[go: up one dir, main page]

CN110519278B - Data security authentication method and system based on BIM - Google Patents

Data security authentication method and system based on BIM Download PDF

Info

Publication number
CN110519278B
CN110519278B CN201910810288.1A CN201910810288A CN110519278B CN 110519278 B CN110519278 B CN 110519278B CN 201910810288 A CN201910810288 A CN 201910810288A CN 110519278 B CN110519278 B CN 110519278B
Authority
CN
China
Prior art keywords
bim
encrypted
uploaded
password
logged
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910810288.1A
Other languages
Chinese (zh)
Other versions
CN110519278A (en
Inventor
赵亮
郭双清
张凤岐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuzhijian Technology Chongqing Co ltd
Original Assignee
Chongqing Zhuzhijian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Zhuzhijian Information Technology Co ltd filed Critical Chongqing Zhuzhijian Information Technology Co ltd
Priority to CN201910810288.1A priority Critical patent/CN110519278B/en
Publication of CN110519278A publication Critical patent/CN110519278A/en
Application granted granted Critical
Publication of CN110519278B publication Critical patent/CN110519278B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides a data security authentication method based on BIM and an authentication system thereof, wherein the authentication method comprises the following steps: s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received: if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed; if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed; and S2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server. The invention can encrypt the BIM drawing uploaded to the cloud of the server, prevent the labor achievement of technical personnel from being stolen and enhance the protection of technical privacy.

