CN110519278B - Data security authentication method and system based on BIM - Google Patents
Data security authentication method and system based on BIM Download PDFInfo
- Publication number
- CN110519278B CN110519278B CN201910810288.1A CN201910810288A CN110519278B CN 110519278 B CN110519278 B CN 110519278B CN 201910810288 A CN201910810288 A CN 201910810288A CN 110519278 B CN110519278 B CN 110519278B
- Authority
- CN
- China
- Prior art keywords
- bim
- encrypted
- uploaded
- password
- logged
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a data security authentication method based on BIM and an authentication system thereof, wherein the authentication method comprises the following steps: s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received: if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed; if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed; and S2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server. The invention can encrypt the BIM drawing uploaded to the cloud of the server, prevent the labor achievement of technical personnel from being stolen and enhance the protection of technical privacy.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a data security authentication method and system based on BIM.
Background
The Building Information model (Building Information Modeling) is based on various relevant Information data of a construction engineering project, is established, and simulates real Information of a Building through digital Information. The method has eight characteristics of information completeness, information relevance, information consistency, visualization, coordination, simulation, optimization and graphing. However, the BIM drawing data uploaded to the cloud of the server is stolen due to management reasons, so that the result privacy of designers is disclosed, and the development of companies is not facilitated.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a data security authentication method and a data security authentication system based on BIM.
In order to achieve the above object, the present invention provides a data security authentication method based on BIM, which includes the following steps:
s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received:
if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed;
and S2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server.
In a preferred embodiment of the present invention, the method further includes step S3, and step S3 is to download the encrypted BIM drawing on the server to the local for the user to log in, and view the BIM drawing after decryption.
In a preferred embodiment of the present invention, step S3 includes the steps of:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
In a preferred embodiment of the present invention, step S2 includes the steps of:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
and S24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server.
In a preferred embodiment of the present invention, step S22 is: the BIM system obtains a Hash first code by using a to-be-uploaded BIM drawing through a Hash algorithm, and performs encryption calculation on the Hash first code by using a public key of a to-be-logged user to obtain an encrypted Hash first code;
and/or step S23 is: encrypting the BIM drawing to be uploaded by the encrypted password obtained in the step S21 to obtain first encrypted data of the BIM drawing to be uploaded, and then encrypting the first encrypted data of the BIM drawing to be uploaded by using the public key of the user to be logged in to obtain second encrypted data of the BIM drawing to be uploaded; and then, encrypting the second encrypted data of the BIM drawing to be uploaded by using a private key of the BIM system to obtain the third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S33 is: carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of a user to be logged in to obtain a decryption Hash first code;
and/or step S32 is: decrypting the encrypted BIM drawing data uploaded to the server by using a public key of the BIM system to obtain first decrypted data of the BIM drawing, and decrypting the first decrypted data of the BIM drawing by using a private key of a user to be logged in to obtain second decrypted data of the BIM drawing; and then decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain the third decrypted data of the BIM drawing.
In a preferred embodiment of the present invention, step S23 is: and encrypting the encrypted password obtained in the step S21 for the BIM drawing to be uploaded to obtain third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S32 is: and decrypting the encrypted BIM drawing data uploaded to the server by using the encrypted password to obtain third decrypted data of the BIM drawing.
The invention also discloses an authentication system of the BIM-based data security authentication method, which comprises a receiving judgment module, an uploading encryption module and a downloading decryption module;
the receiving and judging module is used for the BIM system to judge whether a password to be encrypted sent by a user to be logged in is received; if the BIM system receives a password to be encrypted sent by a user to be logged in, wherein the password to be encrypted comprises one or any combination of numbers, Chinese characters, capital letters, lowercase letters and special characters, the password to be encrypted is transmitted to an uploading encryption module;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; transmitting the password to be encrypted to an uploading encryption module;
the uploading encryption module is used for encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server;
and the downloading decryption module is used for downloading the encrypted BIM drawing on the server to the local by the user to be logged in, and viewing the BIM drawing after decryption.
In a preferred embodiment of the present invention, the upload encryption module comprises the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
s24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server;
the download decryption module comprises the following steps:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
In conclusion, due to the adoption of the technical scheme, the BIM drawing uploaded to the cloud of the server can be encrypted, so that the labor achievement of technical personnel is prevented from being stolen, and the technical privacy protection is enhanced.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a data security authentication method based on BIM (building information modeling), which comprises the following steps as shown in figure 1:
s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received:
if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed;
and S2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server.
