CN106302472B - Information hiding method and device - Google Patents

Information hiding method and device Download PDF

Info

Publication number
CN106302472B
CN106302472B CN201610686677.4A CN201610686677A CN106302472B CN 106302472 B CN106302472 B CN 106302472B CN 201610686677 A CN201610686677 A CN 201610686677A CN 106302472 B CN106302472 B CN 106302472B
Authority
CN
China
Prior art keywords
information
user
plaintext
module
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610686677.4A
Other languages
Chinese (zh)
Other versions
CN106302472A (en
Inventor
黄亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
One Morgan (Xiamen) supply chain Technology Co.,Ltd.
Original Assignee
Xiamen Enjoy New Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Enjoy New Network Technology Co Ltd filed Critical Xiamen Enjoy New Network Technology Co Ltd
Publication of CN106302472A publication Critical patent/CN106302472A/en
Application granted granted Critical
Publication of CN106302472B publication Critical patent/CN106302472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0471Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a device for hiding information, wherein the method comprises the following steps: acquiring plaintext information input by a user, splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers; according to a preset encryption algorithm, carrying out encryption processing on the split stored plaintext information to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information; when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems. The invention ensures that no matter how the information is intercepted in the process of transmitting the information between the internet or the system, the plaintext information really input by the user can not be obtained, thereby avoiding the user information from being randomly acquired and utilized and effectively realizing the hiding of the information.

