JPH03128540A - Security system - Google Patents
Security systemInfo
- Publication number
- JPH03128540A JPH03128540A JP1237070A JP23707089A JPH03128540A JP H03128540 A JPH03128540 A JP H03128540A JP 1237070 A JP1237070 A JP 1237070A JP 23707089 A JP23707089 A JP 23707089A JP H03128540 A JPH03128540 A JP H03128540A
- Authority
- JP
- Japan
- Prior art keywords
- input
- communication
- keyboard
- voice
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 16
- 230000005540 biological transmission Effects 0.000 abstract description 7
- 238000006243 chemical reaction Methods 0.000 abstract description 5
- 230000000694 effects Effects 0.000 abstract description 4
- 238000010079 rubber tapping Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 14
- 238000007796 conventional method Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 2
- 101100328887 Caenorhabditis elegans col-34 gene Proteins 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Abstract
Description
【発明の詳細な説明】
〔産業上の利用分野〕
本発明は、通信の安全性における信号の暗合化によるセ
キュリティ一方式に関する。DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a type of security based on signal encryption in communication safety.
従来の装置は、特開昭56−34253号公報に記載の
ようにデータビットのみを一義的法則に従ってランダム
化していた。In the conventional device, only the data bits are randomized according to the unique law, as described in Japanese Patent Application Laid-Open No. 56-34253.
以上従来技術では、コンピュータ等による暗号解読の点
について配慮が不足しており、固定パタンによる暗号化
では、暗号解読により情報盗聴が容易であるという問題
があった。In the conventional techniques described above, consideration has not been given to decryption using a computer or the like, and encryption using a fixed pattern has the problem that information can be easily intercepted by decryption.
本発明の目的は、暗号化パタンを通信のたびに変更出来
るようにすることにより、バッカーによる暗号解読を困
難にし、通信の安全性を高めることにある。An object of the present invention is to make it difficult for backers to decrypt the encryption pattern by changing the encryption pattern each time communication is made, thereby increasing the security of communication.
上記目的を達成するために1本明細書では3つの方法を
述べるが、基本的概念は、キーボードや音声入力により
、通信のたびに、暗号化法則を変えることにある。In order to achieve the above object, three methods will be described in this specification, but the basic concept is to change the encryption rule each time communication is made using a keyboard or voice input.
(手段1);フレーム同期パタンの変更ディジタル伝送
におけるデータの構成は、第1図に示す様にフレーム同
期パタン等の信号ビットとデータビットに大別される。(Means 1); Changing the frame synchronization pattern The structure of data in digital transmission is roughly divided into signal bits such as frame synchronization patterns and data bits, as shown in FIG.
従来は、一義的に決められたフレームパタン(例えば“
1101”)を使用していたが、キーボードや音声入力
により、フレームパタンを任意に設定する機能を付加し
たものである。Conventionally, a uniquely determined frame pattern (for example, “
1101''), but this version has added a function to arbitrarily set the frame pattern using the keyboard or voice input.
第2図に従来方式の機能図を、第3図に本発明の一実施
例を示す機能図を示す。FIG. 2 shows a functional diagram of a conventional system, and FIG. 3 shows a functional diagram of an embodiment of the present invention.
キーボードや音声入力から、フレーム同期に適したバタ
ンへの変換則については1本特許の範囲外である。The rules for converting keyboard or voice input into bangs suitable for frame synchronization are outside the scope of this patent.
(手段2);データ暗号剤の変更
従来方式は、第4図に示すように、装置の機種又は、R
OMにより一義的にデータを変復調していた。(Means 2): The conventional method for changing the data encryption agent is based on the device model or R
Data was primarily modulated and demodulated by OM.
通信のたびにデータの暗号律則を任意に変更可能とする
ため、キーボードや音声入力により暗号律則を変更出来
る機能を付加したものである。第5図に一実施例を示す
機能図を示す。In order to make it possible to arbitrarily change the encryption rules for data each time a communication is made, a function has been added that allows the encryption rules to be changed using the keyboard or voice input. FIG. 5 shows a functional diagram showing one embodiment.
(手段3);変復調周波数の変更
従来方式は第6図に示すように、スイッチにより数種の
変復調周波数を切り替えていたので、周波数の種類を増
すとハード量が大きくなるという問題があった。(Meaning 3): Changing the modulation and demodulation frequency In the conventional system, as shown in FIG. 6, several types of modulation and demodulation frequencies were changed over using a switch, so there was a problem that increasing the number of frequency types increased the amount of hardware.
本発明では、キーボード又は音声入力に従いVCO(電
圧制御発振器)の入力電圧を変えることにより、変調又
は搬送波周波数を変えることにより、小規模なハード量
にて多種の出力を得ることを可能にしている。In the present invention, by changing the input voltage of a VCO (voltage controlled oscillator) according to keyboard or voice input, it is possible to obtain various outputs with a small amount of hardware by changing the modulation or carrier frequency. .
