CN105809042A - Information protection method and device, information display method and device, and terminal - Google Patents
Information protection method and device, information display method and device, and terminal Download PDFInfo
- Publication number
- CN105809042A CN105809042A CN201410851604.7A CN201410851604A CN105809042A CN 105809042 A CN105809042 A CN 105809042A CN 201410851604 A CN201410851604 A CN 201410851604A CN 105809042 A CN105809042 A CN 105809042A
- Authority
- CN
- China
- Prior art keywords
- information
- sensitive
- state information
- hidden
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information protection method and device, an information display method and device, and a terminal. When information is protected, sensitive information in the information is identified firstly; then at least one part of the sensitive information in the information is hidden, thus obtaining hidden state information; the original information of the information is encrypted, thus obtaining encrypted state information; then associated storage is carried out to the hidden state information and the encrypted state information of the information; when the information is displayed, the hidden state information of the information is directly displayed to a user; and the sensitive information displayed at this time is at least partially hidden, and the other part is displayed normally. According to the methods, the devices and the terminal, the information is convenient for the user to check and manage; and if the user needs to further check all contents of the information, the contents of the hidden part can be read only after the encrypted state information of the information is decrypted accurately according to the decryption secret key input by the user.
Description
Technical field
The present invention relates to information security field, be specifically related to a kind of information protection, display packing and information protection device, display device and terminal.
Background technology
At present, sent by the mobile terminal network such as mobile phone, IPAD or receive relate to the identification card number of individual, express delivery odd numbers, account No., the information such as transaction voucher number situation very common.After usage, user often retains in the terminal these information, and therefore this partial information probably faces leakage.In order to avoid this problem of this generation, it is desirable to terminal is provided that some protection functions containing this type of sensitive content information.But the information protection function of existing terminal; often employing directly selects whole piece information and is encrypted protection; user to check that this information just can be checked after then needing to carry out the decryption oprerations of correspondence; preview can not be shifted to an earlier date; so after terminal uses a period of time; under having the protected situation of a plurality of information, it is not easy to user and consults and manage, reduce the satisfaction of Consumer's Experience.
Summary of the invention
The main technical problem to be solved in the present invention is to provide a kind of information protection, display packing and information protection device, display device and terminal, solves existing whole piece information is directly encrypted protection to cause being not easy to the problem that user consults and manages.
For solving above-mentioned technical problem, the embodiment of the present invention provides a kind of information protecting method, including:
Sensitive information in identification information;
Described sensitive information is hidden process and obtains hidden state information, and the prime information of described information is encrypted obtains encrypted state information;
Described encrypted state information and described hidden state information are associated storage;
In an embodiment of the present invention, the sensitive information in described identification information includes:
Extract the digital information in described information and obtain the feature of described digital information, carrying out mating to judge that whether it is for sensitive information with the numerical characteristic storehouse preset by it;
Or,
Extract the digital information in described information and according to default key word library judges whether comprise keyword in described information, in this way, then judge that described digital information is as sensitive information.
In an embodiment of the present invention, described sensitive information is hidden process obtain hidden state information and at least include one below:
Directly it is hidden whole piece sensitive information processing, obtains described hidden state information;
It is hidden processing to a part for sensitive information, obtains described hidden state information;
Select based on user, be hidden processing to the specified portions of sensitive information, obtain described hidden state information.
In an embodiment of the present invention, described hiding process includes:
Directly hide by the content of processing region to be concealed in described sensitive information or delete or replace to other guide.
In an embodiment of the present invention, the prime information content of described sensitive information is encrypted obtains encrypted state information and include:
In described prime information content or directly in described information, expansion cipher hashed value stores field;
Receive the encryption key of user's input, adopt preset algorithm to calculate the hashed value obtaining described encryption key and storage stores in field to described cryptographic Hash.
In an embodiment of the present invention, before adopting preset algorithm to calculate the hashed value obtaining described encryption key, also include: according to the encryption key of user's input, the content of described prime information is encrypted.
In order to solve the problems referred to above, the embodiment of the present invention additionally provides a kind of method for information display, and described information is the information after information protecting method as above processes, and described method for information display includes:
The hidden state information of described information is displayed;
Receive the clear crytpographic key of user's input, be decrypted process according to the encrypted state information of described clear crytpographic key pair with described hidden state information association and obtain the prime information of described information and display.
In order to solve the problems referred to above, present invention also offers a kind of information protection device, including information identification module, hide module, encrypting module, storage operation module and display control module;
Described information identification module is for the sensitive information in identification information;
Described hiding module obtains hidden state information for described sensitive information is hidden process;
Described encrypting module obtains encrypted state information for the prime information content of described information is encrypted;
Described storage operation module is for being associated storage by described encrypted state information and described hidden state information;
Described display control module for when not deciphering described encrypted state information, being shown as described hidden state information by described sensitive information.
In an embodiment of the present invention, described information identification module includes the first extraction submodule and matched sub-block, and described first extracts submodule for extracting the digital information in described information and obtaining the feature of described digital information;Described matched sub-block is for carrying out mating to judge that whether it is for sensitive information with the numerical characteristic storehouse preset by the feature of described digital information;
Or,
Described information identification module includes the second extraction submodule and judges submodule, and described second extracts the submodule digital information for extracting in described information;The described key word library judging that submodule is preset for basis judges whether comprise keyword in described information, in this way, then judges that described digital information is as sensitive information.
