TW389016B - Encryption device for communication system and method thereof - Google Patents

Encryption device for communication system and method thereof Download PDF

Info

Publication number
TW389016B
TW389016B TW87117561A TW87117561A TW389016B TW 389016 B TW389016 B TW 389016B TW 87117561 A TW87117561 A TW 87117561A TW 87117561 A TW87117561 A TW 87117561A TW 389016 B TW389016 B TW 389016B
Authority
TW
Taiwan
Prior art keywords
signal
encrypted
communication device
message
transmitted
Prior art date
Application number
TW87117561A
Other languages
Chinese (zh)
Inventor
Shau-Wen Lin
Original Assignee
Lin Shau Wen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lin Shau Wen filed Critical Lin Shau Wen
Priority to TW87117561A priority Critical patent/TW389016B/en
Application granted granted Critical
Publication of TW389016B publication Critical patent/TW389016B/en

Links

Abstract

A digital encryption device is used to electrically coupling to a first communication device, while a second communication device is chain-coupled to another digital encryption device, so that when the first communication device is transmitting message through a medium to the second communication device, the message is prevented from being transmitted outside the first and the second communication devices. The digital encryption device comprises the following elements: an analog/digital converter for digitizing the message to form a digital signal; an encryption/decryption device for encrypting the digital signal to generate encrypted signal with the code generated by a code generator, which generates the code according to the RSA algorithm, the code including a public key and a private key; and a modulation/demodulation device for modulating the encrypted signal transmitted from a CPU and generating a modulated signal for the transmission by the medium.

Description

A7 B7 五、發明説明(5·1發明領域 本發明係有關於一種將通訊裝置之間的通訊加密 (encrypt丨〇η) ’以防止被竊聽的袭置,特別是有關於一種 將電話之閉的通訊加密,以防止被竊聽的裝25-2發明背景 經濟部中央標準局員工消費合作社印製 一般通訊系統在進行通訊時,因為其傳 無經過特別處理’所以只要在兩個通訊系統之 的過程中接收到此訊號者,都可以直接了解訊 訊息9故若有竊聽者想竊聽兩個通訊裝置之 時’以電話為例,竊聽者只需對此二電話之間 旁通(by pass)到另一通訊裝置,即可以接收到 信號,並藉以獲得二電話之間所傳送的訊息。 通訊方法很容易被竊聽,尤其是無線通訊,更 者竊聽其通訊内容。 一般傳統的通訊系統之竊聽防止裝置, 解決通訊系統太易於被竊聽的問題,所以傳統 防竊聽裝置是將二通訊系統之間的通訊信號 數段,此數段頻譜之訊號經過頻率轉移之後, 此數段之頻蟠調整其回到其原來的頻譜位置, 解調出通訊信號内原來所含的訊息。因此即使 到通訊信號,因為其不知通訊信號被分成數段 此數段頻譜於頻譜上的位置是如何調整的,故 送的訊號並 間傳輸訊號 號所包含的 間所傳遞的 的通訊線路 其間的通訊 所以傳統的 容易被竊聽 即是為了要 的通訊系統 的頻譜分成 接收端即對 以使接收端 竊聽者接收 頻譜之後, 亦無法解調 {請先閲讀背面之注意»項再填寫本頁) 10^. 訂 本紙張尺度適用中國國家搞準(CNS ) Λ4規格(2丨OX297公犮) 經濟部中央樣準局®C工消費合作社印装 A7 B7 五、發明説明( 出通訊信號内所包含的訊息。 然而一般傳統的防竊聽裝置所用技術是類比式 的’並且其使用的方法有一些缺點,例如在將通訊信號調 整其頻燔位置時,其是由傳统防竊聽裝置中的頻率調換裝 置所執行的,所以其頻率讕換的方式,是固定於傳统防竊 聽裝置中的,若竊聽者也具有相同廠牌或是相同調換頻燔 方法之裝置,則竊聽者仍然可以對所接收到的通訊信號處 理,以獲得其中之訊息。甚蓋竊聽者只要具有PBX端, 則竊聽者仍然可以直接聽到通話内容。尤其是因為技術上 的問題,頻譜調換的方法並不會有太多種,所以即使竊聽 者不具有相同廠牌的防竊聽裝置,亦可竊聽而得到兩通訊 裝置之間所傳送之訊息。另外,對傳統的類比式防竊聽裝 置而言’仍然必須要對電話線電壓準位的校準,方能使傳 統之防竊聽裝置進行運作。 另一種傳統的防狂聽裝置是数位式的,其為一種數 位保密裝置’其雖然可以使得無法由ΡΒΧ端直接聽到通 話内容。但是其缺點是密碼是固定而無法改變的,所以藕 聽者仍可能破解密碼而進行竊聽。另外,尚有一種是密竭 可以改變的,但是其必須將密碼在電話線上傳輪給對方, 對方才能據以將通訊信號中的訊息解出,如此才能進行通 訊。但是此種方式仍有可能會因為傳輸密碼給對方時,被 竊聽者接收而破解’以致竊聽者仍能進行竊聽。此外使用 此種數位保密裝置的通訊系統中間的訊號傳輪,必須使用 品質非常高的通訊線路,否則往往兩通訊者無法通訊成 私紙張尺度適闲中國國家梂準 ( CNS)A4坭格(2丨0χ297公楚) *(請先閲讀背面之注意事項再填寫木頁}A7 B7 V. Description of the Invention (5.1 Field of the Invention The present invention relates to a method of encrypting communication between communication devices to prevent eavesdropping, and in particular to a method of closing a telephone The communication is encrypted to prevent eavesdropping. 