Description

Information hiding method and device
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a method and an apparatus for hiding information.
Background
In order to protect the privacy of the user, a telecom operator pushes out the mobile phone small number service on the basis of call forwarding, and the call is forwarded to the real number of the user in a call forwarding mode through the small number or the temporary small number selected by the user, so that the purpose of less exposing or hiding the real number is achieved. In some cases, the sensitive information is hidden by a star sign in a visible state, so that the surface of the sensitive information cannot be seen, and the sensitive information is actually transmitted in a plaintext mode when being transmitted on the internet or between systems.
The hiding mode of the information has the following defects: first, the way of the small number forwarding is single in function, although the small number can be used for forwarding, the using range is limited, and the principle is call forwarding. The earliest call forwarding was number-to-number forwarding and now only became call forwarding by way of a small number, essentially call forwarding. In many occasions, there is no way to hide the real number, for example, when registering a mobile application through a mobile phone number, the authenticity of the mobile phone number is usually verified in a manner of obtaining a short message, and in the verification process, a third party can obtain the real number of the user. Second, call forwarding also increases the cost of use for the subscriber.
Most importantly, when information is transmitted in a plaintext mode on the internet or between systems, once transmitted data is intercepted, the information is completely leaked, and the hiding of the information cannot be effectively realized at all.
Disclosure of Invention
In order to more comprehensively and effectively realize information hiding, the invention provides an information hiding method and device, which provides a more reliable hiding mode for information needing to be hidden, such as a mobile phone number of a user, and the like, and can avoid information leakage in the transmission process.
The information hiding method provided by the invention comprises the following steps:
acquiring plaintext information input by a user;
splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers;
encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information;
and when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems.
As an implementation, the plaintext information includes one or more of a name, a mobile phone number, a telephone number, and a communication address of the user.
As an implementation, the identification code is composed of the following form: letters, numbers, or a combination of letters and numbers.
As an implementation manner, after the plaintext information inputted by the user is transmitted in place of the plaintext information line by the identification code when being called, the method further comprises the following steps:
receiving the identification code;
restoring the storage position of the information to be called by using parity check according to the identification code to obtain corresponding ciphertext information;
and decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
As an implementation manner, after the ciphertext information is decrypted according to a preset decryption algorithm and corresponding plaintext information is obtained, the method further includes the following steps:
and when the called plaintext information is a telephone number and communication connection needs to be established, directly initiating communication connection to the currently called telephone number in the system.
As an implementable manner, when the called plaintext information is a phone number and a communication connection needs to be established, directly initiating establishment of a communication connection to the currently called phone number inside the system, including the following steps:
initiating a communication connection to the currently called telephone number;
after the communication connection with the currently called telephone number is successful, the callback connection to the user is initiated in a callback mode;
and after the call connection between the currently called telephone number and the user is successful, ending the current call.
Correspondingly, the invention also provides an information hiding device, which comprises an acquisition module, a storage module, an encryption module and a transmission module;
the acquisition module is used for acquiring plaintext information input by a user;
the storage module is used for splitting the plaintext information and respectively and randomly storing the split plaintext information to a plurality of cloud servers;
the encryption module is used for encrypting the split stored plaintext information according to a preset encryption algorithm, generating a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, generating a random identification code according to the parity check information and storing the random identification code;
and the transmission module is used for replacing the plaintext information with the identification code to transmit between systems when the plaintext information input by the user is called.
As an implementable manner, the information hiding device of the invention further comprises a receiving module, a positioning module and a decryption module;
the receiving module is used for receiving the identification code;
the positioning module is used for restoring the storage position of the information to be called by using parity check according to the identification code to acquire corresponding ciphertext information;
and the decryption module is used for decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
As an implementable mode, the information hiding device further comprises a dialing module;
and the dialing module is used for directly initiating communication connection to the currently called telephone number in the system when the called plaintext information is the telephone number and communication connection needs to be established.
As an implementation manner, the dialing module comprises a first communication unit, a second communication unit and a control unit;
the first communication unit is used for initiating communication connection to the currently called telephone number;
the second communication unit is used for initiating a callback connection to a user in a callback mode after the communication connection initiated by the first communication unit with the currently called telephone number is successful;
and the control unit is used for finishing the current calling after the call connection between the currently called telephone number and the user is successful.
Compared with the prior art, the invention has the beneficial effects that:
according to the information hiding method and device, firstly, plaintext information input by a user is obtained, the plaintext information is split, and the split plaintext information is respectively and randomly stored on a plurality of cloud servers; secondly, encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information; and finally, when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems. According to the invention, through information combination on the information input by the user, no matter how the information is intercepted in the process of transmitting the information between the Internet or the system, the plaintext information really input by the user cannot be obtained. Therefore, the user information is prevented from being randomly acquired and utilized, and the information is effectively hidden.
Drawings
Fig. 1 is a schematic flowchart of a method for hiding information according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an information hiding apparatus according to an embodiment of the present invention.
Detailed Description
The above and further features and advantages of the present invention will be apparent from the following, complete description of the invention, taken in conjunction with the accompanying drawings, wherein the described embodiments are merely some, but not all embodiments of the invention.