In an embodiment of the present invention, described hiding module includes hiding process submodule, delete processing submodule or replacing submodule;
Described hiding process submodule is for directly hiding by the content of processing region to be concealed in described sensitive information;
Described delete processing submodule is for directly deleting the content of processing region to be concealed in described sensitive information;
Described replacement submodule is for replacing to other guide by the content of processing region to be concealed in described sensitive information.
In an embodiment of the present invention, described encrypting module includes extension submodule and calculating sub module;
Described extension submodule is for the storage field of expansion cipher hashed value in the prime information content of described sensitive information or in described information;
Described calculating sub module calculates, for the encryption key employing preset algorithm according to user's input, the hashed value obtaining described encryption key and storage stores in field to described cryptographic Hash.
In an embodiment of the present invention, described encrypting module also includes encryption submodule, before adopting preset algorithm to calculate the hashed value obtaining described encryption key in described calculating sub module, according to the encryption key of user's input, the content of described prime information is encrypted.
In order to solve the problems referred to above, present invention also offers a kind of information display device, described information is the information after information protection device as above processes, and described information display device includes the first display processing module and the second display processing module;
Described first display processing module is for displaying the hidden state information of described information;
Described second display processing module, for receiving the clear crytpographic key of user's input, is decrypted process according to the encrypted state information of described clear crytpographic key pair with described hidden state information association and obtains the prime information of described information and display.
In order to solve the problems referred to above, the embodiment of the present invention additionally provides a kind of terminal, and including processor, memorizer and display, described sensitive information, for the sensitive information in identification information, is hidden process and obtains hidden state information by described processor;The prime information content of described sensitive information is encrypted and obtains encrypted state information, and described encrypted state information and described hidden state information are associated storage to described memorizer;And for when not deciphering described encrypted state information, described sensitive information being shown as on the display described hidden state information.
The invention has the beneficial effects as follows:
Information protection provided by the invention, display packing and information protection, display device and terminal; when information is protected; first identify the sensitive information in this information; then the process that is hidden at least partially of the sensitive information in this information is obtained hidden state information (for cleartext information; can directly display); and the prime information of this information is encrypted obtains encrypted state information (for adding confidential information, it is necessary to could show further after deciphering);Then the encrypted state information of this information and hidden state information are associated storage;When display, when not deciphering, first the hidden state information of this information can be directly displayed to user, the sensitive information parts now shown is hidden at least partly, other parts then can normally show, so that user's preview is consulted and managed, if user needs to check further the full content of this information, then need the decruption key according to user's input just can read, after the encrypted state information of this information carries out correctly deciphering, the content being hidden part.Therefore the solution of the present invention can meet the effective protection to information sensing content part, is easy to again user and shielded information carries out preview and management, can promote the satisfaction of Consumer's Experience.
Accompanying drawing explanation
The information protecting method schematic flow sheet that Fig. 1 provides for the embodiment of the present invention one;
The method for information display schematic flow sheet that Fig. 2 provides for the embodiment of the present invention one;
The information protection device structural representation that Fig. 3 provides for the embodiment of the present invention two;
The information display device structural representation that Fig. 4 provides for the embodiment of the present invention two;
The terminal structure schematic diagram that Fig. 5 provides for the embodiment of the present invention three;
The information processing method schematic flow sheet that Fig. 6 provides for the embodiment of the present invention three;
The sensitive information identification process flow schematic diagram that Fig. 7 provides for the embodiment of the present invention three;
Fig. 8 hides and ciphering process schematic flow sheet for what the embodiment of the present invention three provided;
The information display process schematic flow sheet that Fig. 9 provides for the embodiment of the present invention three.
Detailed description of the invention
The present invention is described in further detail in conjunction with accompanying drawing below by detailed description of the invention.
Embodiment one:
The present embodiment is when protecting information; first identify the sensitive information in this information; then the process that is hidden at least partially of the sensitive information in this information being obtained hidden state information, the hidden state information obtained is cleartext information, it is possible to directly display;And the prime information content of this sensitive information is encrypted obtains encrypted state information, encrypted state information is for adding confidential information, it is necessary to could show further after deciphering;Then the encrypted state information of this information and hidden state information are associated storage;When display, first the hidden state information of this information is directly displayed to user, the sensitive information parts now shown is hidden at least partly, other parts then can normally show, so that user's preview is consulted and is managed, if user needs to check further the full content of this information, then need the decruption key according to user's input just can read, after the encrypted state information of this information carries out correctly deciphering, the content being hidden part.Therefore the solution of the present invention can meet the effective protection to information sensing content part, is easy to again user and shielded information carries out preview and management.Concrete, please join shown in Fig. 1, the protection process of information is included:
Step 101: the sensitive information in identification information;
Step 102: the process that is hidden at least partially of the sensitive information in information is obtained hidden state information;
Step 103: the prime information content of sensitive information is encrypted and obtains encrypted state information;
Step 104: the encrypted state information obtained and hidden state information are associated storage;
Step 105: when not deciphering described encrypted state information, is shown as described hidden state information by described sensitive information.