25-2 BACKGROUND OF THE INVENTION Employees' cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs print general communication systems when communicating, because the transmission has not been specially processed. Anyone who receives this signal in the process can directly understand the message. Therefore, if an eavesdropper wants to eavesdrop on two communication devices, take the phone as an example, the eavesdropper only needs to pass between the two phones. To another communication device, you can receive the signal and use it to obtain the message transmitted between the two phones. The communication method is easy to be eavesdropped, especially wireless communication, and even to eavesdrop on its communication content. General eavesdropping of traditional communication systems Prevent the device and solve the problem that the communication system is too easy to be eavesdropped. Therefore, the traditional anti-eavesdropping device is to divide the communication signal between the two communication systems into several segments. After the frequency spectrum signal is shifted, the frequency of this number of bands is adjusted to return to its original frequency spectrum position, and the original information contained in the communication signal is demodulated. Therefore, even if it is a communication signal, it does not know that the communication signal is divided into numbers. How to adjust the position of these spectrums on the spectrum, so the transmitted signals are transmitted in parallel and the communication lines included in the signals are used to communicate between them. Therefore, the traditional system that is easy to be intercepted is the communication system required. The spectrum is divided into the receiving end, so that the eavesdropper at the receiving end cannot demodulate after receiving the spectrum {Please read the note on the back »before filling this page) 10 ^. The revised paper size is applicable to China's national standard (CNS) Λ4 specification (2 丨 OX297) 犮 A7 B7 printed by the Central Bureau of Standards of the Ministry of Economic Affairs® C Industrial Consumer Cooperatives 5. Description of the invention (the information contained in the communication signal. However, the technology used in traditional anti-eavesdropping devices is analog And its method has some disadvantages. For example, when adjusting the communication signal to its frequency position, it is used in traditional anti-eavesdropping devices. The frequency switching device is implemented, so the frequency switching method is fixed in the traditional anti-eavesdropping device. If the eavesdropper also has the same brand or the same frequency switching method device, the eavesdropper can still The received communication signal is processed to obtain the information in it. Even if the eavesdropper has a PBX terminal, the eavesdropper can still hear the call directly. Especially because of technical problems, there are not many methods for spectrum switching. Therefore, even if the eavesdroppers do not have the same brand of anti-eavesdropping device, they can eavesdrop and obtain the message transmitted between the two communication devices. In addition, for the traditional analog anti-eavesdropping device, it is still necessary to The calibration of the level can enable the traditional anti-eavesdropping device to operate. Another traditional anti-bugging device is digital, which is a kind of digital security device. Although it can prevent the call content from being heard directly by the PBX terminal. However, the disadvantage is that the password is fixed and cannot be changed, so the listener may still crack the password and eavesdrop. In addition, there is still a type that can be changed, but it must pass the password to the other party on the phone line so that the other party can extract the information in the communication signal based on this, so that the communication can be performed. But this method may still be cracked because it is received by eavesdroppers when transmitting the password to the other party, so that eavesdroppers can still eavesdrop. In addition, the signal transmission wheel in the middle of the communication system using such a digital security device must use a very high-quality communication line, otherwise the two correspondents cannot communicate into a private paper. The Chinese National Standards (CNS) A4 standard (2)丨 0χ297 公 楚) * (Please read the notes on the back before filling out the wooden page}