Referring to fig. 1, a method for hiding information according to an embodiment of the present invention includes the following steps:
and S100, acquiring plaintext information input by a user.
The plaintext information input by the user can be one or more of the name, the mobile phone number, the fixed phone number and the communication address of the user, and can also be other digital or character information.
S200, splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers.
And after the complete plaintext information input by the user is split, randomly and respectively storing the split complete plaintext information on different cloud servers. Therefore, when safety accident information leakage occurs to a certain cloud server, the leaked split random information cannot be used independently, and information safety is enhanced.
S300, encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information.
And encrypting the split stored plaintext information by adopting a preset encryption algorithm to form meaningless ciphertext information, and finishing one-time encryption. On the basis, the encrypted information is subjected to parity check to generate a group of independent parity check information, which is equivalent to secondary encryption. The parity check information can generate a random identification code and store the random identification code for the direct use of an individual user or the use of a third-party system by calling through an interface.
And S400, when the plaintext information input by the user is called, replacing the plaintext information with the identification code to transmit between the systems.
It should be noted that all plaintext information in the present invention is only called inside the system to which the method is applied, and is not transmitted between external systems. The system transmits the identification code generated by the parity check information in the internet or between the system and the system. When any user or third party needs to call the plain text information input by the user, a call instruction must be sent. The content transmitted between the internet or the system is a random identification code generated by independent parity check information, the content of the identification code is irrelevant to the content of the actual calling information, and the composition form of the identification code can be as follows: letters, numbers, or a combination of letters and numbers, as well as other graphical codes, such as two-dimensional codes.
For example, when a third-party platform, software and hardware interact with the system to which the invention is applied through an interface, and information contents saved in the system by a user are involved in interaction, only the identification code is transmitted between the systems. If the content stored by the user is a telephone number, the system can contact the user by obtaining the identification code and in a callback mode without obtaining the mobile phone number and the fixed telephone number of the user by a third-party system (such as a mobile phone).
The specific implementation process is as follows:
as an implementation manner, the following steps are further included after step S400:
s500, receiving an identification code;
s600, restoring the storage position of the information to be called by using parity check according to the identification code to obtain corresponding ciphertext information;
s700, the ciphertext information is decrypted according to a preset decryption algorithm, and corresponding plaintext information is obtained.
After receiving the random identification code, restoring the storage position of the user information to the identification code through parity check, retrieving the actually called information to the inside of the system, and restoring the information stored by the user through decryption.
Further, after step S700, the following steps are also included:
and S800, when the called plaintext information is a telephone number and communication connection needs to be established, directly initiating communication connection to the currently called telephone number in the system.
As an implementation manner, S800 specifically includes the following steps:
s810, initiating communication connection to the currently called telephone number;
s820, after the communication connection with the currently called telephone number is successful, the callback connection to the user is initiated in a callback mode;
and S830, after the call connection between the currently called telephone number and the user is successful, ending the current call.
By utilizing the information hiding method provided by the invention, after the input information of the user is encrypted, the information can be disclosed in any occasion according to a specific form, and any third party can obtain the necessary transmitted non-sensitive visual information which can be disclosed only after acquiring the interactive authorization by calling the corresponding application interface of the system.
The invention combines the information input by the user, and no matter how the information is intercepted in the process of transmitting the information between the internet or the system, the plaintext information really input by the user can not be obtained.
The implementation of the present invention is illustrated below according to a specific application scenario.
It is assumed that an implementation platform (i.e., an application system) of the information hiding method provided by the present invention is called "hidden treasure", and a using process thereof is as follows:
step S110, the user registers an account number in the hidden treasure;
step S120, the user inputs and stores information (plaintext information) related to the common scene in the hidden treasure;
step S130, the hidden treasure encrypts the information stored by the user, stores the information in a hidden treasure platform, mainly generates visual content with a number aiming at the specified sensitive information, and generates an encrypted unique two-dimensional code of the user.
Using scenario one: third party shopping platform for information calling
Step S210, shopping by a user on an Internet third-party platform;
step S220, after the user finishes the shopping, logistics information needs to be filled in, and the user selects authorization from 'hidden treasure' to automatically fill the information into a corresponding dialog box;
step S230, the third party shopping platform calls data which are needed at this time and stored in the hidden treasure by the user through an authorization data interface cooperating with the hidden treasure;
step S240, the third party platform substitutes the user data obtained from the hidden treasure into a corresponding input dialog box;
step S250, after confirming the substituted data, the user enters a payment link and waits for the delivery of the merchant after the payment is finished;
step S260, the merchant receives the encrypted user information of the hidden treasure;
step S270, the merchant prints the distribution information of the user on a logistics list, and the printed information is visual information processed by a hidden treasure;
step S280, taking a commodity circulation at a merchant, and distributing according to an actual visible commodity circulation address;
step S290, after the logistics company sends the commodity to the destination, and when a receiver (user) needs to be contacted, the courier scans the two-dimensional code on the express bill or inputs a specific digital string through software or hardware matched with the hidden treasure, and then matched software or hardware equipment (such as APP, a smart phone and a smart terminal) obtains encrypted user data through interaction with the hidden treasure;
step S291, the courier may initiate a voice contact (telephone contact, etc.) with the recipient (user) through a matched software or hardware device to perform delivery communication, and complete delivery.
The information interaction process comprises the following steps:
step S310, a user inputs and stores information on a hidden treasure;
step S320, the hidden treasure and the authorized third party are connected with each other through an interface, and data can be transmitted between the hidden treasure and the authorized third party; authorizing a third party to request for inquiry and acquiring user information through an interface;
step S330, feeding back the results of the query and the acquisition of the third party to the third party through an interface;
step S340, when a third party needs to connect (contact) a user, calling encrypted user data through an interface, and initiating connection (contact) to the user through a hidden treasure;
step S350, the hidden treasure executes the instruction sent by the third party, and after the instruction is matched with the corresponding user information in the hidden treasure, connection (contact) of the corresponding user is initiated;
step S360, the third party can connect (contact) the user at any time through the hidden treasure under the condition that the actual information of the user is not required to be obtained.
Using scenario two: company and enterprise address book hiding
Step S410, a user registers an enterprise/company account in a hidden treasure;
step S420, the user inputs the address book (such as mobile phone number, department, position, etc.) of the enterprise/company into the hidden treasure, and the operation is finished and saved according to the setting requirement of the hidden treasure platform;
and step S430, the hidden treasure platform hides information such as numbers input by the user with the number, generates a user address book with the number visible on the hidden treasure platform, and calls the contacted person through a dialing interface (dialing module) when the enterprise needs to dial the phone number on the address book.
The invention can conveniently and simply encrypt the user information, and can conveniently and quickly acquire the encrypted visual user information by any third party within the range specified by the system through the authorization interface. When the user needs to be connected (contacted), the user is directly connected (contacted) in the system, so that the complete user information is prevented from being randomly acquired and utilized, and the information privacy of the user is effectively protected.
In step S270, the user information content is visual information with a star number, and the user name, the user mobile phone, and the landline phone are partially hidden. For example, the user's name is Zhangsanfeng, the contact phone is 13333445566, 010-: page, contact phone: 133, 010-8, 5, the name was hidden from view by several characters, not known, and the number portion of the contact phone was not visible.
The traditional mode of hiding is an independent and non-public mode operation mode, can play a role in protecting information inside, and once an open mode is adopted, although part of the information on the surface is in an invisible state, when the information is transmitted among systems, the plaintext data transmitted among the systems can be very easily acquired without professional software, so that the information can not be effectively hidden.
The hiding mode provided by the hidden treasure in the above embodiment is different from the traditional information hiding mode, when information is transmitted between systems, the information is transmitted by using the identification code, that is, the user information in a non-plaintext state is transmitted between the systems, and after the hidden treasure receives the identification code, even if plaintext information is returned, the plaintext information state is still a part of content with a number. Even if leakage occurs, the completed user information cannot be obtained.
Based on the same inventive concept, the embodiment of the invention also provides an information hiding device.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points.
Referring to fig. 2, an apparatus for hiding information according to an embodiment of the present invention includes an obtaining module 100, a storing module 200, an encrypting module 300, and a transmitting module 400. The obtaining module 100 is configured to obtain plaintext information input by a user; the storage module 200 is configured to split plaintext information, and store the split plaintext information to a plurality of cloud servers at random respectively; the encryption module 300 is configured to encrypt the split stored plaintext information according to a preset encryption algorithm, generate a set of ciphertext information corresponding to the plaintext information, obtain parity check information of the ciphertext information, and generate and store a random identification code according to the parity check information; the transmission module 400 is used for transmitting the plaintext information input by the user between the systems by replacing the plaintext information with the identification code when the plaintext information is called.
The information hiding device provided by another embodiment of the present invention further includes a receiving module, a positioning module, and a decryption module based on the above embodiments, and the actions after the calling are completed. The method comprises the following specific steps:
the receiving module is used for receiving the identification code; the positioning module is used for restoring the storage position of the information to be called by using parity check according to the identification code to acquire corresponding ciphertext information; and the decryption module is used for decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
Further, the information hiding device provided by another embodiment of the present invention further includes a dialing module based on the above embodiment, where the dialing module is configured to initiate a communication connection directly to a currently called phone number in the system when the called plaintext information is the phone number and a communication connection needs to be established.
Specifically, the dialing module includes a first communication unit, a second communication unit, and a control unit. The first communication unit is used for initiating communication connection to the currently called telephone number; the second communication unit is used for initiating callback connection to the user in a callback mode after the communication connection initiated by the first communication unit and the currently called telephone number is successful; the control unit is used for finishing the current calling after the call connection between the currently called telephone number and the user is successful.
Next, a device for hiding information is further provided in another embodiment of the present invention, where the device includes a processor and a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring plaintext information input by a user; splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers; according to a preset encryption algorithm, carrying out encryption processing on the split stored plaintext information to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information; when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems.
In the above embodiments, there is also provided a non-transitory computer readable storage medium comprising instructions, such as a memory comprising instructions, executable by a processor of a concealment apparatus for information to perform the above method. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. One of ordinary skill in the art can understand and implement it without inventive effort.
The information hiding method and the information hiding device provided by the invention can effectively hide the information needed to be hidden by a user no matter the information is operated in an independent and non-public mode or provided to a third party in an open mode for application and use in a public or non-public occasion, and can establish communication connection with the user according to the hidden information when the third party needs to contact the user on the basis of ensuring that the information is not leaked, so that the information hiding method and the information hiding device are safe and feasible.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and are not intended to limit the scope of the present invention. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the invention, may occur to those skilled in the art and are intended to be included within the scope of the invention.

Claims (8)

1. A method for hiding information is characterized by comprising the following steps:
acquiring plaintext information input by a user;
splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers;
encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information;
when the plaintext information input by the user is called, the identification code replaces the plaintext information to be transmitted between the systems, and the method comprises the following steps:
receiving the identification code;
restoring the storage position of the information to be called by using parity check according to the identification code to obtain corresponding ciphertext information;
and decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
2. The method of claim 1, wherein the plaintext information comprises one or more of a user's name, mobile phone number, landline number, and communication address.
3. The method for hiding information according to claim 1, wherein said identification code is formed in the form of: letters, numbers, or a combination of letters and numbers.
4. The information hiding method according to claim 1, wherein after the ciphertext information is decrypted according to a preset decryption algorithm and corresponding plaintext information is obtained, the method further comprises the following steps:
and when the called plaintext information is a telephone number and communication connection needs to be established, directly initiating communication connection to the currently called telephone number in the system.
5. The method for hiding the information according to claim 4, wherein when the called plaintext information is a phone number and a communication connection needs to be established, the establishment of the communication connection to the currently called phone number is directly initiated inside the system, comprising the following steps:
initiating a communication connection to the currently called telephone number;
after the communication connection with the currently called telephone number is successful, the callback connection to the user is initiated in a callback mode;
and after the call connection between the currently called telephone number and the user is successful, ending the current call.
6. The device for hiding the information is characterized by comprising an acquisition module, a storage module, an encryption module, a transmission module, a receiving module, a positioning module and a decryption module;
the acquisition module is used for acquiring plaintext information input by a user;
the storage module is used for splitting the plaintext information and respectively and randomly storing the split plaintext information to a plurality of cloud servers;
the encryption module is used for encrypting the split stored plaintext information according to a preset encryption algorithm, generating a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, generating a random identification code according to the parity check information and storing the random identification code;
the transmission module is used for replacing the plaintext information with the identification code to transmit among systems when the plaintext information input by a user is called;
the receiving module is used for receiving the identification code;
the positioning module is used for restoring the storage position of the information to be called by using parity check according to the identification code to acquire corresponding ciphertext information;
and the decryption module is used for decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
7. The apparatus for hiding information as claimed in claim 6, further comprising a dialing module;
and the dialing module is used for directly initiating communication connection to the currently called telephone number in the system when the called plaintext information is the telephone number and communication connection needs to be established.
8. The apparatus according to claim 7, wherein the dialing module comprises a first communication unit, a second communication unit and a control unit;
the first communication unit is used for initiating communication connection to the currently called telephone number;
the second communication unit is used for initiating a callback connection to a user in a callback mode after the communication connection initiated by the first communication unit with the currently called telephone number is successful;
and the control unit is used for finishing the current calling after the call connection between the currently called telephone number and the user is successful.
CN201610686677.4A 2016-08-09 2016-08-18 Information hiding method and device Active CN106302472B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2016106481466 2016-08-09
CN201610648146 2016-08-09

Publications (2)

Publication Number Publication Date
CN106302472A CN106302472A (en) 2017-01-04
CN106302472B true CN106302472B (en) 2019-12-24

Family

ID=57679166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610686677.4A Active CN106302472B (en) 2016-08-09 2016-08-18 Information hiding method and device

Country Status (1)

Country Link
CN (1) CN106302472B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664798B (en) 2017-03-31 2021-06-29 北京京东尚科信息技术有限公司 Information encryption method and device
CN107277148A (en) * 2017-06-28 2017-10-20 杭州厚通网络科技有限公司 A kind of the cell-phone number management system and method single based on the stealthy face of Fuse Type express delivery

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222706A (en) * 2005-01-05 2008-07-16 华为技术有限公司 Method for guaranteeing data information safety in mobile terminal
CN102194014A (en) * 2011-06-28 2011-09-21 无锡永中软件有限公司 Document storage method and document recovery method
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN103188081A (en) * 2006-11-07 2013-07-03 安全第一公司 Systems and methods for distributing and securing data
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN105678189A (en) * 2016-01-15 2016-06-15 上海海事大学 Encrypted data file storage and retrieval system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8589637B2 (en) * 2009-10-30 2013-11-19 Cleversafe, Inc. Concurrent set storage in distributed storage network
GB2513376A (en) * 2013-04-25 2014-10-29 Ibm Distribution of encrypted information in multiple locations

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222706A (en) * 2005-01-05 2008-07-16 华为技术有限公司 Method for guaranteeing data information safety in mobile terminal
CN103188081A (en) * 2006-11-07 2013-07-03 安全第一公司 Systems and methods for distributing and securing data
CN102194014A (en) * 2011-06-28 2011-09-21 无锡永中软件有限公司 Document storage method and document recovery method
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN105678189A (en) * 2016-01-15 2016-06-15 上海海事大学 Encrypted data file storage and retrieval system and method

Also Published As

Publication number Publication date
CN106302472A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
EP3474211A1 (en) Offline payment method and device
US10499243B2 (en) Authentication of phone caller identity
CN106304074B (en) Auth method and system towards mobile subscriber
CN111178884B (en) Information processing method, device, equipment and readable storage medium
US11159674B2 (en) Multi-factor authentication of caller identification (ID) identifiers
CN105634737B (en) Data transmission method, terminal and system
CN103107995A (en) Cloud computing environmental data secure storage system and method
CN106664308B (en) Device authentication prior to enrollment
US20180083935A1 (en) Method and system for secure sms communications
CN106302472B (en) Information hiding method and device
CN114205084B (en) Quantum key-based electronic mail multi-operation encryption method and device
JP2007516512A5 (en)
CN108564330B (en) Information processing method and platform and computer readable medium
WO2018133715A1 (en) Method for acquiring user information and relevant device
CN107509180A (en) A kind of method, storage device and the mobile terminal of automatic Encrypted short message
CN108513272B (en) Short message processing method and device
KR20210045823A (en) Apparatus and method for securing document information
JP6325654B2 (en) Network service providing apparatus, network service providing method, and program
KR101194998B1 (en) Service providing system and method for preventing phishing between mobile terminals
KR101774845B1 (en) System and method of Safe Message Advising
US9652621B2 (en) Electronic transmission security process
US9712683B2 (en) Communication agent method
KR101639548B1 (en) Systems and methods for object processing
KR20180116628A (en) User access authentication system based on personal image
CN106211101A (en) A kind of processing method and processing device of voice SMS

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200918

Address after: No.106 Shengli Road, Donghu District, Nanchang City, Jiangxi Province

Patentee after: Huang Liang

Address before: 361000 Fujian province Xiamen Software Park Siming District two expected Road No. 55 B303

Patentee before: XIAMEN LEXIANG NEW NETWORK TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210330

Address after: 1f-k1, Kexun building, software park, torch hi tech Zone, Xiamen City, Fujian Province, 361000

Patentee after: Zhongzhilide intellectual property services (Xiamen) Co.,Ltd.

Address before: 330000 No.106 Shengli Road, Donghu District, Nanchang City, Jiangxi Province

Patentee before: Huang Liang

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210408

Address after: Unit 2008, 20th floor, building B, Vanke creative center, 1739 Lvling Road, Siming District, Xiamen City, Fujian Province, 361000

Patentee after: One Morgan (Xiamen) supply chain Technology Co.,Ltd.

Address before: 1f-k1, Kexun building, software park, torch hi tech Zone, Xiamen City, Fujian Province, 361000

Patentee before: Zhongzhilide intellectual property services (Xiamen) Co.,Ltd.