The needs that information in above-mentioned steps 101 manually can be selected for user carry out the information protected, it is also possible to for monitoring information newly generated in terminal, for instance the information that newly can send for information that terminal is newly received or terminal.During newly generated in for terminal information, then can realize automatically to information newly generated in terminal automatically identify and protection processes, be not required to user's manual operation, the satisfaction of Consumer's Experience can be promoted further.In the present embodiment, the sensitive information in identification information includes:
Mode one: digital information in extraction information also obtains the feature of digital information, carries out mating to judge that whether it is for sensitive information with the numerical characteristic storehouse preset by the feature of digital information.The present embodiment specifically can use the method that canonical is mated extract the numeric string in information text, then extract the feature of numeric string.Numerical characteristic storehouse in the present embodiment comprises the feature of all kinds of sensitive digital information, for instance: for identification card number, it is typically characterized by 18 continuous print numeric strings or 17+1 character of figure place word string;For express delivery odd numbers, it is generally the 10-12 numeric string being;For Bank Account Number, it is generally 19 for figure place word string;For transaction voucher number, can according to the voucher number retention of classical network business site to characteristic of correspondence.The feature of numeric string according to extracting is mated in numerical characteristic storehouse, it is assumed for example that the feature of the numeric string of extraction is 18 continuous print numeric strings or 17+1 character of figure place word string, carries out mating with numerical characteristic storehouse by it and is appreciated that it is ID (identity number) card No..The present embodiment also can set up the keyword of correspondence in numerical characteristic storehouse, such as the feature of corresponding ID (identity number) card No. sets up identity card keyword, the feature of corresponding Bank Account Number sets up Bank Account Number keyword etc., and can promote information sensing information further is other accuracy.
Mode two: the digital information in extraction information, and according to default key word library judges whether comprise keyword in information, in this way, then judges that the digital information extracted is as sensitive information.The present embodiment specifically can also use the method that canonical is mated extract the numeric string in information text.Key word library in the present embodiment can comprise identity card, transfers accounts, express delivery, keyword of getting tickets;When identifying, digital information in extraction information also searches whether contain above-mentioned keyword in information content, for instance adds and comprises 18 continuous print numeric strings in the information of identifying, and comprises identity card keyword in this information, judge that these 18 continuous print numeric strings are as ID (identity number) card No., for sensitive information.
It should be appreciated that each digital number and keyword in above-mentioned example are all illustrative of illustrating, digital number and keyword in the present invention are not limited in above-mentioned example, it is possible to set flexibly according to concrete application scenarios.In above-mentioned steps 101, when recognition result is do not comprise sensitive information in information, then this information can not be carried out protection process, it is possible to directly whole piece information is encrypted protection and processes.
It should be appreciated that above-mentioned steps 102 and step 103 there is no strict sequential restriction, it is possible to first carry out step 102, then perform step 103, it is also possible to first carry out step 103, then perform step 102, or the two performs simultaneously.In above-mentioned steps 102, to sensitive information be hidden at least partially into:
Directly it is hidden whole sensitive information processing, for instance sensitive information is the ID (identity number) card No. of 18, it is possible to be directly hidden these 18 ID (identity number) card No. processing;
Or be hidden processing to the predeterminable area (namely a portion) of sensitive information, this predeterminable area is a part for sensitive information;Such as sensitive information is the ID (identity number) card No. of 18, it is possible to directly be hidden processing to last six of these 18 ID (identity number) card No.;Or directly the zone line of sensitive information or the region of last 25% are hidden processing by setting, can also be hidden the region of the zone line of sensitive information and foremost 10% processing (namely multiple discontinuous region can be selected to be hidden processing), it is seen that the setting in concrete region can set according to concrete application scenarios simultaneously simultaneously;
Or the appointment region (namely specified portions) of sensitive information is processed by the selection according to user;A choice box (editing area) now can be provided to user, for user according to oneself needing to select flexibly to specify the region needing to be hidden processing, user can select whole sensitive information, it is also possible to selects a most key part or other demands according to self in sensitive information to select any one part in sensitive information.
Hiding process in above-mentioned steps 102 includes:
Directly hiding by the content of processing region to be concealed in sensitive information, now the content of this part is shown as blank (maybe can replace) with other colors (such as redness etc.);
Or, the content of processing region to be concealed in sensitive information is deleted, now the content of this part is shown as blank;
Or, the content of processing region to be concealed in sensitive information is replaced to other guide, for instance unification replaces to the optional signs such as " * " symbol, or " # ", it is possible to replace to default picture, as long as can raw content be covered.
In above-mentioned steps 103, the prime information of information is encrypted and obtains encrypted state information and include:
(namely only to sensitive information parts encrypt) (namely whole information is encrypted, comprise non-sensitive information portion) expansion cipher hashed value storage field directly in the information in the prime information content of sensitive information;
Receive the encryption key of user's input, adopt preset algorithm (circular is not limit, such as md5 etc.) to calculate the hashed value obtaining encryption key and storage stores in field to cryptographic Hash.
In the present embodiment, before adopting preset algorithm to calculate the hashed value obtaining encryption key, also include: according to the encryption key of user's input, the content of prime information is encrypted, concrete AES can adopt as changed sequence or logical shift etc., it should be appreciated that the AES in the present embodiment can adopt any AES.