A7 B7 五 經濟部中央橾隼局貝工消費合作社印製 、發明説明( 功’亦即其通話連綠的困難度後高,^ 所以此種數位保密裝 置亦不是最佳的通訊保密裝置。 5·3發明S的及概遠 鑒於上述之發明背景中,傳 • t^ ^ ^ , X 择·的通訊系統防竊聽裝 A 力致防止竊聽的竊取訊 息,並且其連線成功率不高,使用·χ> 氏用不方便,同時因為其必 須先經過設定方可使用,所以使用去Α Ϋ自行安裝時亦造成不 變。所以本發明的加密數位保密裴瞀* χ其主要目的即是要防 止竊聽者竊取二通訊系統之間所傳通α Α 得遞的訊息,使其無法自 所接收到的訊號中解出該訊息。 根據以上所述之目的,本發明提供了_们^位 保密裝置,係用於電性搞合至第一通訊裝置,並且第二通 訊裝置鏈性耦合至另一個加密數位保密裝置,使第一 裝置欲經由一媒介(media)傳输訊息至第二通訊裝置時, 防止此訊息被傳送到第一及第二通訊裝置以外,此加密數 位保密裝置包含下列元件:類比/數位轉換裝置,用於將 此訊息數位化’以形成數位訊號。加密/解密裝置,用於 將數位訊號’以密碼產生裝置所產生的密碼加密,而產生 加密訊號。調變/解調變裝置’用於對由中央處理單元所 傳送過來的加密訊號調變(modu丨ate),以產生調變訊號, 使其適合於媒介中傳送。而其中上述之訊息可以為下列其 中之一:語音、視訊以及資料(data)。另外,本發明的一 實施例尚可以包含壓缩/解壓缩裝置,以壓缩數位訊號的 本紙張尺度通用中a國家揉率(CNS >A4規格(210X297公釐) •(请先閲讀背面之注意^項再填寫本頁) 訂 五、發明説明( A7 B7 資料量,或是將經過壓缩的訊號解壓缩以回復其原來的 資料量•另亦可包含攪碼/解攪碘裝置,以將所要處理的 訊號中的位元順序依照一預定順序調換,或是將經過攪碼 的訊號之位元恢復其原來的位元順序。 本發明的一較佳實施例中的密碼產生裝置係以一 RSA演算法產生密碑,此密爲包含公開金请以及私人金 鑰。在第一逯訊系統端的加密數位保密裝置與第二通訊系 統端的加密數位保密裝置直接電性耦合時,係依據RSa 廣算法將與第一通訊系統連線之加密數位保密裝置的公 開金鑰,傳送到舆第二通訊系統連線之加 並健存之。同時將與第二通訊系統連線之加密數 置之公開金鑰傳送到與第一通訊系統連線之加密‘裝 密裝置並館存之。另外,與第一通訊系統連線之:保 保密裝置和與第二通訊系統連線之加密數位保密裝位 過媒介電性耦合時,係依據RSA演算法與第一加置逯 保密裝置中的壓縮訊號共同產生之第二密碼而產生數位 一加密數位保密裝置之公開金鑰,並將其傳送到第-此第 數位保密裝置而存之 密 二請先閱讀背面之注意事項再填寫本夏 -•Ό-- ’ ϋ J1 : I n n I · 5-4圈式簡單說明 經濟部中央標準局貝工消費合作社印製 圖一使用者將電話透過本發明的加密數位保 置,舆另一個使用本發明的加密數位保密裝置舆電話 的使用者進行保密通訊時的架構圖。 圈二為本發明加密數位保密裝置之一較佳 密裝 迷缘 施例 tf^i ^^^1 In mi » t紙張尺度適用中國困家標準(CNS ) A4坭格(2丨〇χ297公楚A7 B7 5. Printed by the Central Government Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, printed and invented the description (work, that is, the difficulty of talking even green), so this digital security device is not the best communication security device. 5 In view of the above background of the invention of 3 invention S, the communication system of t ^ ^ ^, X optional · Anti-eavesdropping equipment A is committed to prevent eavesdropping and stealing information, and its connection success rate is not high, use · Χ > It is inconvenient to use. At the same time, it must be set before it can be used, so it will not change when it is installed by itself. Therefore, the encrypted digital security of the present invention Pei * * The main purpose is to prevent The eavesdropper steals the message passed by α Α between the two communication systems, making it impossible to extract the message from the received signal. According to the purpose described above, the present invention provides a security device Is used to electrically couple to the first communication device, and the second communication device is chain-coupled to another encrypted digital security device, so that the first device wants to transmit information to the second communication device via a medium. To prevent this message from being transmitted outside the first and second communication devices, the encrypted digital security device includes the following components: analog / digital conversion device for digitizing this message to form a digital signal. Encryption / decryption device for The digital signal is encrypted with a password generated by a password generating device to generate an encrypted signal. The modulation / demodulation device is used to modulate the encrypted signal transmitted by the central processing unit to generate Modulating the signal to make it suitable for transmission in a medium. The above-mentioned information may be one of the following: voice, video, and data. In addition, an embodiment of the present invention may further include a compression / decompression device, Compressed digital signals on this paper scale are commonly used in a country (CNS > A4 size (210X297 mm) • (Please read the note on the back before filling in this page) Order 5. Description of the invention (A7 B7 data volume , Or decompress the compressed signal to restore its original data amount. • It can also include a codec / deintermediate device to set the bits in the signal to be processed. The order is switched according to a predetermined order, or the bits of the scrambled signal are restored to their original bit order. The cryptographic generating device in a preferred embodiment of the present invention generates a secret monument by using an RSA algorithm. The secret contains the public key and the private key. When the encrypted digital security device on the first communication system side and the encrypted digital security device on the second communication system are directly and electrically coupled, it will be connected to the first communication system according to the RSa algorithm. The public key of the encrypted digital security device of the line is transmitted to the second communication system and is added and saved. At the same time, the public key of the encrypted number connected to the second communication system is transmitted to the first communication. The system's encrypted encryption device is installed and stored in the library. In addition, when connected to the first communication system: the security device and the encrypted digital security device connected to the second communication system are electrically coupled through the medium. Generate a digital-encrypted digital security device public key based on the second password generated by the RSA algorithm and the first encrypted signal in the security device, and send it to the- The digital security device is kept secret. Please read the notes on the back before filling in this summer-• Ό-- 'ϋ J1: I nn I Figure 1 is a diagram of the architecture of a user holding a phone through the encrypted digital device of the present invention, and another user using the encrypted digital security device of the present invention to perform confidential communication. The second circle is one of the better encrypted digital security devices of the present invention. The dense tasting example tf ^ i ^^^ 1 In mi »tThe paper size is applicable to the Chinese Standard for Householder (CNS) A4 坭 格 (2 丨 〇χ297 公 楚