第7図に一実施例を示す機能図を示す。FIG. 7 shows a functional diagram showing one embodiment.
第3図に示すフレームバタン、第5図に示すPNバタン
(暗号律則)はキーボード又は音声入力により任意に設
定できる0通信のたびに暗号律則を変えることにより、
回線を常時モニタしてコンピュータ等により暗号律則を
解読しようとしても、解読を困難にすることができ、通
信の安全性を高めることができる。The frame button shown in Figure 3 and the PN button (cipher rules) shown in Figure 5 can be set arbitrarily using the keyboard or voice input.By changing the code rules each time a communication is made,
Even if the line is constantly monitored and an attempt is made to decipher the encryption rules using a computer or the like, deciphering can be made difficult, and communication security can be improved.
以下1本発明の一実施例を第3図、第5図により説明す
る。本例は、ディジタル伝送の場合である。An embodiment of the present invention will be described below with reference to FIGS. 3 and 5. This example is a case of digital transmission.
第3図は、通信データ中のフレーム同期ビットのバタン
を任意に変更可能とするものである。In FIG. 3, the button of the frame synchronization bit in the communication data can be changed arbitrarily.
音声や画像等のデータ1に、従来は固定のフレームバタ
ン(例えば1010)を付加して送信データを作成して
いた。それに対しキーボードや音声入力を変換器2にて
コード化し、フレーム同期バタン作成回路3にて入力に
対応したフレームバタンを作成する。Conventionally, a fixed frame button (for example, 1010) was added to data 1 such as audio and images to create transmission data. On the other hand, a converter 2 encodes keyboard and voice input, and a frame synchronization button generation circuit 3 generates a frame button corresponding to the input.
フレーム同期バタン作成回路3の構成は暗号化機能を持
たせてもよいが、基本機能はRAMである。変換器2で
は、キーボード入力の場合には入力をアスキー変換した
値を、又、音声の場合には、音声認識結果をアスキー変
換した値をフレームバタンにすることを考えている。Although the frame synchronization button generation circuit 3 may have an encryption function, its basic function is a RAM. The converter 2 is designed to use a value obtained by converting the input into ASCII in the case of keyboard input, and a value obtained by converting the voice recognition result into frame bang in the case of voice.
ただし、この変換則は無限にあるので、変換則は本特許
の範囲に含めない。However, since there are an infinite number of conversion rules, conversion rules are not included in the scope of this patent.
第5図は、送信データ中の音声や画像等のデータビット
1の暗号律則を任意に変更可能とするものである。変換
器5の動作は第3図の説明と同じである。データの暗号
化にもいろいろな方法があるが、PNバタンの場合につ
いて説明する。FIG. 5 shows an example in which the encryption rules for data bit 1 such as audio and images in transmission data can be changed arbitrarily. The operation of converter 5 is the same as described in FIG. There are various methods for encrypting data, but we will explain the case of PN button.
従来のPNバタン発生器の構成を第8図に示す。FIG. 8 shows the configuration of a conventional PN bang generator.
フリップフロップ(以下FF)の段数と帰還を何段目に
帰えすかにより、ランダム則は一義的に固定される。The random rule is uniquely fixed depending on the number of stages of flip-flops (hereinafter referred to as FF) and to which stage the feedback is returned.
第9図に、ランダム則を任意に変更できるPNバタン発
生器の実施例を示す。FIG. 9 shows an embodiment of a PN bang generator in which the random rule can be changed arbitrarily.
第5図に示すRAM4の出力に従いスイッチ1を○N1
0FFさせることによりランダム則を任意に設定できる
。2がPNパタン発生回路であり、3が、第5図に示す
変調回路2である。Turn switch 1 to ○N1 according to the output of RAM4 shown in Figure 5.
The random rule can be set arbitrarily by setting it to 0FF. 2 is a PN pattern generation circuit, and 3 is a modulation circuit 2 shown in FIG.
本実施例によれば、送信のたびに暗号律則を任意に変更
できるので回線をモニタしコンピュータにて暗号解読し
盗聴することを困難にし、通信の安全性を高める効果が
ある。According to this embodiment, the encryption rules can be arbitrarily changed each time transmission is made, making it difficult to monitor the line and use a computer to decrypt and eavesdrop, thereby increasing the security of communication.
本発明によれば、暗号律則を通信のたびに任意に変更で
きるので、コンピュータ等を用いても暗号解読が困難と
なり、通信の安全性を高める効果がある。According to the present invention, since the encryption rules can be changed arbitrarily each time communication is made, it becomes difficult to decipher the code even using a computer or the like, which has the effect of increasing the security of communication.