In a preferred embodiment of the present invention, the method further includes step S3, and step S3 is to download the encrypted BIM drawing on the server to the local for the user to log in, and view the BIM drawing after decryption.
In a preferred embodiment of the present invention, step S3 includes the steps of:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
In a preferred embodiment of the present invention, step S2 includes the steps of:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in; in this embodiment, the BIM system encrypts the password to be encrypted by using one of RSA, Elgamal, knapsack algorithm, Rabin, and D-H, ECC, preferably, RSA128, using the public key of the user to be logged in.
S22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code; in the present embodiment, the Hash algorithm may be used, but not limited to, MD5, and may also be used SHA-1 or SHA-256.
S23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded; in this embodiment, the encrypted password obtained in step S21 is encrypted by one of DES, 3DES, TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK, and AES, preferably by 3 DES. In addition, the private key of the BIM system is used for encrypting the first encrypted data of the BIM drawing to be uploaded by adopting RSA128, and the public key of the user to be logged in is used for encrypting the second encrypted data of the BIM drawing to be uploaded by adopting RSA 128.
And S24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server. In this embodiment, the public key of the BIM system or the public key of the user to be logged in is used as an index for uploading the packaged data, so that the file uploaded to the server can be conveniently searched.
In a preferred embodiment of the present invention, step S22 is: the BIM system obtains a Hash first code by using a to-be-uploaded BIM drawing through a Hash algorithm, and performs encryption calculation on the Hash first code by using a public key of a to-be-logged user to obtain an encrypted Hash first code;
and/or step S23 is: encrypting the BIM drawing to be uploaded by the encrypted password obtained in the step S21 to obtain first encrypted data of the BIM drawing to be uploaded, and then encrypting the first encrypted data of the BIM drawing to be uploaded by using the public key of the user to be logged in to obtain second encrypted data of the BIM drawing to be uploaded; and then, encrypting the second encrypted data of the BIM drawing to be uploaded by using a private key of the BIM system to obtain the third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S33 is: carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of a user to be logged in to obtain a decryption Hash first code;
and/or step S32 is: decrypting the encrypted BIM drawing data uploaded to the server by using a public key of the BIM system to obtain first decrypted data of the BIM drawing, and decrypting the first decrypted data of the BIM drawing by using a private key of a user to be logged in to obtain second decrypted data of the BIM drawing; and then decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain the third decrypted data of the BIM drawing.
In a preferred embodiment of the present invention, step S23 is: and encrypting the encrypted password obtained in the step S21 for the BIM drawing to be uploaded to obtain third encrypted data of the BIM drawing to be uploaded.
In a preferred embodiment of the present invention, step S32 is: and decrypting the encrypted BIM drawing data uploaded to the server by using the encrypted password to obtain third decrypted data of the BIM drawing.
The invention also discloses an authentication system of the BIM-based data security authentication method, which comprises a receiving judgment module, an uploading encryption module and a downloading decryption module;
the receiving and judging module is used for the BIM system to judge whether a password to be encrypted sent by a user to be logged in is received; if the BIM system receives a password to be encrypted sent by a user to be logged in, wherein the password to be encrypted comprises one or any combination of numbers, Chinese characters, capital letters, lowercase letters and special characters, the password to be encrypted is transmitted to an uploading encryption module;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; transmitting the password to be encrypted to an uploading encryption module;
the uploading encryption module is used for encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server;
and the downloading decryption module is used for downloading the encrypted BIM drawing on the server to the local by the user to be logged in, and viewing the BIM drawing after decryption.
In a preferred embodiment of the present invention, the upload encryption module comprises the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the public key of the BIM system is used for carrying out encryption calculation on the Hash first code to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
s24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server;
the download decryption module comprises the following steps:
s31, downloading the encrypted BIM drawing data uploaded to the server to the local by the user to be logged in;
s32, decrypting the encrypted BIM drawing data uploaded to the server by using the private key of the user to be logged in to obtain first decrypted data of the BIM drawing; decrypting the first decrypted data of the BIM drawing by using a public key of the BIM system to obtain second decrypted data of the BIM drawing, and decrypting the second decrypted data of the BIM drawing by using the encrypted password to obtain third decrypted data of the BIM drawing;
s33, carrying out Hash algorithm on third decryption data of the BIM drawing obtained in the step S32 to obtain a decryption Hash code, and carrying out encryption calculation on the decryption Hash code by using a public key of the BIM system to obtain a first decryption Hash code;
s34, judging whether the first decrypted Hash code is the same as the first encrypted Hash code:
if the decrypted Hash first code is different from the encrypted Hash first code, finding the uploaded encrypted BIM drawing by taking a public key of a user to be logged in or a public key of a BIM system as an index;
and if the decrypted Hash first code is the same as the encrypted Hash first code, the third decrypted data of the BIM drawing obtained in the step S32 is the BIM drawing uploaded by the BIM system.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (6)
1. A data security authentication method based on BIM is characterized by comprising the following steps:
s1, the BIM system judges whether the password to be encrypted sent by the user to be logged in is received:
if the BIM system receives a password to be encrypted sent by the user to be logged in, where the password to be encrypted includes one or any combination of numbers, chinese characters, capital letters, lowercase letters, and special characters, then step S2 is executed;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; step S2 is executed;
s2, encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to a server;
step S2 includes the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the Hash first code is encrypted and calculated by the aid of a private key of the BIM system to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
and S24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server.
2. The BIM-based data security authentication method of claim 1, further comprising a step S3, wherein the step S3 is to download the encrypted BIM drawing on the server to the local for the user to log in, and view the BIM drawing after decryption.
3. The BIM-based data security authentication method of claim 1, wherein step S22 is: the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the Hash first code is encrypted and calculated by the aid of a public key of a user to be logged in, so that an encrypted Hash first code is obtained.
4. The BIM-based data security authentication method of claim 1, wherein step S23 is: encrypting the BIM drawing to be uploaded by the encrypted password obtained in the step S21 to obtain first encrypted data of the BIM drawing to be uploaded, and then encrypting the first encrypted data of the BIM drawing to be uploaded by using the public key of the user to be logged in to obtain second encrypted data of the BIM drawing to be uploaded; and then, encrypting the second encrypted data of the BIM drawing to be uploaded by using a private key of the BIM system to obtain the third encrypted data of the BIM drawing to be uploaded.
5. The BIM-based data security authentication method of claim 1, wherein step S23 is: and encrypting the encrypted password obtained in the step S21 for the BIM drawing to be uploaded to obtain third encrypted data of the BIM drawing to be uploaded.
6. The authentication system of the BIM-based data security authentication method according to any one of claims 1 to 5, comprising a receiving and judging module, an uploading encryption module and a downloading decryption module;
the receiving and judging module is used for the BIM system to judge whether a password to be encrypted sent by a user to be logged in is received; if the BIM system receives a password to be encrypted sent by a user to be logged in, wherein the password to be encrypted comprises one or any combination of numbers, Chinese characters, capital letters, lowercase letters and special characters, the password to be encrypted is transmitted to an uploading encryption module;
if the BIM system does not receive the password to be encrypted sent by the user to be logged in, the BIM system sends the password to be encrypted, which is sent to the BIM system by the user to be logged in last time, to the user to be logged in; transmitting the password to be encrypted to an uploading encryption module;
the uploading encryption module is used for encrypting the BIM drawing by the BIM system and uploading the encrypted BIM drawing to the server;
the uploading encryption module comprises the following steps:
s21, the BIM system encrypts the password to be encrypted by using the public key of the user to be logged in to obtain an encrypted password, and the BIM system sends the obtained encrypted password to the user to be logged in;
s22, the BIM system obtains a Hash first code by the aid of a Hash algorithm on the BIM drawing to be uploaded, and the Hash first code is encrypted and calculated by the aid of a private key of the BIM system to obtain an encrypted Hash first code;