0 I- I A70 I- I A7

五、發明説明() 的系統功能方塊圖。 5·5發明样麯說明 {請先閱讀背面之注$項再填寫本頁) 因為傳統的類比防竊聽裝置在兩個通訊系統之間 傳送的訊犹,並無法完全保障其所内含的訊惠不會被竊聽 者所獲得。而傳統的數位保密裝置之密碼也可能被破解, 導致不密性仍不是最佳’另外還引起通話連線的困難度大 為提高之缺點。所以本發明即提出超數位保密器(加密數 位保密裝置),使二通訊系統之通訊中所使用的密瑪每次 皆不相同,所以不容易破解密碣。另外,本發明所提供的 加密數位保密裝置舆方法可以使得無法由ΡΒΧ端直接聽 到通話内容,並且每次連線成功的機率幾乎到違1 〇〇%, 另外,本發明所提供的加密數位保密裝置之一較佳實施 例’可以用可充電式電池作為其電源,而且其操作是單鍵 操作,操作方便。 經濟部中央樣準局貝工消費合作社印敦 依據本發明的一較佳實施例所提供的加密數位保 密器’其用於電話通訊時,連接方式如圖一所示。其t第 一端10透過電話11與第二端15之電話連線時’第一端 1〇中的電話11連接到依據本發明的一較佳實施例所提 供的加密數位保密器20。在第一端10要送出訊號到第二 端15的過程當中,加密數位保密器20將電話11所傳送 過來的資料傳送到第二端15的加密數位保密器25 ’然後 經過加密數位保密器25的處理,將訊惠傳送到第二端15 的電話機16。另外,在第二端15要送出訊號到第一端 本纸張尺度適用中國困家標準(CNS > Λ4说格(2丨0 X 297公绝) 五、 經濟部中央標準局負工消費合作社印製 發明説明( 10的過程當中,加密數位保密器25將電話16所傳送過 來的資料傳送到第一端10的加密數位保密器2〇,然後經 過加密數位保密器20的處理,將訊息傳送到第一端10 的電話機1 1。 另’由圈一中的加密數位保密器15町知,本發明 的較佳實施例所提供的加密數位保密器之外觀如圈一 中的加密數位保密器20所示,其包含了直流電插座27, 是用來作為本發明的加密數位保密器所需要的耄猓。而電 話線插座28則是用來作為要連線到其他端的電話時所需 的電話線之插座,而電話機插座29則是要速接到本端的 電話機’而散熱孔30則是用來提供本發明的加密數位保 密器散熱之所需。當使用者要進行密碼連線通訊的功能 時,使用者按下啟動鍵31,在通話狀態指示燈32發亮的 部分不停旋轉時,表示連線成功,此時使用者可以開始說 話,或是資料通訊開始•而要停止密碼連線通訊功能時, 則可以再按一下啟動鍵31,或者將話機掛上,則本發明 的加密數位保密裝置會自動關機,以關閉本發 W的加密數 位保密器之運作,而此時通話狀態指示燈32 只U燒滅β 另外在本發明的加密數位保密器表面卜 上,本發明使 用了三個燈號,以表現本加密數位保密裝*热$ ·"的密馬交換狀 態、密碼連線狀態以及電池狀態。其中電碲办社 i吧狀態指示燈 35顯示黃燈時,表示本發明的加密數位保衆壯 φ裝置正在充 電中,綠燈時表示本發明的加密數位保密裝ϊ τ 正在使用電 池作為電源,紅燈時表示作為電池的電源即將世 呢力不足, 本紙張尺度逋用中國國家標準(CNS ) Λ4说格(21〇Χ297公楚)V. Function block diagram of system description (). Description of the Invention Song of 5.5 (Please read the note on the back before filling in this page) Because the traditional analog anti-eavesdropping device transmits the message between the two communication systems, it cannot completely guarantee the information contained in it. Benefits will not be obtained by eavesdroppers. And the password of the traditional digital security device may be cracked, which leads to the fact that the incompatibility is still not optimal. In addition, it also leads to the disadvantage that the difficulty of the call connection is greatly increased. Therefore, the present invention proposes a super digital security device (encrypted digital security device), so that the secrets used in the communication of the two communication systems are different each time, so it is not easy to crack the secrets. In addition, the encrypted digital security device method provided by the present invention can prevent the call content from being heard directly by the PBX terminal, and the probability of each successful connection is almost 100%. In addition, the encrypted digital security provided by the present invention A preferred embodiment of the device 'can use a rechargeable battery as its power source, and its operation is one-button operation, easy to operate. The Encrypted Digital Encryptor provided by the Central Prototype Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, according to a preferred embodiment of the present invention, is used for telephone communication, and the connection method is shown in Fig. 1. When the first end 10 is connected to the telephone of the second end 15 through the telephone 11, the telephone 11 in the first end 10 is connected to the encrypted digital security device 20 provided according to a preferred embodiment of the present invention. In the process of sending the signal from the first end 10 to the second end 15, the encrypted digital security device 20 transmits the data transmitted by the telephone 11 to the encrypted digital security device 25 of the second end 15 and then passes through the encrypted digital security device 25. The processing is transmitted to the telephone 16 on the second end 15. In addition, the second end 15 must send a signal to the first end. The paper size is applicable to Chinese standards (CNS > Λ4 grid (2 丨 0 X 297)). 5. Consumers' Cooperatives, Central Standards Bureau, Ministry of Economic Affairs In the process of printing the description of the invention (10), the encrypted digital security device 25 transmits the data transmitted by the telephone 16 to the encrypted digital security device 20 of the first end 10, and then processes the encrypted digital security device 20 to transmit the message. The telephone set 1 to the first end 10. Also known from the encrypted digital security device 15 in the first circle, the encrypted digital security device provided by the preferred embodiment of the present invention has the appearance of the encrypted digital security device in the first circle. As shown at 20, it includes a DC power socket 27, which is used as the key for the encrypted digital security device of the present invention. The telephone line socket 28 is used as a telephone required to connect to a telephone at the other end. Line socket, while the phone socket 29 is to be quickly connected to the local phone, and the heat dissipation hole 30 is used to provide the heat dissipation of the encrypted digital security device of the present invention. When the user wants to perform the password connection communication function When enabled, the user presses the start button 31. When the illuminated part of the call status indicator 32 rotates continuously, it indicates that the connection is successful. At this time, the user can start talking or data communication starts. For the line communication function, you can press the start key 31 again, or hang up the phone. The encrypted digital security device of the present invention will automatically shut down to turn off the operation of the encrypted digital security device of the present W, and the call status at this time Indicator lights 32 U burn out β In addition, on the surface of the encrypted digital security device of the present invention, the present invention uses three lights to represent the encrypted digital security device of the encrypted digital security device * Hot $ "" Connection status and battery status. When the tellurium office i bar status indicator 35 shows a yellow light, it indicates that the encrypted digital security device of the present invention is being charged, and when the green light indicates the encrypted digital security device of the present invention τ The battery is being used as a power source. When the light is red, it indicates that the power source for the battery will soon be insufficient. This paper uses the Chinese National Standard (CNS) Λ4 grid (21〇 × 297).