第1図は、本発明の一実施例のディジタル伝送における
データ構成図、第2図は、フレーム作成回路の従来方式
を示す機能説明図、第3図はフレーム作成回路に関する
例を示す機能説明図、第4図は、従来のデータ暗号化回
路の機能説明図、第5図はデータ暗号化回路に関する例
を示す機能説明図、第6図は従来の変調回路の機能説明
図、第7図は変調回路に関する例を示す機能説明図、
第8図は従来のPNバタン発生回路図、第9図はPNバ
タン発生回路に関する例を示す機能説明図である。
1・・・データ、
2・・・変換、
3・・・フレーム同期パタン作成。
葛
龜
男
回
4弓
図
篤
+
図
第
呪
篤
乙
図
第
図FIG. 1 is a data configuration diagram in digital transmission according to an embodiment of the present invention, FIG. 2 is a functional explanatory diagram showing a conventional method of a frame creating circuit, and FIG. 3 is a functional explanatory diagram showing an example of the frame creating circuit. , FIG. 4 is a functional explanatory diagram of a conventional data encryption circuit, FIG. 5 is a functional explanatory diagram showing an example of the data encryption circuit, FIG. 6 is a functional explanatory diagram of a conventional modulation circuit, and FIG. 7 is a functional explanatory diagram of a conventional modulation circuit. FIG. 8 is a functional explanatory diagram showing an example of a modulation circuit. FIG. 8 is a diagram of a conventional PN bang generating circuit. FIG. 9 is a functional explanatory diagram showing an example of a PN bang generating circuit. 1...Data, 2...Conversion, 3...Frame synchronization pattern creation. Katsurazu Otoko Volume 4 Yuzu Atsushi + Figure 1 Juatsu Otsu Figure 1
Claims (1)
キュリティ方式において、通信のたびに任意に、暗号化
法則を変更できる機能を設けたことを特徴とするセキュ
リティ方式。1. A communication security system that maintains safety through fixed encryption, which is characterized by having a function that allows the encryption rules to be arbitrarily changed each time communication is made.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP1237070A JPH03128540A (en) | 1989-09-14 | 1989-09-14 | Security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP1237070A JPH03128540A (en) | 1989-09-14 | 1989-09-14 | Security system |
Publications (1)
Publication Number | Publication Date |
---|---|
JPH03128540A true JPH03128540A (en) | 1991-05-31 |
Family
ID=17009972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP1237070A Pending JPH03128540A (en) | 1989-09-14 | 1989-09-14 | Security system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH03128540A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06311106A (en) * | 1993-04-23 | 1994-11-04 | Nec Corp | Privacy communication system |
US7428411B2 (en) * | 2000-12-19 | 2008-09-23 | At&T Delaware Intellectual Property, Inc. | Location-based security rules |
US8843515B2 (en) | 2012-03-07 | 2014-09-23 | Snap Trends, Inc. | Methods and systems of aggregating information of social networks based on geographical locations via a network |
US8874140B2 (en) | 2000-12-19 | 2014-10-28 | At&T Intellectual Property I, L.P. | Location blocking service from a wireless service provider |
US8886226B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for timely whereabouts determination by a mobile data processing system |
US8887177B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for automated content distribution objects |
US8897742B2 (en) | 2009-11-13 | 2014-11-25 | William J. Johnson | System and method for sudden proximal user interface |
US8942693B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for targeting data processing system(s) with data |
US8942733B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for location based exchanges of data facilitating distributed location applications |
US9648454B2 (en) | 2000-12-19 | 2017-05-09 | At&T Intellectual Property I, L.P. | System and method for permission to access mobile location information |
US9852450B2 (en) | 2000-12-19 | 2017-12-26 | At&T Intellectual Property I, L.P. | Location blocking service from a web advertiser |
US9894489B2 (en) | 2013-09-30 | 2018-02-13 | William J. Johnson | System and method for situational proximity observation alerting privileged recipients |
US10477994B2 (en) | 2008-03-14 | 2019-11-19 | William J. Johnson | System and method for location based exchanges of data facilitiating distributed locational applications |
-
1989
- 1989-09-14 JP JP1237070A patent/JPH03128540A/en active Pending
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06311106A (en) * | 1993-04-23 | 1994-11-04 | Nec Corp | Privacy communication system |
US7428411B2 (en) * | 2000-12-19 | 2008-09-23 | At&T Delaware Intellectual Property, Inc. | Location-based security rules |
US10217137B2 (en) | 2000-12-19 | 2019-02-26 | Google Llc | Location blocking service from a web advertiser |
US8874140B2 (en) | 2000-12-19 | 2014-10-28 | At&T Intellectual Property I, L.P. | Location blocking service from a wireless service provider |
US9852450B2 (en) | 2000-12-19 | 2017-12-26 | At&T Intellectual Property I, L.P. | Location blocking service from a web advertiser |
US9763091B2 (en) | 2000-12-19 | 2017-09-12 | At&T Intellectual Property I, L.P. | Location blocking service from a wireless service provider |
US9648454B2 (en) | 2000-12-19 | 2017-05-09 | At&T Intellectual Property I, L.P. | System and method for permission to access mobile location information |
US9078095B2 (en) | 2008-03-14 | 2015-07-07 | William J. Johnson | System and method for location based inventory management |
