JPH03128540A - Security system - Google Patents

Security system

Info

Publication number
JPH03128540A
JPH03128540A JP1237070A JP23707089A JPH03128540A JP H03128540 A JPH03128540 A JP H03128540A JP 1237070 A JP1237070 A JP 1237070A JP 23707089 A JP23707089 A JP 23707089A JP H03128540 A JPH03128540 A JP H03128540A
Authority
JP
Japan
Prior art keywords
input
communication
keyboard
voice
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP1237070A
Other languages
Japanese (ja)
Inventor
Izuru Yamada
出 山田
Masashi Tamakoshi
玉越 雅志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Hitachi Information Technology Co Ltd
Original Assignee
Hitachi Ltd
Hitachi Communication Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd, Hitachi Communication Systems Inc filed Critical Hitachi Ltd
Priority to JP1237070A priority Critical patent/JPH03128540A/en
Publication of JPH03128540A publication Critical patent/JPH03128540A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To make difficult a cipher to be deciphered by a hacker and to improve the safety of communication by changing a ciphering rule by a keyboard or voice input each time the communication is executed. CONSTITUTION:The keyboard or voice input is coded by a converter 2 and a frame pattern is prepared by a frame synchronizing pattern preparing circuit 3 corresponding to the input. In the converter 2, a value executing the ASCII conversion of the input is defined as the frame pattern in the case of the keyboard input and a value executing the ASCII conversion of a voice recognized result is defined as the frame pattern in the case of a voice. Since the ciphering rule can arbitrarily be changed for each transmission, it is made difficult to monitor a line, to decipher the cipher by a computer and to execute wire tapping, and there is an effect to improve the safety of the communication.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明は、通信の安全性における信号の暗合化によるセ
キュリティ一方式に関する。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a type of security based on signal encryption in communication safety.

〔従来の技術〕[Conventional technology]

従来の装置は、特開昭56−34253号公報に記載の
ようにデータビットのみを一義的法則に従ってランダム
化していた。
In the conventional device, only the data bits are randomized according to the unique law, as described in Japanese Patent Application Laid-Open No. 56-34253.

〔発明が解決しようとする課題〕[Problem to be solved by the invention]

以上従来技術では、コンピュータ等による暗号解読の点
について配慮が不足しており、固定パタンによる暗号化
では、暗号解読により情報盗聴が容易であるという問題
があった。
In the conventional techniques described above, consideration has not been given to decryption using a computer or the like, and encryption using a fixed pattern has the problem that information can be easily intercepted by decryption.

本発明の目的は、暗号化パタンを通信のたびに変更出来
るようにすることにより、バッカーによる暗号解読を困
難にし、通信の安全性を高めることにある。
An object of the present invention is to make it difficult for backers to decrypt the encryption pattern by changing the encryption pattern each time communication is made, thereby increasing the security of communication.

〔課題を解決するための手段〕[Means to solve the problem]

上記目的を達成するために1本明細書では3つの方法を
述べるが、基本的概念は、キーボードや音声入力により
、通信のたびに、暗号化法則を変えることにある。
In order to achieve the above object, three methods will be described in this specification, but the basic concept is to change the encryption rule each time communication is made using a keyboard or voice input.

(手段1);フレーム同期パタンの変更ディジタル伝送
におけるデータの構成は、第1図に示す様にフレーム同
期パタン等の信号ビットとデータビットに大別される。
(Means 1); Changing the frame synchronization pattern The structure of data in digital transmission is roughly divided into signal bits such as frame synchronization patterns and data bits, as shown in FIG.

従来は、一義的に決められたフレームパタン(例えば“
1101”)を使用していたが、キーボードや音声入力
により、フレームパタンを任意に設定する機能を付加し
たものである。
Conventionally, a uniquely determined frame pattern (for example, “
1101''), but this version has added a function to arbitrarily set the frame pattern using the keyboard or voice input.

第2図に従来方式の機能図を、第3図に本発明の一実施
例を示す機能図を示す。
FIG. 2 shows a functional diagram of a conventional system, and FIG. 3 shows a functional diagram of an embodiment of the present invention.

キーボードや音声入力から、フレーム同期に適したバタ
ンへの変換則については1本特許の範囲外である。
The rules for converting keyboard or voice input into bangs suitable for frame synchronization are outside the scope of this patent.

(手段2);データ暗号剤の変更 従来方式は、第4図に示すように、装置の機種又は、R
OMにより一義的にデータを変復調していた。
(Means 2): The conventional method for changing the data encryption agent is based on the device model or R
Data was primarily modulated and demodulated by OM.