In the present embodiment, also can extend in prime information whether encryption indicator position this message of labelling is sensitive message, and when for sensitive message, it is effective for arranging encryption indicator position.
For the information after above-mentioned protection process processes, its display process is shown in Figure 2, including:
Step 201: first the hidden state information of information is displayed;This step just directly can display according to the display rule preset after terminal inbound message list being detected, it is also possible to displays according to the selection instruction of user;The display of hidden state information then shows as it is for the part for hiding process, and for user's preview, the raw content for hiding the part disposed then will not show, to reach the purpose of protection;
Step 202: receiving the clear crytpographic key of user's input, this clear crytpographic key is that user needs to consult whole piece information and input further;Encrypted state information according to this clear crytpographic key pair with this hidden state information association is decrypted process and obtains the prime information of information and display.
It should be appreciated that display final in above-mentioned steps 202 can be replace the prime information content after hidden state information only shows deciphering, or show the prime information content after hidden state information and deciphering simultaneously.
Decrypting process in above-mentioned steps 202 includes:
Clear crytpographic key according to user's input, algorithm corresponding when adopting with encryption calculates the hashed value obtaining clear crytpographic key and compares with the hashed value in the cryptographic Hash storage field of encrypted state information, judge whether the two is consistent, in this way, then according to the clear crytpographic key of user's input, the prime information content of encrypted state information is decrypted process and obtains prime information content;Otherwise, it was shown that the clear crytpographic key of user's input is not right, and prompting user re-enters, also can record the number of times that user re-enters further and carry out locking processing after input number of times reaches pre-determined threshold.
Embodiment two:
Present embodiments provide a kind of information protection device; this information protection device can be arranged in the terminal; shown in Figure 3, information protection device includes information identification module 31, hiding module 32, encrypting module 33, storage operation module 34 and display control module 35;
Information identification module 31 is for the sensitive information in identification information;The needs that information herein manually can be selected for user carry out the information protected, it is also possible to for corresponding monitoring module monitors to information newly generated in terminal, for instance the information that newly can send for information that terminal is newly received or terminal.During newly generated in for terminal information, then can realize automatically to information newly generated in terminal automatically identify and protection processes, be not required to user's manual operation, the satisfaction of Consumer's Experience can be promoted further.
Hide module 32 for the process that is hidden at least partially of the sensitive information in information is obtained hidden state information;
Encrypting module 33 obtains encrypted state information for the prime information content of sensitive information is encrypted;
Storage operation module 34 is for being associated storage by the encrypted state information obtained and hidden state information;
Display control module 35 for when not deciphering encrypted state information, being shown as described hidden state information by sensitive information.
Information identification module 31 in the present embodiment includes the first extraction submodule and matched sub-block, and first extracts submodule for the digital information in extraction information the feature obtaining digital information;Matched sub-block is for carrying out mating to judge that whether it is for sensitive information with the numerical characteristic storehouse preset by the feature of the digital information obtained;In the present embodiment, the first extraction submodule specifically can use the method that canonical is mated to extract the numeric string in information text, then extracts the feature of numeric string.Numerical characteristic storehouse in the present embodiment comprises the feature of all kinds of sensitive digital information, for instance: for identification card number, it is typically characterized by 18 continuous print numeric strings or 17+1 character of figure place word string;For express delivery odd numbers, it is generally the 10-12 numeric string being;For Bank Account Number, it is generally 19 for figure place word string;For transaction voucher number, can according to the voucher number retention of classical network business site to characteristic of correspondence.Matched sub-block is mated in numerical characteristic storehouse according to the feature of the numeric string extracted, such as assume that the feature of numeric string extracted is 18 continuous print numeric strings or 17+1 character of figure place word string, carry out mating with numerical characteristic storehouse by it and be appreciated that it is ID (identity number) card No..The present embodiment also can set up the keyword of correspondence in numerical characteristic storehouse, such as the feature of corresponding ID (identity number) card No. sets up identity card keyword, the feature of corresponding Bank Account Number sets up Bank Account Number keyword etc., and can promote information sensing information further is other accuracy.
Or, information identification module 31 includes the second extraction submodule and judges submodule, and second extracts submodule for the digital information in extraction information;Judge submodule is for judging whether comprise keyword in information according to the key word library preset, in this way, then judge that the digital information that obtains is as sensitive information.In the present embodiment, the second extraction submodule specifically can also use the method that canonical is mated to extract the numeric string in information text.Key word library in the present embodiment can comprise identity card, transfers accounts, express delivery, keyword of getting tickets;When identifying, after second extraction submodule extracts the digital information in information, judge submodule searches in information content whether contain above-mentioned keyword, such as add in the information of identifying and comprise 18 continuous print numeric strings, and this information comprises identity card keyword, judge that these 18 continuous print numeric strings are as ID (identity number) card No., for sensitive information.
It should be appreciated that each digital number and keyword in above-mentioned example are all illustrative of illustrating, digital number and keyword in the present invention are not limited in above-mentioned example, it is possible to set flexibly according to concrete application scenarios.
