are realized.
Optionally, when the virtual access device fails to pass the recheck of the data user, i.e. the access terminal, the terminal interacts with the data of the data center and performs a purge of the buffer space.
The virtual access device directly forwards the access request of the terminal device in the project group, and simultaneously realizes the safety control of data in a secondary verification mode. The virtual access device can access, which is to allow the above terminal device to have IT management attribute to execute authorization for the virtual access device network, and to check the enterprise management angle attribute of the project management group for the second time, and to check again, to ensure that the downloaded data can be accessed and configured by the user with the corresponding authority attribute, and to check again, when ensuring access request access, to facilitate BIM data security control in the project group.
An exemplary specific way to verify security between the accessing and accessed devices is by way of a hash function.
The authorization authentication center takes out a public key encryption algorithm list from a data message sent by the virtual access equipment, and selects one public key encryption algorithm from the algorithm list as the public key encryption algorithm used for the communication; selecting a hash function hash from the hash function list as a hash function used in the communication, informing an access device, taking out a large integer RA from a data message by using a public key encryption algorithm and the hash function selected by a data center, storing the large integer RA in a memory, generating a random large integer RB, forming a data message by the RB and an electronic certificate of the RB and the electronic certificate of the RB to the access device, receiving the data message sent by the access device, taking out the RB and the electronic certificate from the message, verifying the legitimacy and identity authenticity of the electronic certificate, and executing subsequent data communication if verification is performed; otherwise, the communication is refused to continue and the communication is ended.
Based on the examples described above, features relating in one embodiment to method steps may be implemented by a computer device/system provided by the application, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements any of the methods described in the embodiments above when executing the program.
Those skilled in the art will appreciate that implementing all or part of the above-described embodiments of the method may be implemented by a computer program for instructing relevant hardware, where the program may be stored on a non-volatile computer readable storage medium, and in an embodiment of the present application, the program may be stored on a storage medium of a computer system and executed by at least one processor in the computer system to implement the method including the embodiments of the video playing method as described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
Accordingly, there is also provided a storage medium having stored thereon a computer program, wherein the program when executed by a processor realizes the method steps as referred to in any of the above embodiments.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (10)

1. A BIM-based information processing system, characterized by: the system comprises a data center, an authorization authentication center and a user terminal;
the data center is configured into a distributed storage mode and comprises a plurality of servers and a control center, wherein the servers are connected with the control center, the control center performs balancing processing on access loads of the servers, distributes different access inlets of the access data center for virtual access devices corresponding to different user terminals, and issues address information domain names of the access inlets to the virtual access devices corresponding to the user terminals;
the authorization authentication center is used for attributing the user terminal to different project groups, responding to the access request of the project group access data center and configuring virtual access equipment, configuring different data access rights for different user terminals, wherein the rights are set in association with BIM project management attributes and IT management attributes, the BIM project management attributes correspond to management hierarchy attributes in enterprise projects, and the IT management attributes are physical configuration information of the user terminal;
the user terminal accesses BIM files of the data center through virtual access equipment configured by the authorization authentication center; when the data center feeds back that the virtual access equipment can execute data downloading interaction, the virtual access equipment performs secondary verification according to BIM project management attributes of the user terminal, and sends BIM files to the user terminal according to verification results.
2. The system of claim 1, wherein: the setting of the rights associated with the BIM project management attribute and the IT management attribute includes: and configuring permission for accessing the BIM file according to project positions and user roles.
3. The system according to claim 2, wherein: the authorization authentication center is also used for providing accessible server space for user terminals in the same project group and configuring data access sharing authority; the data center distinguishes and configures shared file data and non-shared file data, and the authorization authentication center sets authority information for the shared file data.
4. A system as claimed in claim 3, wherein: setting rights information for shared file data includes: configuration for user terminals within a project group: read-write, read-only, offline download, and/or copy right.
5. The system as recited in claim 4, wherein: the authorization authentication center configures different identification information for different virtual access devices, wherein the identification information is used for distinguishing project groups formed by different user terminals, and the virtual access devices are used as a total interface of the project groups and are used for accessing a data center storing BIM files.
6. The system according to claim 5, wherein: the authorization authentication center configures a shared access key based on the corresponding virtual access device for each virtual access device, and configures a communication key in an item group, wherein the communication key in the item group is configured to be used for communication among different group members and access communication among user terminals of different groups.
7. The system of claim 6, wherein: when a user under the virtual access equipment accesses the data center, the authorization authentication center verifies the key information of the virtual access equipment, and when the group key verification is passed, the transmission of BIM files is executed, wherein the virtual access equipment is provided with a cache space, and the BIM files are cached in the virtual access equipment.
8. The system of claim 7, further characterized by: when the user terminal under the virtual access equipment accesses the data center, the authorization authentication center verifies the key information of the virtual access equipment, and when the group key verification is passed, the transmission of BIM files is executed, a cache space is arranged in the virtual access equipment, and the method further comprises the following steps of: when the virtual access device acquires the group key and passes verification, and receives the BIM file, the virtual access device executes verification on the user BIM management attribute information in the project group, and when the user BIM management attribute information passes verification, the virtual access device executes transmission of the BIM file.
9. The system of claim 8, further characterized by: the virtual access device is a virtual access gateway.
10. The system of claim 9, further characterized by: the virtual access device determines that the user terminal has a data access request through the MAC address and ID information of the user terminal and the pre-distributed secret key.
CN202311207656.6A 2023-09-19 2023-09-19 Information processing system based on BIM Active CN116956247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311207656.6A CN116956247B (en) 2023-09-19 2023-09-19 Information processing system based on BIM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311207656.6A CN116956247B (en) 2023-09-19 2023-09-19 Information processing system based on BIM