發明説明()Invention Description ()

使用者發現後得以將直流電插座27插入電泺線。密码連 線狀態燈36是在連線成功並且密碼檢查正確時則亮起否 則總滅,密填交換狀態燈37是在密码交換成功時則亮起 否則熄滅,使用者得以藉上述兩個燈號以了解連線及密碼 交換的情形》本發明的一較佳實施例所提供之上述外觀僅 為一較佳實施例,並非用以限定本發明,若在上述的外觀 上所具有之顢示功能有所改變,例如加入密碼清除鍵或是 硬體重置(reset)鍵時,只要具有本發明的功能而依據本 發明的方法進行保密通訊者,皆應包含在本發明的精神及 範圍之中。 在使用本發明的加密數位保密裝置時,需要先舆通 訊對象的加密數位保密裝置做密爲交換,並且對每一不同 之通訊對象的加密數位保密系統皆具有一不同密碟,其中 每一組密碼都是由加密數位保密系統所產生。而密场交換 的方式是將要交換密碼的兩個加密數位保密裝置,透過密 碼交換線接上個別的電話線插座28,然後按下啟動按鈕 31,加密數位保密裝置就會自動進行密碼交換β在密碑 交換完成之後,密碼交換狀態燈37就會亮起。 而由本發明的上述步驊交換完密碼之後,以後若要 與此使用者進行保密通訊時,兩方的使用者之電話舆加密 數位保密裝置之連接方式如圈一所示。使用者用一般話機 撥號接通之後,雙方按下啟動按鈕31,本發明所提供的 加密數位保密裝置20與25就會自動檢查電話線路的品 質,並且檢査雙方的密碼是否正確。在上述檢查無誤後, --------1^-- {請先Μ請背面之注意事項再填寫本頁) 訂 ---------After the user finds it, he can insert the DC power socket 27 into the electric cable. The password connection status light 36 is on when the connection is successful and the password check is correct, otherwise it is always off, and the dense exchange status light 37 is on when the password exchange is successful, otherwise it is off, and the user can borrow the above two lights In order to understand the situation of connection and password exchange, the above-mentioned appearance provided by a preferred embodiment of the present invention is only a preferred embodiment, and is not intended to limit the present invention. Some changes, for example, when a password clear key or a hardware reset key is added, as long as it has the functions of the present invention and performs confidential communication according to the method of the present invention, it should be included in the spirit and scope of the present invention. When using the encrypted digital security device of the present invention, it is necessary to exchange the encrypted digital security device of the communication object first, and each encrypted digital security system of the communication object has a different disk, each group of which Passwords are generated by encrypted digital security systems. The secret field exchange method is to encrypt two encrypted digital security devices that need to exchange passwords, connect to individual telephone line sockets 28 through the password exchange line, and then press the start button 31. The encrypted digital security devices will automatically perform password exchange β in After the secret stone exchange is completed, the password exchange status light 37 will light up. After the passwords are exchanged by the above steps of the present invention, and if it is necessary to perform confidential communication with this user in the future, the telephone encryption methods of the two users are encrypted as shown in circle 1. After the user dials up with a general phone and both parties press the start button 31, the encrypted digital security devices 20 and 25 provided by the present invention will automatically check the quality of the telephone line and check whether the passwords of both parties are correct. After the above checks are correct, -------- 1 ^-{Please ask the notes on the back before filling this page) Order ---------

Ί/· CΊ / · C

張尺度適用中國國家梂準(CNS)A4規格(210X297公龙) 五、發明説明() 密场連線狀態燈36將會亮起’然後若通話狀態指示燈3之 亮起的部分不停轉動,則使用者可以開始通話,在使用者 通話完畢掛斷電話後’本發明的加密數位保密裝里可以自 動關閉電源·’進入省電棋式直到下一次使用者再度進行保 密通訊為止。 ' 另外,本發明的加密數位保密裝置亦可以加入密脅 清除鍵’使用者先按下啟動鍵’再於_定時間内按下此密 场清除健’以清除已經储存的密峰紀錄表。經過此密為濟 除步驟之後,必須要舆通話對象重新做一次密碼交換,以 後才能進行保密通訊。另,本發明的加密數位保密裝置之 一實施例可同時儲存800組通話對象之密碼,並且可以 使用兹電池’待機時間長,還可以單鍵操作以簡化操作程 序。上述特性僅是本發明的一較佳實施例所具有,並非用 以限定本發明,若在上述的使用特性之外,再加上其他功 能之改善,倘其加密及通訊的方法是依據本發明的功能而 進行保密通訊者,亦應包含在本發明的精神及範困之中。 經濟部中央標準局負工消費合作社印家 本發明所提供的加密數位保密裝置之系統方瑰圈 如圈二所示,其中本發明的加密.數位保密裝置中的數位/ 類比轉換器50接收由電話11所傳送過來的訊息,益且 將其數位化之後’將所得到數位訊號傳送到壓缩/解麇缩 裝置51進行訊號壓縮而得到一壓縮訊號,並將其傳送到 加密/解密裝置53進行加密之前,先以中央處理器52將 其送入挽场/解扰瑪(scramble/descramble)裝置54,以一 預設项序對麼縮訊號中的位元作扰马(scramble)而得到 ^紙張尺度逋用中國國家標準(cns ) A4現格(2i〇x29Ti|~y 經濟部中央橾準局男工消費合作社印製 A7 —_____B7 五、發明説明(—) ~ '~' ---- 一挽瑪訊號,然後中央處理器52將攪碼訊號傳送到加密 /解密裝置.53’以將舆電話直接連接的加密數位保密 裝置所產生的密瑪(公開金锖public key舆私人金輪 private key)中的私人金鑰對攪碣訊號做加密 (encryption),然後中央處理器52將此加密訊垅傳送到 攪碼/解攪碼裝置54’以該預設順序對加密訊號進行第二 次攪碼而得到經攪碼加密訊號,然後中央處理器52將其 送入鐧變/解調變裝置55,接著中央處理裝置52將此經 攪碼加密訊號送到調變/解調變裝置55處理,以將此經授 碼加密訊號之頻率調變(mod u late)成適合於傳輸至第二 端15的調變訊號。因此經過加密的訊息被包含在此調變 訊號内,而經過傳遞媒介傳送到第二端15中之依據本發 明的加密數位保密裝置,以供其解密而得到其中所含的訊 息。 而本發明的裝置在接收訊號時,上述第二端15中 之依據本發明的加密數位保密裝置,將内含訊息的調變訊 號傳送到圈二依據本發明的加密數位保密裝里中的調變/ 解調變裝置55,此時調變/解調變裝置55對此調變訊號 解調變(demodulate),以使其頻率適合於本發明的加密數 位保密裝置所處理。然後t央處理器52將調變/解調變裝 置55對調變訊號解調變所得的經攪碼加密訊號傳送到攪 碼/解攪碼裝置54’以進行解攪碼(descramble)的工作, 依照該預設順序抽出攪碼訊號的位元,而得以將此攪碼訊 號内的加密訊號抽出,並且由t央處理器52傳送到加密 本紙張尺度適用中國國家標準(CNS ) Λ4規搞(210x297公楚) ο ! *π先閲I背面之注#^項再填寫本頁) 訂 I H· - .The scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 male dragon). 5. Description of the invention () The closed-field connection status light 36 will light up, and then if the illuminated part of the call status light 3 rotates continuously Then, the user can start a call, and after the user hangs up the phone, "the encrypted digital security device of the present invention can automatically turn off the power." Enter the power-saving chess mode until the next time the user performs confidential communication again. In addition, the encrypted digital security device of the present invention can also add a secret threat clear key ‘the user first presses the start key’ and then presses this secret field clear key within a predetermined time ’to clear the stored dense peak record table. After this secret removal step, the callee must be exchanged for a new password before confidential communication can be performed. In addition, an embodiment of the encrypted digital security device of the present invention can simultaneously store the passwords of 800 groups of callees, and can use a battery 'for a long standby time, and can also be operated with a single key to simplify the operation procedure. The above-mentioned characteristics are only provided by a preferred embodiment of the present invention, and are not intended to limit the present invention. If in addition to the above-mentioned use characteristics, plus the improvement of other functions, if the method of encryption and communication is based on the present invention The function of confidential communication should also be included in the spirit and scope of the present invention. The system of the encrypted digital security device provided by the present invention provided by the Central Standards Bureau of the Ministry of Economic Affairs and Consumer Cooperatives is shown in circle 2, where the encryption of the present invention is received by the digital / analog converter 50 in the digital security device. The message transmitted from the phone 11 is digitized and then 'the obtained digital signal is transmitted to the compression / decompression device 51 for signal compression to obtain a compressed signal, which is then transmitted to the encryption / decryption device 53 for Before encryption, it is first sent to the scramble / descramble device 54 by the central processing unit 52, and the bits in the shrink signal are scrambled in a preset item order to obtain ^ Paper standards are in accordance with Chinese National Standard (cns) A4 (2i0x29Ti | ~ y Printed by Male Workers Consumer Cooperatives, Central Bureau of Standards, Ministry of Economic Affairs, A7 —_____ B7 V. Description of Invention (—) ~ '~' ---- After receiving the signal, the CPU 52 transmits the scrambled signal to the encryption / decryption device. 53 'to generate a secret key (public key and private key) generated by an encrypted digital security device directly connected to the public telephone. ) Encrypts the scrambled signal with the private key, and then the CPU 52 sends the scrambled signal to the scramble / de-scramble device 54 'to perform a second scramble on the encrypted signal in the preset order. The scrambled and encrypted signal is obtained, and then the CPU 52 sends it to the conversion / demodulation device 55, and then the CPU 52 sends the scrambled and encrypted signal to the modulation / demodulation device 55 for processing. Modulate the frequency of this coded encrypted signal into a modulated signal suitable for transmission to the second end 15. Therefore, the encrypted message is included in this modulated signal and transmitted to the transmission medium. The encrypted digital security device according to the present invention at the second end 15 is used for decryption to obtain the information contained therein. When the device of the present invention receives a signal, the encrypted digital number according to the present invention at the second end 15 The security device transmits the modulation signal containing the message to the modulation / demodulation device 55 in the encrypted digital security device according to the present invention. At this time, the modulation / demodulation device 55 responds to the modulation signal. Demodulation (demodulate), So that its frequency is suitable for processing by the encrypted digital security device of the present invention. Then the central processor 52 transmits the scrambled encrypted signal obtained by demodulating the modulation signal by the modulation / demodulation device 55 to the scramble / decrypt The scramble device 54 ′ performs descramble work, and extracts the bits of the scramble signal according to the preset order, so that the encrypted signal in the scramble signal can be extracted and transmitted by the central processor 52. To the paper size of the encrypted paper, the Chinese National Standard (CNS) Λ4 regulations are applied (210x297). Ο! * Π Please read the note # ^ on the back of I before filling this page) Order IH ·-.

經濟部中央樣準局員工消费合作社印裝 五、發明説明() /解密裝置53’以由和電話n直接連接的加密數位保密 裝里所產生的密項中的私人金鑰對加密訊號做解加密以 得到it瑪訊號•然後中央處理器52將攪碭訊號傳送到攪 碼/解攪碘裝置54進行解攪碭,用該预設順序恢復該攪瑀 訊號中每個位元之位置,以得到麈缩訊號。然後中央處理 器52將應编訊號送到墨缩/解壓缩裝置以進行解壓缩,而 獲得未經®縮的數位訊號,並且傳送到數位/類比轉換器 50’以將此未經壓縮的數位訊號轉換成為類比訊號,並 傳送到電話11,將此類比訊號轉換成音頻訊號。 _L述本發a片的加密數位保密系統之内部結構僅是 本發明的一較佳實施例爾,本發明的加密數位保密裝置玎 以不包含壓縮/解壓縮裝置51或攪碼/解攪碼裝置54,或 是兩者皆不包含,仍可以進行具有上述本發明的較佳實施 例之保密通訊的功能。 上述的本發明之加密數位保密裝置並不限定於與 電話機一起使用,其所要傳送的資料内容也可以是文字資 料或是視訊資料,若是要傳送的訊息本身已經是數位資料 時’則本發明的一較佳實施例中的數位/類比轉換器50 並不需要使用於本發明的一較佳實施例中。另外,若是f 央處理器52處理的速度夠快或是第一端以及第二端之通 訊頻寬夠大時,也可以不使用壓缩/解壓缩裝置51,直接 將數位訊號由中央處理器52傳送到攪碼/解攪碼裝置 54’以進行攪碼,而後其餘處理舆有壓縮/解壓缩裝置51 的處理情形相同。甚至,亦可以不用攪碼/解攪碼裝置 本紙法尺度適用中國國家標隼(CNS ) A4規格(210X297公嫠) *請先閱讀背面之,¾意事項再填商本萸) -Λν.Printed by the Consumer Cooperatives of the Central Sample Bureau of the Ministry of Economic Affairs 5. Description of the invention () / Decryption device 53 'uses the private key in the secret item generated by the encrypted digital security device directly connected to the phone n to decrypt the encrypted signal Encrypt to get it signal. Then the CPU 52 sends the churning signal to the churning / descending iodine device 54 for descrambling, and restores the position of each bit in the churning signal with the preset order. Get a crimped signal. The CPU 52 then sends the coding signal to the ink reduction / decompression device for decompression to obtain an uncompressed digital signal, and sends it to the digital / analog converter 50 'to convert the uncompressed digital The signal is converted into an analog signal and transmitted to the telephone 11 to convert the analog signal into an audio signal. _L The internal structure of the encrypted digital security system of the a-chip of the present invention is only a preferred embodiment of the present invention. The encrypted digital security device of the present invention does not include the compression / decompression device 51 or the scramble / unscrambling code. The device 54, or neither of them, can still perform the function of secure communication having the above-mentioned preferred embodiment of the present invention. The above-mentioned encrypted digital security device of the present invention is not limited to use with a telephone. The data content to be transmitted may also be text data or video data. If the message to be transmitted is already digital data, then the present invention The digital / analog converter 50 in a preferred embodiment does not need to be used in a preferred embodiment of the present invention. In addition, if the processing speed of the central processing unit 52 is fast enough or the communication bandwidth of the first end and the second end is large enough, the digital signal can be directly transmitted from the central processing unit 52 without using the compression / decompression device 51. It is transmitted to the scramble / de-scramble device 54 'for scramble, and the rest of the processing is performed by the compression / decompression device 51 in the same way. Even, it is not necessary to use the scramble / unscramble device. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297). * Please read the back of the paper first, and then fill in the business note of the paper) -Λν.