通信のたびにデータの暗号律則を任意に変更可能とする
ため、キーボードや音声入力により暗号律則を変更出来
る機能を付加したものである。第5図に一実施例を示す
機能図を示す。
In order to make it possible to arbitrarily change the encryption rules for data each time a communication is made, a function has been added that allows the encryption rules to be changed using the keyboard or voice input. FIG. 5 shows a functional diagram showing one embodiment.

(手段3);変復調周波数の変更 従来方式は第6図に示すように、スイッチにより数種の
変復調周波数を切り替えていたので、周波数の種類を増
すとハード量が大きくなるという問題があった。
(Meaning 3): Changing the modulation and demodulation frequency In the conventional system, as shown in FIG. 6, several types of modulation and demodulation frequencies were changed over using a switch, so there was a problem that increasing the number of frequency types increased the amount of hardware.

本発明では、キーボード又は音声入力に従いVCO(電
圧制御発振器)の入力電圧を変えることにより、変調又
は搬送波周波数を変えることにより、小規模なハード量
にて多種の出力を得ることを可能にしている。
In the present invention, by changing the input voltage of a VCO (voltage controlled oscillator) according to keyboard or voice input, it is possible to obtain various outputs with a small amount of hardware by changing the modulation or carrier frequency. .

第7図に一実施例を示す機能図を示す。FIG. 7 shows a functional diagram showing one embodiment.

〔作用〕[Effect]

第3図に示すフレームバタン、第5図に示すPNバタン
(暗号律則)はキーボード又は音声入力により任意に設
定できる0通信のたびに暗号律則を変えることにより、
回線を常時モニタしてコンピュータ等により暗号律則を
解読しようとしても、解読を困難にすることができ、通
信の安全性を高めることができる。
The frame button shown in Figure 3 and the PN button (cipher rules) shown in Figure 5 can be set arbitrarily using the keyboard or voice input.By changing the code rules each time a communication is made,
Even if the line is constantly monitored and an attempt is made to decipher the encryption rules using a computer or the like, deciphering can be made difficult, and communication security can be improved.

〔実施例〕〔Example〕

以下1本発明の一実施例を第3図、第5図により説明す
る。本例は、ディジタル伝送の場合である。
An embodiment of the present invention will be described below with reference to FIGS. 3 and 5. This example is a case of digital transmission.

第3図は、通信データ中のフレーム同期ビットのバタン
を任意に変更可能とするものである。
In FIG. 3, the button of the frame synchronization bit in the communication data can be changed arbitrarily.

音声や画像等のデータ1に、従来は固定のフレームバタ
ン(例えば1010)を付加して送信データを作成して
いた。それに対しキーボードや音声入力を変換器2にて
コード化し、フレーム同期バタン作成回路3にて入力に
対応したフレームバタンを作成する。
Conventionally, a fixed frame button (for example, 1010) was added to data 1 such as audio and images to create transmission data. On the other hand, a converter 2 encodes keyboard and voice input, and a frame synchronization button generation circuit 3 generates a frame button corresponding to the input.

フレーム同期バタン作成回路3の構成は暗号化機能を持
たせてもよいが、基本機能はRAMである。変換器2で
は、キーボード入力の場合には入力をアスキー変換した
値を、又、音声の場合には、音声認識結果をアスキー変
換した値をフレームバタンにすることを考えている。
Although the frame synchronization button generation circuit 3 may have an encryption function, its basic function is a RAM. The converter 2 is designed to use a value obtained by converting the input into ASCII in the case of keyboard input, and a value obtained by converting the voice recognition result into frame bang in the case of voice.

ただし、この変換則は無限にあるので、変換則は本特許
の範囲に含めない。
However, since there are an infinite number of conversion rules, conversion rules are not included in the scope of this patent.

第5図は、送信データ中の音声や画像等のデータビット
1の暗号律則を任意に変更可能とするものである。変換
器5の動作は第3図の説明と同じである。データの暗号
化にもいろいろな方法があるが、PNバタンの場合につ
いて説明する。
FIG. 5 shows an example in which the encryption rules for data bit 1 such as audio and images in transmission data can be changed arbitrarily. The operation of converter 5 is the same as described in FIG. There are various methods for encrypting data, but we will explain the case of PN button.

従来のPNバタン発生器の構成を第8図に示す。FIG. 8 shows the configuration of a conventional PN bang generator.

フリップフロップ(以下FF)の段数と帰還を何段目に
帰えすかにより、ランダム則は一義的に固定される。
The random rule is uniquely fixed depending on the number of stages of flip-flops (hereinafter referred to as FF) and to which stage the feedback is returned.

第9図に、ランダム則を任意に変更できるPNバタン発
生器の実施例を示す。
FIG. 9 shows an embodiment of a PN bang generator in which the random rule can be changed arbitrarily.

第5図に示すRAM4の出力に従いスイッチ1を○N1
0FFさせることによりランダム則を任意に設定できる
。2がPNパタン発生回路であり、3が、第5図に示す
変調回路2である。
Turn switch 1 to ○N1 according to the output of RAM4 shown in Figure 5.
The random rule can be set arbitrarily by setting it to 0FF. 2 is a PN pattern generation circuit, and 3 is a modulation circuit 2 shown in FIG.

本実施例によれば、送信のたびに暗号律則を任意に変更
できるので回線をモニタしコンピュータにて暗号解読し
盗聴することを困難にし、通信の安全性を高める効果が
ある。
According to this embodiment, the encryption rules can be arbitrarily changed each time transmission is made, making it difficult to monitor the line and use a computer to decrypt and eavesdrop, thereby increasing the security of communication.

〔発明の効果〕〔Effect of the invention〕

本発明によれば、暗号律則を通信のたびに任意に変更で
きるので、コンピュータ等を用いても暗号解読が困難と
なり、通信の安全性を高める効果がある。
According to the present invention, since the encryption rules can be changed arbitrarily each time communication is made, it becomes difficult to decipher the code even using a computer or the like, which has the effect of increasing the security of communication.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は、本発明の一実施例のディジタル伝送における
データ構成図、第2図は、フレーム作成回路の従来方式
を示す機能説明図、第3図はフレーム作成回路に関する
例を示す機能説明図、第4図は、従来のデータ暗号化回
路の機能説明図、第5図はデータ暗号化回路に関する例
を示す機能説明図、第6図は従来の変調回路の機能説明
図、第7図は変調回路に関する例を示す機能説明図、 第8図は従来のPNバタン発生回路図、第9図はPNバ
タン発生回路に関する例を示す機能説明図である。 1・・・データ、 2・・・変換、 3・・・フレーム同期パタン作成。 葛 龜 男 回 4弓 図 篤 + 図 第 呪 篤 乙 図 第 図
FIG. 1 is a data configuration diagram in digital transmission according to an embodiment of the present invention, FIG. 2 is a functional explanatory diagram showing a conventional method of a frame creating circuit, and FIG. 3 is a functional explanatory diagram showing an example of the frame creating circuit. , FIG. 4 is a functional explanatory diagram of a conventional data encryption circuit, FIG. 5 is a functional explanatory diagram showing an example of the data encryption circuit, FIG. 6 is a functional explanatory diagram of a conventional modulation circuit, and FIG. 7 is a functional explanatory diagram of a conventional modulation circuit. FIG. 8 is a functional explanatory diagram showing an example of a modulation circuit. FIG. 8 is a diagram of a conventional PN bang generating circuit. FIG. 9 is a functional explanatory diagram showing an example of a PN bang generating circuit. 1...Data, 2...Conversion, 3...Frame synchronization pattern creation. Katsurazu Otoko Volume 4 Yuzu Atsushi + Figure 1 Juatsu Otsu Figure 1

Claims (1)

【特許請求の範囲】[Claims] 1、固定的な暗号化により安全性を保っている通信のセ
キュリティ方式において、通信のたびに任意に、暗号化
法則を変更できる機能を設けたことを特徴とするセキュ
リティ方式。
1. A communication security system that maintains safety through fixed encryption, which is characterized by having a function that allows the encryption rules to be arbitrarily changed each time communication is made.
JP1237070A 1989-09-14 1989-09-14 Security system Pending JPH03128540A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP1237070A JPH03128540A (en) 1989-09-14 1989-09-14 Security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP1237070A JPH03128540A (en) 1989-09-14 1989-09-14 Security system

Publications (1)

Publication Number Publication Date
JPH03128540A true JPH03128540A (en) 1991-05-31

Family

ID=17009972

Family Applications (1)

Application Number Title Priority Date Filing Date
JP1237070A Pending JPH03128540A (en) 1989-09-14 1989-09-14 Security system

Country Status (1)

Country Link
JP (1) JPH03128540A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06311106A (en) * 1993-04-23 1994-11-04 Nec Corp Privacy communication system
US7428411B2 (en) * 2000-12-19 2008-09-23 At&T Delaware Intellectual Property, Inc. Location-based security rules
US8843515B2 (en) 2012-03-07 2014-09-23 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
US8874140B2 (en) 2000-12-19 2014-10-28 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US8886226B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for timely whereabouts determination by a mobile data processing system
US8887177B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for automated content distribution objects
US8897742B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for sudden proximal user interface
US8942693B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for targeting data processing system(s) with data
US8942733B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US9648454B2 (en) 2000-12-19 2017-05-09 At&T Intellectual Property I, L.P. System and method for permission to access mobile location information
US9852450B2 (en) 2000-12-19 2017-12-26 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US10477994B2 (en) 2008-03-14 2019-11-19 William J. Johnson System and method for location based exchanges of data facilitiating distributed locational applications

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06311106A (en) * 1993-04-23 1994-11-04 Nec Corp Privacy communication system
US7428411B2 (en) * 2000-12-19 2008-09-23 At&T Delaware Intellectual Property, Inc. Location-based security rules
US10217137B2 (en) 2000-12-19 2019-02-26 Google Llc Location blocking service from a web advertiser
US8874140B2 (en) 2000-12-19 2014-10-28 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US9852450B2 (en) 2000-12-19 2017-12-26 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US9763091B2 (en) 2000-12-19 2017-09-12 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US9648454B2 (en) 2000-12-19 2017-05-09 At&T Intellectual Property I, L.P. System and method for permission to access mobile location information
US9078095B2 (en) 2008-03-14 2015-07-07 William J. Johnson System and method for location based inventory management
US9113295B2 (en) 2008-03-14 2015-08-18 William J. Johnson System and method for location based exchange vicinity interest specification
US8942693B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for targeting data processing system(s) with data
US8942733B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US8942732B2 (en) 2008-03-14 2015-01-27 William J. Johnson Location based exchange operating system
US9014658B2 (en) 2008-03-14 2015-04-21 William J. Johnson System and method for application context location based configuration suggestions
US9055406B2 (en) 2008-03-14 2015-06-09 William J. Johnson Server-less synchronized processing across a plurality of interoperating data processing systems
US10477994B2 (en) 2008-03-14 2019-11-19 William J. Johnson System and method for location based exchanges of data facilitiating distributed locational applications
US9088869B2 (en) 2008-03-14 2015-07-21 William J. Johnson System and method for application search results by locational conditions
US9088868B2 (en) 2008-03-14 2015-07-21 William J. Johnson Location based exchange permissions
US9100792B2 (en) 2008-03-14 2015-08-04 William J. Johnson System and method for service-free location based applications
US8923806B2 (en) 2008-03-14 2014-12-30 William J. Johnson System and method for presenting application data by data processing system(s) in a vicinity
US10111034B2 (en) 2008-03-14 2018-10-23 Billjco Llc System and method for sound wave triggered content
US8886226B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for timely whereabouts determination by a mobile data processing system
US8887177B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for automated content distribution objects
US8897742B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for sudden proximal user interface
US8897741B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for mobile device usability by locational conditions
US9626446B2 (en) 2012-03-07 2017-04-18 Snap Trends, Inc. Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network
US8843515B2 (en) 2012-03-07 2014-09-23 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US10194293B2 (en) 2013-09-30 2019-01-29 William J. Johnson System and method for vital signs alerting privileged recipients

Similar Documents

Publication Publication Date Title
US9853809B2 (en) Method and apparatus for hybrid encryption
KR930005572B1 (en) Data carrier and data communication apparatus using the same
JPH03128540A (en) Security system
RU2121231C1 (en) Method which provides two-point connection in secure communication systems
TWI798517B (en) A system that can be used for quantum encryption, decryption and encoding
US20070019811A1 (en) Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device
WO2000070809A3 (en) Method of and system for encrypting messages, generating encryption keys and producing secure session keys
CN104868995B (en) Coding convention controls formula authenticating method and coding convention controls formula enciphered method
CN101345616B (en) Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter
Li et al. Chaotic cryptosystem with high sensitivity to parameter mismatch
Čelikovský et al. Message embedded chaotic masking synchronization scheme based on the generalized Lorenz system and its security analysis
JPS59107658A (en) Method and apparatus of private talk
DE59003920D1 (en) Method for generating a random number for the encrypted transmission of data.
Peng et al. Image encryption based on fractional-order chen hyperchaotic system
Shang et al. Quantum random oracle model for quantum public-key encryption
Zhang et al. A generalized chaos synchronization based encryption algorithm for sound signal communication
JP2661085B2 (en) Encryption device
JP2003032244A (en) Stream cipher apparatus
Abid et al. Implementation of an encrypted wireless communication system using nested chaotic maps
EP0705005A3 (en) Secret-key enciphering method and arrangement therefor capable of preventing unfair acquirement of information
Nascimento et al. A VHDL implementation of the Lightweight Cryptographic Algorithm HIGHT
JPH09275390A (en) Security communication system
JPH03121636A (en) Cryptographic equipment
De la Hoz et al. A secure communication design based on the chaotic logistic map: An experimental realization using arduino microcontrollers
CN105407480B (en) A kind of encryption method of encryption headset