Publications (2)

Publication Number Publication Date
CN116956247A CN116956247A (en) 2023-10-27
CN116956247B true CN116956247B (en) 2023-11-28

Family

ID=88454908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311207656.6A Active CN116956247B (en) 2023-09-19 2023-09-19 Information processing system based on BIM

Country Status (1)

Country Link
CN (1) CN116956247B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118194417A (en) * 2024-05-17 2024-06-14 中国电子工程设计院股份有限公司 Information processing system for BIM

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105512730A (en) * 2015-12-02 2016-04-20 中国南方电网有限责任公司 BIM model-based data center operation and maintenance system
CN113191733A (en) * 2021-04-30 2021-07-30 金坤建设集团有限公司 Project multi-party collaborative management system and method based on Internet
CN114528567A (en) * 2022-01-28 2022-05-24 中银金融科技有限公司 Permission management method for shared data across data centers

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3614326A1 (en) * 2018-08-20 2020-02-26 Siemens Schweiz AG System and method for mapping a virtual building model
US20220343036A1 (en) * 2021-04-26 2022-10-27 Benjamin F. GLUNZ Method and system for automatically hosting, indexing, searching and distributing construction details

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105512730A (en) * 2015-12-02 2016-04-20 中国南方电网有限责任公司 BIM model-based data center operation and maintenance system
CN113191733A (en) * 2021-04-30 2021-07-30 金坤建设集团有限公司 Project multi-party collaborative management system and method based on Internet
CN114528567A (en) * 2022-01-28 2022-05-24 中银金融科技有限公司 Permission management method for shared data across data centers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于BIM的医疗建筑智慧建设运维管理系统研究;余芳强;曹强;许琳;;上海建设科技(第01期);全文 *

Also Published As

Publication number Publication date
CN116956247A (en) 2023-10-27

Similar Documents

Publication Publication Date Title
CN110598394B (en) Authority verification method and device and storage medium
US11171783B2 (en) System and method for decentralized identity management, authentication and authorization of applications
WO2022193985A1 (en) Data processing method and apparatus, and device and storage medium
US11683213B2 (en) Autonomous management of resources by an administrative node network
US8935398B2 (en) Access control in client-server systems
US9288193B1 (en) Authenticating cloud services
US20070101400A1 (en) Method of providing secure access to computer resources
KR20230048431A (en) Service communication methods, systems, devices and electronic devices
EP3777022B1 (en) Distributed access control
US10148637B2 (en) Secure authentication to provide mobile access to shared network resources
CA2524849A1 (en) Method of providing secure access to computer resources
EP2692107B1 (en) Managed authentication on a distributed network
KR20180111933A (en) Data transfer method, data use control method and encryption device
CN110061983A (en) A kind of data processing method and system
CN116956247B (en) Information processing system based on BIM
US11784819B2 (en) Dynamic segmentation of network traffic by use of pre-shared keys
CN111597583B (en) Data sharing and exchanging method based on block chain
US20180103037A1 (en) Resource access control using named capabilities
CN114172930B (en) Large-scale Internet of things service domain isolated communication method and device, electronic equipment and storage medium
US7526560B1 (en) Method and apparatus for sharing a secure connection between a client and multiple server nodes
Ferretti et al. Authorization transparency for accountable access to IoT services
US11431761B2 (en) Systems and methods for network management
CN114666341A (en) Decentralized SDP controller implementation method and computer storage medium
CN106533688A (en) Security authentication method and device
RU2797357C2 (en) Improvements in vehicle data or message transmission using scalable service oriented middleware over ip communication protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant