Disclosure of Invention
In order to more comprehensively and effectively realize information hiding, the invention provides an information hiding method and device, which provides a more reliable hiding mode for information needing to be hidden, such as a mobile phone number of a user, and the like, and can avoid information leakage in the transmission process.
The information hiding method provided by the invention comprises the following steps:
acquiring plaintext information input by a user;
splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers;
encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information;
and when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems.
As an implementation, the plaintext information includes one or more of a name, a mobile phone number, a telephone number, and a communication address of the user.
As an implementation, the identification code is composed of the following form: letters, numbers, or a combination of letters and numbers.
As an implementation manner, after the plaintext information inputted by the user is transmitted in place of the plaintext information line by the identification code when being called, the method further comprises the following steps:
receiving the identification code;
restoring the storage position of the information to be called by using parity check according to the identification code to obtain corresponding ciphertext information;
and decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
As an implementation manner, after the ciphertext information is decrypted according to a preset decryption algorithm and corresponding plaintext information is obtained, the method further includes the following steps:
and when the called plaintext information is a telephone number and communication connection needs to be established, directly initiating communication connection to the currently called telephone number in the system.
As an implementable manner, when the called plaintext information is a phone number and a communication connection needs to be established, directly initiating establishment of a communication connection to the currently called phone number inside the system, including the following steps:
initiating a communication connection to the currently called telephone number;
after the communication connection with the currently called telephone number is successful, the callback connection to the user is initiated in a callback mode;
and after the call connection between the currently called telephone number and the user is successful, ending the current call.
Correspondingly, the invention also provides an information hiding device, which comprises an acquisition module, a storage module, an encryption module and a transmission module;
the acquisition module is used for acquiring plaintext information input by a user;
the storage module is used for splitting the plaintext information and respectively and randomly storing the split plaintext information to a plurality of cloud servers;
the encryption module is used for encrypting the split stored plaintext information according to a preset encryption algorithm, generating a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, generating a random identification code according to the parity check information and storing the random identification code;
and the transmission module is used for replacing the plaintext information with the identification code to transmit between systems when the plaintext information input by the user is called.
As an implementable manner, the information hiding device of the invention further comprises a receiving module, a positioning module and a decryption module;
the receiving module is used for receiving the identification code;
the positioning module is used for restoring the storage position of the information to be called by using parity check according to the identification code to acquire corresponding ciphertext information;
and the decryption module is used for decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
As an implementable mode, the information hiding device further comprises a dialing module;
and the dialing module is used for directly initiating communication connection to the currently called telephone number in the system when the called plaintext information is the telephone number and communication connection needs to be established.
As an implementation manner, the dialing module comprises a first communication unit, a second communication unit and a control unit;
the first communication unit is used for initiating communication connection to the currently called telephone number;
the second communication unit is used for initiating a callback connection to a user in a callback mode after the communication connection initiated by the first communication unit with the currently called telephone number is successful;
and the control unit is used for finishing the current calling after the call connection between the currently called telephone number and the user is successful.
Compared with the prior art, the invention has the beneficial effects that:
according to the information hiding method and device, firstly, plaintext information input by a user is obtained, the plaintext information is split, and the split plaintext information is respectively and randomly stored on a plurality of cloud servers; secondly, encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information; and finally, when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems. According to the invention, through information combination on the information input by the user, no matter how the information is intercepted in the process of transmitting the information between the Internet or the system, the plaintext information really input by the user cannot be obtained. Therefore, the user information is prevented from being randomly acquired and utilized, and the information is effectively hidden.
Detailed Description
The above and further features and advantages of the present invention will be apparent from the following, complete description of the invention, taken in conjunction with the accompanying drawings, wherein the described embodiments are merely some, but not all embodiments of the invention.
Referring to fig. 1, a method for hiding information according to an embodiment of the present invention includes the following steps:
and S100, acquiring plaintext information input by a user.
The plaintext information input by the user can be one or more of the name, the mobile phone number, the fixed phone number and the communication address of the user, and can also be other digital or character information.
S200, splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers.
And after the complete plaintext information input by the user is split, randomly and respectively storing the split complete plaintext information on different cloud servers. Therefore, when safety accident information leakage occurs to a certain cloud server, the leaked split random information cannot be used independently, and information safety is enhanced.
S300, encrypting the split stored plaintext information according to a preset encryption algorithm to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information.
And encrypting the split stored plaintext information by adopting a preset encryption algorithm to form meaningless ciphertext information, and finishing one-time encryption. On the basis, the encrypted information is subjected to parity check to generate a group of independent parity check information, which is equivalent to secondary encryption. The parity check information can generate a random identification code and store the random identification code for the direct use of an individual user or the use of a third-party system by calling through an interface.
And S400, when the plaintext information input by the user is called, replacing the plaintext information with the identification code to transmit between the systems.
It should be noted that all plaintext information in the present invention is only called inside the system to which the method is applied, and is not transmitted between external systems. The system transmits the identification code generated by the parity check information in the internet or between the system and the system. When any user or third party needs to call the plain text information input by the user, a call instruction must be sent. The content transmitted between the internet or the system is a random identification code generated by independent parity check information, the content of the identification code is irrelevant to the content of the actual calling information, and the composition form of the identification code can be as follows: letters, numbers, or a combination of letters and numbers, as well as other graphical codes, such as two-dimensional codes.
For example, when a third-party platform, software and hardware interact with the system to which the invention is applied through an interface, and information contents saved in the system by a user are involved in interaction, only the identification code is transmitted between the systems. If the content stored by the user is a telephone number, the system can contact the user by obtaining the identification code and in a callback mode without obtaining the mobile phone number and the fixed telephone number of the user by a third-party system (such as a mobile phone).
The specific implementation process is as follows:
as an implementation manner, the following steps are further included after step S400:
s500, receiving an identification code;
s600, restoring the storage position of the information to be called by using parity check according to the identification code to obtain corresponding ciphertext information;
s700, the ciphertext information is decrypted according to a preset decryption algorithm, and corresponding plaintext information is obtained.
After receiving the random identification code, restoring the storage position of the user information to the identification code through parity check, retrieving the actually called information to the inside of the system, and restoring the information stored by the user through decryption.
Further, after step S700, the following steps are also included:
and S800, when the called plaintext information is a telephone number and communication connection needs to be established, directly initiating communication connection to the currently called telephone number in the system.
As an implementation manner, S800 specifically includes the following steps:
s810, initiating communication connection to the currently called telephone number;
s820, after the communication connection with the currently called telephone number is successful, the callback connection to the user is initiated in a callback mode;
and S830, after the call connection between the currently called telephone number and the user is successful, ending the current call.
By utilizing the information hiding method provided by the invention, after the input information of the user is encrypted, the information can be disclosed in any occasion according to a specific form, and any third party can obtain the necessary transmitted non-sensitive visual information which can be disclosed only after acquiring the interactive authorization by calling the corresponding application interface of the system.
The invention combines the information input by the user, and no matter how the information is intercepted in the process of transmitting the information between the internet or the system, the plaintext information really input by the user can not be obtained.
The implementation of the present invention is illustrated below according to a specific application scenario.
It is assumed that an implementation platform (i.e., an application system) of the information hiding method provided by the present invention is called "hidden treasure", and a using process thereof is as follows:
step S110, the user registers an account number in the hidden treasure;
step S120, the user inputs and stores information (plaintext information) related to the common scene in the hidden treasure;
step S130, the hidden treasure encrypts the information stored by the user, stores the information in a hidden treasure platform, mainly generates visual content with a number aiming at the specified sensitive information, and generates an encrypted unique two-dimensional code of the user.
Using scenario one: third party shopping platform for information calling
Step S210, shopping by a user on an Internet third-party platform;
step S220, after the user finishes the shopping, logistics information needs to be filled in, and the user selects authorization from 'hidden treasure' to automatically fill the information into a corresponding dialog box;
step S230, the third party shopping platform calls data which are needed at this time and stored in the hidden treasure by the user through an authorization data interface cooperating with the hidden treasure;
step S240, the third party platform substitutes the user data obtained from the hidden treasure into a corresponding input dialog box;
step S250, after confirming the substituted data, the user enters a payment link and waits for the delivery of the merchant after the payment is finished;
step S260, the merchant receives the encrypted user information of the hidden treasure;
step S270, the merchant prints the distribution information of the user on a logistics list, and the printed information is visual information processed by a hidden treasure;
step S280, taking a commodity circulation at a merchant, and distributing according to an actual visible commodity circulation address;
step S290, after the logistics company sends the commodity to the destination, and when a receiver (user) needs to be contacted, the courier scans the two-dimensional code on the express bill or inputs a specific digital string through software or hardware matched with the hidden treasure, and then matched software or hardware equipment (such as APP, a smart phone and a smart terminal) obtains encrypted user data through interaction with the hidden treasure;
step S291, the courier may initiate a voice contact (telephone contact, etc.) with the recipient (user) through a matched software or hardware device to perform delivery communication, and complete delivery.
The information interaction process comprises the following steps:
step S310, a user inputs and stores information on a hidden treasure;
step S320, the hidden treasure and the authorized third party are connected with each other through an interface, and data can be transmitted between the hidden treasure and the authorized third party; authorizing a third party to request for inquiry and acquiring user information through an interface;
step S330, feeding back the results of the query and the acquisition of the third party to the third party through an interface;
step S340, when a third party needs to connect (contact) a user, calling encrypted user data through an interface, and initiating connection (contact) to the user through a hidden treasure;
step S350, the hidden treasure executes the instruction sent by the third party, and after the instruction is matched with the corresponding user information in the hidden treasure, connection (contact) of the corresponding user is initiated;
step S360, the third party can connect (contact) the user at any time through the hidden treasure under the condition that the actual information of the user is not required to be obtained.
Using scenario two: company and enterprise address book hiding
Step S410, a user registers an enterprise/company account in a hidden treasure;
step S420, the user inputs the address book (such as mobile phone number, department, position, etc.) of the enterprise/company into the hidden treasure, and the operation is finished and saved according to the setting requirement of the hidden treasure platform;
and step S430, the hidden treasure platform hides information such as numbers input by the user with the number, generates a user address book with the number visible on the hidden treasure platform, and calls the contacted person through a dialing interface (dialing module) when the enterprise needs to dial the phone number on the address book.
The invention can conveniently and simply encrypt the user information, and can conveniently and quickly acquire the encrypted visual user information by any third party within the range specified by the system through the authorization interface. When the user needs to be connected (contacted), the user is directly connected (contacted) in the system, so that the complete user information is prevented from being randomly acquired and utilized, and the information privacy of the user is effectively protected.
In step S270, the user information content is visual information with a star number, and the user name, the user mobile phone, and the landline phone are partially hidden. For example, the user's name is Zhangsanfeng, the contact phone is 13333445566, 010-: page, contact phone: 133, 010-8, 5, the name was hidden from view by several characters, not known, and the number portion of the contact phone was not visible.
The traditional mode of hiding is an independent and non-public mode operation mode, can play a role in protecting information inside, and once an open mode is adopted, although part of the information on the surface is in an invisible state, when the information is transmitted among systems, the plaintext data transmitted among the systems can be very easily acquired without professional software, so that the information can not be effectively hidden.
The hiding mode provided by the hidden treasure in the above embodiment is different from the traditional information hiding mode, when information is transmitted between systems, the information is transmitted by using the identification code, that is, the user information in a non-plaintext state is transmitted between the systems, and after the hidden treasure receives the identification code, even if plaintext information is returned, the plaintext information state is still a part of content with a number. Even if leakage occurs, the completed user information cannot be obtained.
Based on the same inventive concept, the embodiment of the invention also provides an information hiding device.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points.
Referring to fig. 2, an apparatus for hiding information according to an embodiment of the present invention includes an obtaining module 100, a storing module 200, an encrypting module 300, and a transmitting module 400. The obtaining module 100 is configured to obtain plaintext information input by a user; the storage module 200 is configured to split plaintext information, and store the split plaintext information to a plurality of cloud servers at random respectively; the encryption module 300 is configured to encrypt the split stored plaintext information according to a preset encryption algorithm, generate a set of ciphertext information corresponding to the plaintext information, obtain parity check information of the ciphertext information, and generate and store a random identification code according to the parity check information; the transmission module 400 is used for transmitting the plaintext information input by the user between the systems by replacing the plaintext information with the identification code when the plaintext information is called.
The information hiding device provided by another embodiment of the present invention further includes a receiving module, a positioning module, and a decryption module based on the above embodiments, and the actions after the calling are completed. The method comprises the following specific steps:
the receiving module is used for receiving the identification code; the positioning module is used for restoring the storage position of the information to be called by using parity check according to the identification code to acquire corresponding ciphertext information; and the decryption module is used for decrypting the ciphertext information according to a preset decryption algorithm to obtain corresponding plaintext information.
Further, the information hiding device provided by another embodiment of the present invention further includes a dialing module based on the above embodiment, where the dialing module is configured to initiate a communication connection directly to a currently called phone number in the system when the called plaintext information is the phone number and a communication connection needs to be established.
Specifically, the dialing module includes a first communication unit, a second communication unit, and a control unit. The first communication unit is used for initiating communication connection to the currently called telephone number; the second communication unit is used for initiating callback connection to the user in a callback mode after the communication connection initiated by the first communication unit and the currently called telephone number is successful; the control unit is used for finishing the current calling after the call connection between the currently called telephone number and the user is successful.
Next, a device for hiding information is further provided in another embodiment of the present invention, where the device includes a processor and a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring plaintext information input by a user; splitting the plaintext information, and respectively and randomly storing the split plaintext information to a plurality of cloud servers; according to a preset encryption algorithm, carrying out encryption processing on the split stored plaintext information to generate a group of ciphertext information corresponding to the plaintext information, acquiring parity check information of the ciphertext information, and generating and storing a random identification code according to the parity check information; when the plaintext information input by the user is called, the identification code is used for replacing the plaintext information to be transmitted between the systems.
In the above embodiments, there is also provided a non-transitory computer readable storage medium comprising instructions, such as a memory comprising instructions, executable by a processor of a concealment apparatus for information to perform the above method. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. One of ordinary skill in the art can understand and implement it without inventive effort.
The information hiding method and the information hiding device provided by the invention can effectively hide the information needed to be hidden by a user no matter the information is operated in an independent and non-public mode or provided to a third party in an open mode for application and use in a public or non-public occasion, and can establish communication connection with the user according to the hidden information when the third party needs to contact the user on the basis of ensuring that the information is not leaked, so that the information hiding method and the information hiding device are safe and feasible.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and are not intended to limit the scope of the present invention. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the invention, may occur to those skilled in the art and are intended to be included within the scope of the invention.