US9113295B2 (en) | 2008-03-14 | 2015-08-18 | William J. Johnson | System and method for location based exchange vicinity interest specification |
US8942693B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for targeting data processing system(s) with data |
US8942733B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for location based exchanges of data facilitating distributed location applications |
US8942732B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | Location based exchange operating system |
US9014658B2 (en) | 2008-03-14 | 2015-04-21 | William J. Johnson | System and method for application context location based configuration suggestions |
US9055406B2 (en) | 2008-03-14 | 2015-06-09 | William J. Johnson | Server-less synchronized processing across a plurality of interoperating data processing systems |
US10477994B2 (en) | 2008-03-14 | 2019-11-19 | William J. Johnson | System and method for location based exchanges of data facilitiating distributed locational applications |
US9088869B2 (en) | 2008-03-14 | 2015-07-21 | William J. Johnson | System and method for application search results by locational conditions |
US9088868B2 (en) | 2008-03-14 | 2015-07-21 | William J. Johnson | Location based exchange permissions |
US9100792B2 (en) | 2008-03-14 | 2015-08-04 | William J. Johnson | System and method for service-free location based applications |
US8923806B2 (en) | 2008-03-14 | 2014-12-30 | William J. Johnson | System and method for presenting application data by data processing system(s) in a vicinity |
US10111034B2 (en) | 2008-03-14 | 2018-10-23 | Billjco Llc | System and method for sound wave triggered content |
US8886226B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for timely whereabouts determination by a mobile data processing system |
US8887177B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for automated content distribution objects |
US8897742B2 (en) | 2009-11-13 | 2014-11-25 | William J. Johnson | System and method for sudden proximal user interface |
US8897741B2 (en) | 2009-11-13 | 2014-11-25 | William J. Johnson | System and method for mobile device usability by locational conditions |
US9626446B2 (en) | 2012-03-07 | 2017-04-18 | Snap Trends, Inc. | Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network |
US8843515B2 (en) | 2012-03-07 | 2014-09-23 | Snap Trends, Inc. | Methods and systems of aggregating information of social networks based on geographical locations via a network |
US9894489B2 (en) | 2013-09-30 | 2018-02-13 | William J. Johnson | System and method for situational proximity observation alerting privileged recipients |
US10194293B2 (en) | 2013-09-30 | 2019-01-29 | William J. Johnson | System and method for vital signs alerting privileged recipients |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9853809B2 (en) | Method and apparatus for hybrid encryption | |
KR930005572B1 (en) | Data carrier and data communication apparatus using the same | |
JPH03128540A (en) | Security system | |
RU2121231C1 (en) | Method which provides two-point connection in secure communication systems | |
TWI798517B (en) | A system that can be used for quantum encryption, decryption and encoding | |
US20070019811A1 (en) | Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device | |
WO2000070809A3 (en) | Method of and system for encrypting messages, generating encryption keys and producing secure session keys | |
CN104868995B (en) | Coding convention controls formula authenticating method and coding convention controls formula enciphered method | |
CN101345616B (en) | Communication encryption and decryption method of four-item weight score Fourier transform based on multi-parameter | |
Li et al. | Chaotic cryptosystem with high sensitivity to parameter mismatch | |
Čelikovský et al. | Message embedded chaotic masking synchronization scheme based on the generalized Lorenz system and its security analysis | |
JPS59107658A (en) | Method and apparatus of private talk | |
DE59003920D1 (en) | Method for generating a random number for the encrypted transmission of data. | |
Peng et al. | Image encryption based on fractional-order chen hyperchaotic system | |
Shang et al. | Quantum random oracle model for quantum public-key encryption | |
Zhang et al. | A generalized chaos synchronization based encryption algorithm for sound signal communication | |
JP2661085B2 (en) | Encryption device | |
JP2003032244A (en) | Stream cipher apparatus | |
Abid et al. | Implementation of an encrypted wireless communication system using nested chaotic maps | |
EP0705005A3 (en) | Secret-key enciphering method and arrangement therefor capable of preventing unfair acquirement of information | |
Nascimento et al. | A VHDL implementation of the Lightweight Cryptographic Algorithm HIGHT | |
JPH09275390A (en) | Security communication system | |
JPH03121636A (en) | Cryptographic equipment | |
De la Hoz et al. | A secure communication design based on the chaotic logistic map: An experimental realization using arduino microcontrollers | |
CN105407480B (en) | A kind of encryption method of encryption headset |