Description

Data security authentication method and system based on BIM
Technical Field
The invention relates to the technical field of data security, in particular to a data security authentication method and system based on BIM.
Background
The Building Information model (Building Information Modeling) is based on various relevant Information data of a construction engineering project, is established, and simulates real Information of a Building through digital Information. The method has eight characteristics of information completeness, information relevance, information consistency, visualization, coordination, simulation, optimization and graphing. However, the BIM drawing data uploaded to the cloud of the server is stolen due to management reasons, so that the result privacy of designers is disclosed, and the development of companies is not facilitated.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a data security authentication method and a data security authentication system based on BIM.
In order to achieve the above object, the present invention provides a data security authentication method based on BIM, which includes the following steps:
s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received:
if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed;
and S2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server.
In a preferred embodiment of the present invention, the method further includes step S3, and step S3 is to download the encrypted BIM drawing on the server to the local for the user to log in, and view the BIM drawing after decryption.
In a preferred embodiment of the present invention, step S3 includes the steps of:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
In a preferred embodiment of the present invention, step S2 includes the steps of:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
and S24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server.
In a preferred embodiment of the present invention, step S22 is: the BIM system obtains a Hash first code by using a to-be-uploaded BIM drawing through a Hash algorithm, and performs encryption calculation on the Hash first code by using a public key of a to-be-logged user to obtain an encrypted Hash first code;
and/or step S23 is: encrypting the BIM drawing to be uploaded by the encrypted password obtained in the step S21 to obtain first encrypted data of the BIM drawing to be uploaded, and then encrypting the first encrypted data of the BIM drawing to be uploaded by using the public key of the user to be logged in to obtain second encrypted data of the BIM drawing to be uploaded; and then, encrypting the second encrypted data of the BIM drawing to be uploaded by using a private key of the BIM system to obtain the third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S33 is: carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of a user to be logged in to obtain a decryption Hash first code;
and/or step S32 is: decrypting the encrypted BIM drawing data uploaded to the server by using a public key of the BIM system to obtain first decrypted data of the BIM drawing, and decrypting the first decrypted data of the BIM drawing by using a private key of a user to be logged in to obtain second decrypted data of the BIM drawing; and then decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain the third decrypted data of the BIM drawing.
In a preferred embodiment of the present invention, step S23 is: and encrypting the encrypted password obtained in the step S21 for the BIM drawing to be uploaded to obtain third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S32 is: and decrypting the encrypted BIM drawing data uploaded to the server by using the encrypted password to obtain third decrypted data of the BIM drawing.
The invention also discloses an authentication system of the BIM-based data security authentication method, which comprises a receiving judgment module, an uploading encryption module and a downloading decryption module;
the receiving and judging module is used for the BIM system to judge whether a password to be encrypted sent by a user to be logged in is received; if the BIM system receives a password to be encrypted sent by a user to be logged in, wherein the password to be encrypted comprises one or any combination of numbers, Chinese characters, capital letters, lowercase letters and special characters, the password to be encrypted is transmitted to an uploading encryption module;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; transmitting the password to be encrypted to an uploading encryption module;
the uploading encryption module is used for encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server;
and the downloading decryption module is used for downloading the encrypted BIM drawing on the server to the local by the user to be logged in, and viewing the BIM drawing after decryption.
In a preferred embodiment of the present invention, the upload encryption module comprises the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
s24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server;
the download decryption module comprises the following steps:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
In conclusion, due to the adoption of the technical scheme, the BIM drawing uploaded to the cloud of the server can be encrypted, so that the labor achievement of technical personnel is prevented from being stolen, and the technical privacy protection is enhanced.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a data security authentication method based on BIM (building information modeling), which comprises the following steps as shown in figure 1:
s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received:
if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed;
and S2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server.
In a preferred embodiment of the present invention, the method further includes step S3, and step S3 is to download the encrypted BIM drawing on the server to the local for the user to log in, and view the BIM drawing after decryption.
In a preferred embodiment of the present invention, step S3 includes the steps of:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
In a preferred embodiment of the present invention, step S2 includes the steps of:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in; in this embodiment, the BIM system encrypts the password to be encrypted by using one of RSA, Elgamal, knapsack algorithm, Rabin, and D-H, ECC, preferably, RSA128, using the public key of the user to be logged in.
S22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code; in the present embodiment, the Hash algorithm may be used, but not limited to, MD5, and may also be used SHA-1 or SHA-256.
S23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded; in this embodiment, the encrypted password obtained in step S21 is encrypted by one of DES, 3DES, TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK, and AES, preferably by 3 DES. In addition, the private key of the BIM system is used for encrypting the first encrypted data of the BIM drawing to be uploaded by adopting RSA128, and the public key of the user to be logged in is used for encrypting the second encrypted data of the BIM drawing to be uploaded by adopting RSA 128.
And S24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server. In this embodiment, the public key of the BIM system or the public key of the user to be logged in is used as an index for uploading the packaged data, so that the file uploaded to the server can be conveniently searched.
In a preferred embodiment of the present invention, step S22 is: the BIM system obtains a Hash first code by using a to-be-uploaded BIM drawing through a Hash algorithm, and performs encryption calculation on the Hash first code by using a public key of a to-be-logged user to obtain an encrypted Hash first code;
and/or step S23 is: encrypting the BIM drawing to be uploaded by the encrypted password obtained in the step S21 to obtain first encrypted data of the BIM drawing to be uploaded, and then encrypting the first encrypted data of the BIM drawing to be uploaded by using the public key of the user to be logged in to obtain second encrypted data of the BIM drawing to be uploaded; and then, encrypting the second encrypted data of the BIM drawing to be uploaded by using a private key of the BIM system to obtain the third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S33 is: carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of a user to be logged in to obtain a decryption Hash first code;
and/or step S32 is: decrypting the encrypted BIM drawing data uploaded to the server by using a public key of the BIM system to obtain first decrypted data of the BIM drawing, and decrypting the first decrypted data of the BIM drawing by using a private key of a user to be logged in to obtain second decrypted data of the BIM drawing; and then decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain the third decrypted data of the BIM drawing.
In a preferred embodiment of the present invention, step S23 is: and encrypting the encrypted password obtained in the step S21 for the BIM drawing to be uploaded to obtain third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S32 is: and decrypting the encrypted BIM drawing data uploaded to the server by using the encrypted password to obtain third decrypted data of the BIM drawing.
The invention also discloses an authentication system of the BIM-based data security authentication method, which comprises a receiving judgment module, an uploading encryption module and a downloading decryption module;
the receiving and judging module is used for the BIM system to judge whether a password to be encrypted sent by a user to be logged in is received; if the BIM system receives a password to be encrypted sent by a user to be logged in, wherein the password to be encrypted comprises one or any combination of numbers, Chinese characters, capital letters, lowercase letters and special characters, the password to be encrypted is transmitted to an uploading encryption module;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; transmitting the password to be encrypted to an uploading encryption module;
the uploading encryption module is used for encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server;
and the downloading decryption module is used for downloading the encrypted BIM drawing on the server to the local by the user to be logged in, and viewing the BIM drawing after decryption.
In a preferred embodiment of the present invention, the upload encryption module comprises the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
s24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server;
the download decryption module comprises the following steps:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (6)

1. A data security authentication method based on BIM is characterized by comprising the following steps:
s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received:
if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed;
s2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to a server;
step S2 includes the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the Hash first code is encrypted and calculated by the aid of a private key of the BIM system to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
and S24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server.
2. The BIM-based data security authentication method of claim 1, further comprising a step S3, wherein the step S3 is to download the encrypted BIM drawing on the server to the local for the user to log in, and view the BIM drawing after decryption.
3. The BIM-based data security authentication method of claim 1, wherein step S22 is: the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the Hash first code is encrypted and calculated by the aid of a public key of a user to be logged in, so that an encrypted Hash first code is obtained.
4. The BIM-based data security authentication method of claim 1, wherein step S23 is: encrypting the BIM drawing to be uploaded by the encrypted password obtained in the step S21 to obtain first encrypted data of the BIM drawing to be uploaded, and then encrypting the first encrypted data of the BIM drawing to be uploaded by using the public key of the user to be logged in to obtain second encrypted data of the BIM drawing to be uploaded; and then, encrypting the second encrypted data of the BIM drawing to be uploaded by using a private key of the BIM system to obtain the third encrypted data of the BIM drawing to be uploaded.
5. The BIM-based data security authentication method of claim 1, wherein step S23 is: and encrypting the encrypted password obtained in the step S21 for the BIM drawing to be uploaded to obtain third encrypted data of the BIM drawing to be uploaded.
6. The authentication system of the BIM-based data security authentication method according to any one of claims 1 to 5, comprising a receiving and judging module, an uploading encryption module and a downloading decryption module;
the receiving and judging module is used for the BIM system to judge whether a password to be encrypted sent by a user to be logged in is received; if the BIM system receives a password to be encrypted sent by a user to be logged in, wherein the password to be encrypted comprises one or any combination of numbers, Chinese characters, capital letters, lowercase letters and special characters, the password to be encrypted is transmitted to an uploading encryption module;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; transmitting the password to be encrypted to an uploading encryption module;
the uploading encryption module is used for encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server;
the uploading encryption module comprises the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the Hash first code is encrypted and calculated by the aid of a private key of the BIM system to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
s24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server;
and the downloading decryption module is used for downloading the encrypted BIM drawing on the server to the local by the user to be logged in, and viewing the BIM drawing after decryption.
CN201910810288.1A 2019-08-29 2019-08-29 Data security authentication method and system based on BIM Active CN110519278B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910810288.1A CN110519278B (en) 2019-08-29 2019-08-29 Data security authentication method and system based on BIM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910810288.1A CN110519278B (en) 2019-08-29 2019-08-29 Data security authentication method and system based on BIM

Publications (2)

Publication Number Publication Date
CN110519278A CN110519278A (en) 2019-11-29
CN110519278B true CN110519278B (en) 2021-07-20

Family

ID=68628121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910810288.1A Active CN110519278B (en) 2019-08-29 2019-08-29 Data security authentication method and system based on BIM

Country Status (1)

Country Link
CN (1) CN110519278B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581605B (en) * 2020-04-20 2023-08-08 广州珠江外资建筑设计院有限公司 Block chain-based multi-person participation BIM drawing copyright protection system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004864A (en) * 2009-08-28 2011-04-06 台达电子工业股份有限公司 Data transmission and anti-copying method for human-computer interface device by mass storage grade
CN103684765A (en) * 2013-12-24 2014-03-26 歌尔声学股份有限公司 Method and device for ciphering and deciphering data in management system
CN110008658A (en) * 2019-03-21 2019-07-12 深圳点猫科技有限公司 A kind of code encryption method and system supervised

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181623B2 (en) * 2000-03-28 2007-02-20 University Of Maryland Scalable wide-area upload system and method
CN105812124A (en) * 2014-12-31 2016-07-27 环达电脑(上海)有限公司 Password generation method and password verification method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004864A (en) * 2009-08-28 2011-04-06 台达电子工业股份有限公司 Data transmission and anti-copying method for human-computer interface device by mass storage grade
CN103684765A (en) * 2013-12-24 2014-03-26 歌尔声学股份有限公司 Method and device for ciphering and deciphering data in management system
CN110008658A (en) * 2019-03-21 2019-07-12 深圳点猫科技有限公司 A kind of code encryption method and system supervised

Also Published As

Publication number Publication date
CN110519278A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
CN111092717B (en) Secure and reliable communication method based on group authentication in smart home environment
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
CN105656859B (en) Tax control equipment software safety online upgrading method and system
CN109034796B (en) Alliance chain-based transaction supervision method, electronic device and readable storage medium
WO2021120871A1 (en) Authentication key negotiation method and apparatus, storage medium and device
CN105553951A (en) Data transmission method and data transmission device
CN104219228A (en) User registration and user identification method and user registration and user identification system
US11128452B2 (en) Encrypted data sharing with a hierarchical key structure
CN106790045B (en) distributed virtual machine agent device based on cloud environment and data integrity guarantee method
CN104125239B (en) A kind of method for network authorization transmitted based on data link encryption and system
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN107453880A (en) A cloud data security storage method and system
CN113890731A (en) Key management method, key management device, electronic equipment and storage medium
CN113722741A (en) Data encryption method and device and data decryption method and device
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN116502732A (en) Federal learning method and system based on trusted execution environment
US10129025B2 (en) Binding data to a network in the presence of an entity with revocation capabilities
US9762388B2 (en) Symmetric secret key protection
CN110519278B (en) Data security authentication method and system based on BIM
CN110516460B (en) Encryption security method and system for BIM data
CN107592295A (en) A kind of encryption method of big data
CN111212026A (en) Data processing method and device based on block chain and computer equipment
CN111008400A (en) Data processing method, device and system
CN119094137A (en) Data access control method and system based on attribute encryption and zero trust architecture
CN118573438A (en) Intelligent equipment activation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220520

Address after: 400000 24-1, No. 58-7, shabin Road, Shapingba District, Chongqing

Patentee after: Zhuzhijian Technology (Chongqing) Co.,Ltd.

Address before: 400042 5-3, building 1, No.16 shijitian street, Yuzhong District, Chongqing

Patentee before: Chongqing Zhuzhijian Information Technology Co.,Ltd.