Hide module 32 to the sensitive information in information be hidden at least partially process, the region of this process to be concealed can be:
Directly it is hidden whole sensitive information processing, for instance sensitive information is the ID (identity number) card No. of 18, it is possible to be directly hidden these 18 ID (identity number) card No. processing;
Or be hidden processing to the predeterminable area (namely part of sensitive information) of sensitive information, this predeterminable area is a part for sensitive information;Such as sensitive information is the ID (identity number) card No. of 18, it is possible to directly be hidden processing to last six of these 18 ID (identity number) card No.;Or directly the zone line of sensitive information or the region of last 25% are hidden processing by setting, can also be hidden the region of the zone line of sensitive information and foremost 10% processing (namely multiple discontinuous region can be selected to be hidden processing), it is seen that the setting in concrete region can set according to concrete application scenarios simultaneously simultaneously;
Or the appointment region (namely specified portions) of sensitive information is processed by the selection according to user;A choice box (editing area) now can be provided to user, for user according to oneself needing to select flexibly to specify the region needing to be hidden processing, user can select whole sensitive information, it is also possible to selects a most key part or other demands according to self in sensitive information to select any one part in sensitive information.
Hiding module 32 in the present embodiment includes hiding process submodule, delete processing submodule or replacing submodule;
Hiding and process submodule for directly hiding by the content of processing region to be concealed in sensitive information, now the content of this part is shown as blank (maybe can replace) with other colors (such as redness etc.);
Delete processing submodule is for directly deleting the content of processing region to be concealed in sensitive information, and now the content of this part is shown as blank;
Replace submodule for the content of processing region to be concealed in sensitive information is replaced to other guide, for instance unification replaces to optional sign or the pictures such as " * " symbol, or " # ", as long as can raw content be covered.
Encrypting module 33 in the present embodiment includes extension submodule, encryption submodule and calculating sub module;
Extension submodule is in the prime information content of sensitive information (namely being only encrypted sensitive information parts) or directly (namely directly whole information being encrypted) expansion cipher hashed value stores field in the information;Can be additionally used in and extend whether encryption indicator position this message of labelling is sensitive message in prime information, and when for sensitive message, it is effective for arranging encryption indicator position;
Calculating sub module adopts preset algorithm (circular is not limit, such as md5 etc.) to calculate the hashed value obtaining encryption key for the encryption key inputted according to user and storage stores in field to cryptographic Hash.
Encryption submodule is for, before adopting preset algorithm to calculate the hashed value obtaining encryption key in calculating sub module, being encrypted the content of prime information according to the encryption key of user's input;Concrete AES can adopt as changed sequence or logical shift etc..
The present embodiment additionally provides information display device, and this information display device may also set up in the terminal, and the information after information protection device as above is processed that can be used for displays.Shown in Figure 4, information display device includes the first display processing module 41 and the second display processing module 42;
First display processing module 41 is for first displaying the hidden state information of information;First display processing module 41 just directly can display according to the display rule preset after terminal inbound message list being detected, it is also possible to displays according to the selection instruction of user;The display of hidden state information then shows as it is for the part for hiding process, and for user's preview, the raw content for hiding the part disposed then will not show, to reach the purpose of protection;
Second display processing module 42 is for receiving the clear crytpographic key of user's input, and this clear crytpographic key is that user needs to consult whole piece information and input further;Encrypted state information according to this clear crytpographic key pair with this hidden state information association is decrypted process and obtains the prime information of information and display.Display herein can be replace the prime information content after hidden state information only shows deciphering, or show the prime information content after hidden state information and deciphering simultaneously.
The decrypting process of the second display processing module 42 includes:
Clear crytpographic key according to user's input, algorithm corresponding when adopting with encryption calculates the hashed value obtaining clear crytpographic key and compares with the hashed value in the cryptographic Hash storage field of encrypted state information, judge whether the two is consistent, in this way, then according to the clear crytpographic key of user's input, the prime information content of encrypted state information is decrypted process and obtains prime information content;Otherwise, it was shown that the clear crytpographic key of user's input is not right, and prompting user re-enters, also can record the number of times that user re-enters further and carry out locking processing after input number of times reaches pre-determined threshold.
Embodiment three:
Present embodiments providing a kind of terminal, this terminal can be the electric terminal such as mobile phone, IPAD, shown in Figure 5, including processor 51, memorizer 52 and display 53;
Processor 51 is for the sensitive information in identification information, sensitive information is hidden process and obtains hidden state information, the prime information content of sensitive information is encrypted and obtains encrypted state information, and encrypted state information and described hidden state information are associated storage to memorizer 52;And for when not deciphering described encrypted state information, sensitive information being shown as on display 53 hidden state information.
In order to be better understood from the present invention, below information newly generated in terminal to carry out protection process automatically for example, the present invention is described further.
Shown in Figure 6, the process that newly generated information is processed includes:
Step 601: monitor and create fresh information in terminal, this fresh information can be the information newly received or the information newly sent;
Step 602: identify the sensitive information in this fresh information;
Step 603: the process that is hidden at least partially in the sensitive information of fresh information is obtained hidden state information;
Step 604: the prime information content of sensitive information is encrypted and obtains encrypted state information;
Step 605: the encrypted state information obtained and hidden state information are associated storage;
Step 606: first the hidden state information of fresh information is displayed during display;
Step 607: encrypted state information is decrypted display by the clear crytpographic key that reception user inputs further.
Shown in Figure 7, above-mentioned steps 602 identifying, the process of the sensitive information in fresh information includes:
Step 701: obtain message to be detected;
Step 702: the content in detection information;
Step 703: judge whether to comprise sensitive information according to default recognition rule, this recognition rule is not limited to the rule shown in embodiment one;In this way, step 704 is gone to;Otherwise, step 705 is gone to;
Step 704: need to be hidden and encryption.
Step 705: terminate.
Shown in Figure 8, above-mentioned hiding and prime information the encryption process to sensitive information includes:
Step 801: the part of process to be concealed in sensitive information is replaced hiding process and obtains hidden state information;
Step 802: the hidden state information obtained is stored;
Step 803: the prime information of information is encrypted and obtains encrypted state information;
Step 804: with the hidden state information in step 802, the encrypted state information obtained is associated storage, the association storage in the present embodiment has relation one to one after referring to hidden state information and encrypted state information storage.
Shown in Figure 9, when the information after above-mentioned protection processes is checked, its process includes:
Step 901: user selects information to be viewed;
Step 902: judge whether this information processes through protection (encryption), in this way, goes to step 903, all then, goes to step 906;
Step 903: show the hidden state information of this message;
Step 904: judge that whether the clear crytpographic key that user inputs further is legal, in this way, go to step 905;Otherwise, step 907 is gone to;
Step 905: show the prime information of this information.
Step 906: directly normal this message of display;
Step 907: terminate.
One of ordinary skill in the art will appreciate that all or part of step realizing in above-described embodiment method can be by the hardware that program carrys out instruction relevant and completes, described program can be stored in a computer read/write memory medium, this program upon execution, comprises the steps:
Sensitive information in identification information;
The process that is hidden at least partially of the sensitive information in information is obtained hidden state information;
The prime information content of sensitive information is encrypted and obtains encrypted state information;
The encrypted state information obtained and hidden state information are associated storage;
When not deciphering described encrypted state information, described sensitive information is shown as described hidden state information.
Described storage medium, as: ROM/RAM, magnetic disc, CD etc..
Obviously, those skilled in the art should be understood that, each module of the invention described above or each step can realize with general calculation element, they can concentrate on single calculation element, or it is distributed on the network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, can be stored in storage device is performed by calculation element, and in some cases, shown or described step can be performed with the order being different from herein, or they are fabricated to respectively each integrated circuit modules, or the multiple modules in them or step are fabricated to single integrated circuit module realize.So, the present invention is not restricted to any specific hardware and software and combines.
Above content is in conjunction with specific embodiment further description made for the present invention, it is impossible to assert that specific embodiment of the invention is confined to these explanations.For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, it is also possible to make some simple deduction or replace, protection scope of the present invention all should be considered as belonging to.
Claims (14)
1. an information protecting method, it is characterised in that including:
Sensitive information in identification information;
Described sensitive information is hidden process and obtains hidden state information;
The prime information content of described sensitive information is encrypted and obtains encrypted state information, and described encrypted state information and described hidden state information are associated storage;
When not deciphering described encrypted state information, described sensitive information is shown as described hidden state information.
2. information protecting method as claimed in claim 1, it is characterised in that the sensitive information in described identification information includes:
Extract the digital information in described information and obtain the feature of described digital information, carrying out mating to judge that whether it is for sensitive information with the numerical characteristic storehouse preset by it;
Or,
Extract the digital information in described information and according to default key word library judges whether comprise keyword in described information, in this way, then judge that described digital information is as sensitive information.
3. information protecting method as claimed in claim 1, it is characterised in that described sensitive information is hidden process and obtains hidden state information and at least include one below:
Directly it is hidden whole piece sensitive information processing, obtains described hidden state information;
It is hidden processing to a part for sensitive information, obtains described hidden state information;
Select based on user, be hidden processing to the specified portions of sensitive information, obtain described hidden state information.
4. information protecting method as claimed in claim 3, it is characterised in that described hiding process includes:
Directly hide by the content of processing region to be concealed in described sensitive information or delete or replace to other guide.
5. the information protecting method as described in any one of claim 1-4, it is characterised in that the prime information content of described sensitive information is encrypted and obtains encrypted state information and include:
In described prime information content or directly in described information, expansion cipher hashed value stores field;
Receive the encryption key of user's input, adopt preset algorithm to calculate the hashed value obtaining described encryption key and storage stores in field to described cryptographic Hash.
6. information protecting method as claimed in claim 5, it is characterised in that before adopting preset algorithm to calculate the hashed value obtaining described encryption key, also include: the content of described prime information is encrypted according to the encryption key of user's input.
7. a method for information display, it is characterised in that described information is the information after the information protecting method as described in any one of claim 1-6 processes, and described method for information display includes:
The hidden state information of described information is displayed;
Receive the clear crytpographic key of user's input, be decrypted process according to the encrypted state information of described clear crytpographic key pair with described hidden state information association and obtain the prime information of described information and display.
8. an information protection device, it is characterised in that include information identification module, hiding module, encrypting module, storage operation module and display control module;
Described information identification module is for the sensitive information in identification information;
Described hiding module obtains hidden state information for described sensitive information is hidden process;
Described encrypting module obtains encrypted state information for the prime information content of described information is encrypted;
Described storage operation module is for being associated storage by described encrypted state information and described hidden state information;
Described display control module for when not deciphering described encrypted state information, being shown as described hidden state information by described sensitive information.
9. information protection device as claimed in claim 8; it is characterized in that; described information identification module includes the first extraction submodule and matched sub-block, and described first extracts submodule for extracting the digital information in described information and obtaining the feature of described digital information;Described matched sub-block is for carrying out mating to judge that whether it is for sensitive information with the numerical characteristic storehouse preset by the feature of described digital information;
Or,
Described information identification module includes the second extraction submodule and judges submodule, and described second extracts the submodule digital information for extracting in described information;The described key word library judging that submodule is preset for basis judges whether comprise keyword in described information, in this way, then judges that described digital information is as sensitive information.
10. information protection device as claimed in claim 8, it is characterised in that described hiding module includes hiding process submodule, delete processing submodule or replacing submodule;
Described hiding process submodule is for directly hiding by the content of processing region to be concealed in described sensitive information;
Described delete processing submodule is for directly deleting the content of processing region to be concealed in described sensitive information;
Described replacement submodule is for replacing to other guide by the content of processing region to be concealed in described sensitive information.
11. the information protection device as described in any one of claim 8-10, it is characterised in that described encrypting module includes extension submodule and calculating sub module;
Described extension submodule is for the storage field of expansion cipher hashed value in the prime information content of described sensitive information or in described information;
Described calculating sub module calculates, for the encryption key employing preset algorithm according to user's input, the hashed value obtaining described encryption key and storage stores in field to described cryptographic Hash.
12. information protection device as claimed in claim 11; it is characterized in that; described encrypting module also includes encryption submodule; before adopting preset algorithm to calculate the hashed value obtaining described encryption key in described calculating sub module, according to the encryption key of user's input, the content of described prime information is encrypted.
13. an information display device, it is characterised in that described information is the information after the information protection device as described in any one of claim 9-13 processes, described information display device includes the first display processing module and the second display processing module;
Described first display processing module is for displaying the hidden state information of described information;
Described second display processing module, for receiving the clear crytpographic key of user's input, is decrypted process according to the encrypted state information of described clear crytpographic key pair with described hidden state information association and obtains the prime information of described information and display.
14. a terminal, it is characterized in that, including processor, memorizer and display, described processor is for the sensitive information in identification information, described sensitive information is hidden process and obtains hidden state information, the prime information content of described sensitive information is encrypted and obtains encrypted state information, and described encrypted state information and described hidden state information are associated storage to described memorizer;And for when not deciphering described encrypted state information, described sensitive information being shown as on the display described hidden state information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410851604.7A CN105809042A (en) | 2014-12-31 | 2014-12-31 | Information protection method and device, information display method and device, and terminal |
PCT/CN2015/077417 WO2016107024A1 (en) | 2014-12-31 | 2015-04-24 | Information protection and display method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410851604.7A CN105809042A (en) | 2014-12-31 | 2014-12-31 | Information protection method and device, information display method and device, and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105809042A true CN105809042A (en) | 2016-07-27 |
Family
ID=56284070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410851604.7A Pending CN105809042A (en) | 2014-12-31 | 2014-12-31 | Information protection method and device, information display method and device, and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105809042A (en) |
WO (1) | WO2016107024A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106293751A (en) * | 2016-08-15 | 2017-01-04 | 华为技术有限公司 | A kind of method showing information on the terminal device and terminal unit |
CN106372518A (en) * | 2016-08-31 | 2017-02-01 | 维沃移动通信有限公司 | Information protection method and mobile terminal |
CN106604271A (en) * | 2016-12-12 | 2017-04-26 | 努比亚技术有限公司 | Mobile terminal and message check method |
CN106791025A (en) * | 2016-11-28 | 2017-05-31 | 努比亚技术有限公司 | Mobile terminal control device and method |
CN106921805A (en) * | 2017-04-20 | 2017-07-04 | 维沃移动通信有限公司 | A kind of encryption method and mobile terminal |
CN107133993A (en) * | 2017-04-19 | 2017-09-05 | 珠海市魅族科技有限公司 | A kind of image processing method and device |
CN107862214A (en) * | 2017-06-16 | 2018-03-30 | 平安科技(深圳)有限公司 | Prevent the method, apparatus and storage medium of sensitive information leakage |
CN108932099A (en) * | 2017-05-24 | 2018-12-04 | 中兴通讯股份有限公司 | A kind of anti-peeping method and device |
CN109916424A (en) * | 2017-12-12 | 2019-06-21 | 上海博泰悦臻网络技术服务有限公司 | Data processing method, navigation terminal, server, navigation system |
CN110598489A (en) * | 2018-06-13 | 2019-12-20 | 北京搜狗科技发展有限公司 | Privacy protection method for inputting prompt information and related device |
CN111182169A (en) * | 2019-11-13 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Image processing method, image processing device, computer readable medium and electronic equipment |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595978A (en) * | 2018-03-30 | 2018-09-28 | 平安科技(深圳)有限公司 | Information screen method, apparatus, terminal and computer readable storage medium |
CN110719365A (en) * | 2019-09-27 | 2020-01-21 | 深圳传音控股股份有限公司 | Information processing method, mobile terminal and computer storage medium |
CN110943834B (en) * | 2019-12-06 | 2023-02-28 | 歌尔科技有限公司 | Network equipment and its password processing method, control device and readable storage medium |
CN114793172B (en) * | 2022-04-15 | 2024-12-06 | 广东迅数智联科技有限公司 | A private message processing method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN103778380A (en) * | 2013-12-31 | 2014-05-07 | 网秦(北京)科技有限公司 | Data desensitization method and device and data anti-desensitization method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100450126C (en) * | 2002-09-28 | 2009-01-07 | 中兴通讯股份有限公司 | Method for protecting the content of mobile phone short message |
US7681042B2 (en) * | 2004-06-17 | 2010-03-16 | Eruces, Inc. | System and method for dis-identifying sensitive information and associated records |
CN104202735A (en) * | 2014-08-11 | 2014-12-10 | 上海一端科技有限公司 | Method of hiding short message |
-
2014
- 2014-12-31 CN CN201410851604.7A patent/CN105809042A/en active Pending
-
2015
- 2015-04-24 WO PCT/CN2015/077417 patent/WO2016107024A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN103778380A (en) * | 2013-12-31 | 2014-05-07 | 网秦(北京)科技有限公司 | Data desensitization method and device and data anti-desensitization method and device |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11269981B2 (en) | 2016-08-15 | 2022-03-08 | Huawei Technologies Co., Ltd. | Information displaying method for terminal device and terminal device |
CN106293751A (en) * | 2016-08-15 | 2017-01-04 | 华为技术有限公司 | A kind of method showing information on the terminal device and terminal unit |
CN106372518A (en) * | 2016-08-31 | 2017-02-01 | 维沃移动通信有限公司 | Information protection method and mobile terminal |
CN106791025A (en) * | 2016-11-28 | 2017-05-31 | 努比亚技术有限公司 | Mobile terminal control device and method |
CN106604271A (en) * | 2016-12-12 | 2017-04-26 | 努比亚技术有限公司 | Mobile terminal and message check method |
CN107133993A (en) * | 2017-04-19 | 2017-09-05 | 珠海市魅族科技有限公司 | A kind of image processing method and device |
CN106921805A (en) * | 2017-04-20 | 2017-07-04 | 维沃移动通信有限公司 | A kind of encryption method and mobile terminal |
CN108932099A (en) * | 2017-05-24 | 2018-12-04 | 中兴通讯股份有限公司 | A kind of anti-peeping method and device |
CN107862214A (en) * | 2017-06-16 | 2018-03-30 | 平安科技(深圳)有限公司 | Prevent the method, apparatus and storage medium of sensitive information leakage |
CN109916424A (en) * | 2017-12-12 | 2019-06-21 | 上海博泰悦臻网络技术服务有限公司 | Data processing method, navigation terminal, server, navigation system |
CN110598489A (en) * | 2018-06-13 | 2019-12-20 | 北京搜狗科技发展有限公司 | Privacy protection method for inputting prompt information and related device |
CN110598489B (en) * | 2018-06-13 | 2024-05-28 | 北京搜狗科技发展有限公司 | Privacy protection method and related device for input prompt information |
CN111182169A (en) * | 2019-11-13 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Image processing method, image processing device, computer readable medium and electronic equipment |
CN111182169B (en) * | 2019-11-13 | 2022-02-25 | 腾讯科技(深圳)有限公司 | Image processing method, image processing device, computer readable medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2016107024A1 (en) | 2016-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105809042A (en) | Information protection method and device, information display method and device, and terminal | |
US8542823B1 (en) | Partial file encryption | |
US10318744B2 (en) | Touchscreen image mapping for augmented reality devices | |
CN104660589B (en) | Method, system and terminal for encrypting control and information analysis of information | |
US20170295013A1 (en) | Method for fulfilling a cryptographic request requiring a value of a private key | |
US8345876B1 (en) | Encryption/decryption system and method | |
CN104680077B (en) | Method for encrypting picture, method for viewing picture, system and terminal | |
CN103559451A (en) | Method and device for protecting and displaying privacy information | |
CN110312054B (en) | Image encryption and decryption method, related device and storage medium | |
CN106023059A (en) | Watermarking information generation method and apparatus | |
CN105005731A (en) | A data encryption and decryption method and mobile terminal | |
US20130262864A1 (en) | Method and system for supporting secure documents | |
TW200929985A (en) | Secure information storage system and method | |
CN107180197A (en) | file operation method and device | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN112567441A (en) | Information processing system, information processing method, and information processing apparatus | |
CN107800716B (en) | Data processing method and device | |
CN104463019B (en) | The encipher-decipher method of electronic document | |
CN106529317A (en) | Web application encryption and decryption method based on Shadow DOM | |
KR102136656B1 (en) | Electronic terminal device capable of processing conditional security settings for a memo entered in a spreadsheet and operating method thereof | |
CN113434827A (en) | Information tracing method, device and system, electronic equipment and storage medium | |
CN113010918A (en) | Information processing method and device | |
CN103491384B (en) | Encrypting method and device of video and decrypting method and device of video | |
CN107889102B (en) | Method and device for encrypting and decrypting information in short message | |
WO2016188079A1 (en) | Data storage method for terminal device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160727 |
|
WD01 | Invention patent application deemed withdrawn after publication |