s23, encrypting the encrypted password obtained in the step S21 to the BIM drawing to be uploaded to obtain the first encrypted data of the BIM drawing to be uploaded, encrypting the first encrypted data of the BIM drawing to be uploaded by using a private key of a BIM system to obtain the second encrypted data of the BIM drawing to be uploaded, and encrypting the second encrypted data of the BIM drawing to be uploaded by using a public key of a user to be logged in to obtain the third encrypted data of the BIM drawing to be uploaded;
s24, packaging and uploading the encrypted Hash first code obtained in the step S22 and the encrypted data to be uploaded for the third time of the BIM drawing obtained in the step S23 to a server;
and the downloading decryption module is used for downloading the encrypted BIM drawing on the server to the local by the user to be logged in, and viewing the BIM drawing after decryption.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910810288.1A CN110519278B (en) | 2019-08-29 | 2019-08-29 | Data security authentication method and system based on BIM |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910810288.1A CN110519278B (en) | 2019-08-29 | 2019-08-29 | Data security authentication method and system based on BIM |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN110519278A CN110519278A (en) | 2019-11-29 |
| CN110519278B true CN110519278B (en) | 2021-07-20 |
Family
ID=68628121
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910810288.1A Active CN110519278B (en) | 2019-08-29 | 2019-08-29 | Data security authentication method and system based on BIM |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110519278B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111581605B (en) * | 2020-04-20 | 2023-08-08 | 广州珠江外资建筑设计院有限公司 | Block chain-based multi-person participation BIM drawing copyright protection system and method |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102004864A (en) * | 2009-08-28 | 2011-04-06 | 台达电子工业股份有限公司 | Data transmission and anti-copying method for human-computer interface device by mass storage grade |
| CN103684765A (en) * | 2013-12-24 | 2014-03-26 | 歌尔声学股份有限公司 | Method and device for ciphering and deciphering data in management system |
| CN110008658A (en) * | 2019-03-21 | 2019-07-12 | 深圳点猫科技有限公司 | A kind of code encryption method and system supervised |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7181623B2 (en) * | 2000-03-28 | 2007-02-20 | University Of Maryland | Scalable wide-area upload system and method |
| CN105812124A (en) * | 2014-12-31 | 2016-07-27 | 环达电脑(上海)有限公司 | Password generation method and password verification method |
-
2019
- 2019-08-29 CN CN201910810288.1A patent/CN110519278B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102004864A (en) * | 2009-08-28 | 2011-04-06 | 台达电子工业股份有限公司 | Data transmission and anti-copying method for human-computer interface device by mass storage grade |
| CN103684765A (en) * | 2013-12-24 | 2014-03-26 | 歌尔声学股份有限公司 | Method and device for ciphering and deciphering data in management system |
| CN110008658A (en) * | 2019-03-21 | 2019-07-12 | 深圳点猫科技有限公司 | A kind of code encryption method and system supervised |
Also Published As
| Publication number | Publication date |
|---|---|
| CN110519278A (en) | 2019-11-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111092717B (en) | Secure and reliable communication method based on group authentication in smart home environment | |
| CN102685093B (en) | A kind of identity authorization system based on mobile terminal and method | |
| CN105656859B (en) | Tax control equipment software safety online upgrading method and system | |
| CN109034796B (en) | Alliance chain-based transaction supervision method, electronic device and readable storage medium | |
| WO2021120871A1 (en) | Authentication key negotiation method and apparatus, storage medium and device | |
| CN105553951A (en) | Data transmission method and data transmission device | |
| CN104219228A (en) | User registration and user identification method and user registration and user identification system | |
| US11128452B2 (en) | Encrypted data sharing with a hierarchical key structure | |
| CN106790045B (en) | distributed virtual machine agent device based on cloud environment and data integrity guarantee method | |
| CN104125239B (en) | A kind of method for network authorization transmitted based on data link encryption and system | |
| CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
| CN107453880A (en) | A cloud data security storage method and system | |
| CN113890731A (en) | Key management method, key management device, electronic equipment and storage medium | |
| CN113722741A (en) | Data encryption method and device and data decryption method and device | |
| CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
| CN116502732A (en) | Federal learning method and system based on trusted execution environment | |
| US10129025B2 (en) | Binding data to a network in the presence of an entity with revocation capabilities | |
| US9762388B2 (en) | Symmetric secret key protection | |
| CN110519278B (en) | Data security authentication method and system based on BIM | |
| CN110516460B (en) | Encryption security method and system for BIM data | |
| CN107592295A (en) | A kind of encryption method of big data | |
| CN111212026A (en) | Data processing method and device based on block chain and computer equipment | |
| CN111008400A (en) | Data processing method, device and system | |
| CN119094137A (en) | Data access control method and system based on attribute encryption and zero trust architecture | |
| CN118573438A (en) | Intelligent equipment activation method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20220520 Address after: 400000 24-1, No. 58-7, shabin Road, Shapingba District, Chongqing Patentee after: Zhuzhijian Technology (Chongqing) Co.,Ltd. Address before: 400042 5-3, building 1, No.16 shijitian street, Yuzhong District, Chongqing Patentee before: Chongqing Zhuzhijian Information Technology Co.,Ltd. |