IT 經濟部中央標準局員工消费合作社印製 A7 ______B7 五、發明説明() 54,而將數位訊號直接由中央處理器52傳送到加密/觯 密裝置53處理,其餘後續處理情形與有攪碼/解攪碼裝置 54者相同。另外,尚可以使用壓缩/解壓缩裝置51,而 不使用攪瑪/解攪碼裝置54,其訊號處理情形與本發明於 圈二中的較佳實施例者所處理的訊號相差只少了一個攪 碘/解攪碼裝置所處理者,其餘處理皆相同,亦可以得到 保密通訊的結果,凡此種將加密/解密裝置應用於通訊系 統中,並且用於加密舆解密的公開金鑰舆私人金婧是經由 RSA(Rivest Shamir Adleman)演算法隨機I數產生者(在 本發明的一較佳實施例中可以是對使用者音頻訊號抽樣 再加上RSA所產生的隨機亂數而產生卜其皆為本發明的 較佳實施例,是故亦不脫本發明的精神舆範团。若將上述 密項位元設為512位元,則其密瑪之組合可以達到2512 種,約等於(一兆)17種’故幾乎是無法破解的。本發明的 一較佳實施例是採用RSA全程即時加密,而壓缩/解壓缩 標準是符合丨TU-T G.72 3.1語音壓縮/解壓缩,故其音質 比一般傳統保密裝置之音質大為提高。此外本發明的一較 佳實施例中,其通訊協定時間非常短,可以達到1 0秒内, 而且其連線所需速度僅需9600bps(每秒位元包),連線成 功率幾乎達到百分之一百。並且其為全雙工(full duplex)’其通信介面符合美規pSTN(公眾交換電話網路) 以及歐規標準’另外其可以隨插即用,省去使用者安裝的 麻煩。 上述的本發明之加密數位保密裝置進行第一次通 本紙張尺度適用中國國家#準(CNS ) A4规格(210X297公犮) Ο ! 二窬先閲見背面之注意事β再填寫本瓦) 訂 Α7 Β7 五、發明説明() 訊之前’其與通訊系統及欲通訊對象間之連接情形如圖一 之連接情形,所不同的是第一端1〇的加密數位保密裝置 20之電話線插座28’必須和第二端15的加密數位保密 裝置25之電話線插座直接電性耦合,以將個別的公開金 鑰直接傳送給對方’並存於對方的公開金鑰列表(pub|jc key directory)中相對於通訊對象的位址β此第一次交換 金锖時的金錄產生方式是以RSA演算法隨機產生,爾後 若進行第一次通訊時’即是將含有对方公開金婧的資訊以 本身的私人金鑰加密並將此加密訊息傳到對方,同時對方 亦做相同的動作,送一加密訊息到本方,接著以本方的私 人金鑰對所接收的加密訊息解密,若得出的是本方的公開 金鑰’則表示此通訊過程要進行保密通訊,並且在此次通 訊中’本方的加密通訊裴置會把通訊過程中使用者的音頻 訊號數位化之後的訊號抽出_筆,以與RSA演算法隨機 產生的密碼結合’藉以產生另一對本方的公開金鑰以及私 人金婧,相同的,對方也做如此之動作,同時雙方於通訊 過程中會交換此後來產生的公開金鑰給對方存於公開金 鍮列表中。由以上可知本發明的加密數位保密系統可以每 次變換密碼,並且經由公開金鍮與私人金鑰等RSA演算 法的架構,使本發明的密碼於傳輸中不致外洩,故其通訊 非常安全。本案並不是完全依照傳統的RSA演算法產生 密碼,本案乃擷取其中一部份,配合本案所採用的方法’ 使所產生的亂碼不會有依照順序出現的機會,因為RSA 演算法乃密碼學中廣泛應用的方法,所以其原理於此不赘 13 本紙張尺度適用中國國家揉準(CNS > Λ4現格Πΐ〇729Τ^ ^ Q! ·( t先W讀背面之注f項再填寫本頁) ’ITI I.—. —I ^v*y—. 經濟部中央標準局員工消費合作社印繁 A7 B7 五、發明説明( 述。此外本發明的加密數位保密裝置所使用的加密演算法 推然是RS A演算法,但是此演算法只是本發明所使用的 一個實施例’仍可以使用其他的演算法來產生密妈。 另,本發明的一較佳實施例亦提供一種防止通訊系 统間之通訊的防竊聽方法,此方法即是依據本發明的加密 數位保密裝置之各個元件所執行的功能,分別對欲傳輸的 訊息作處理’使得包含有訊息的通訊訊號在媒介中傳送 時,訊息内容無法被通訊雙方之外的接收者所解出° 以上所述僅為本發明之較佳實施例而已,並非用以 限定本發明之申請專利範面;凡其它未脫離本發明所揭示 之精神下所完成之等效改變或修飾,均應包含在下述之申 锖專利範团内。 *(婧先閲讀背面之注項再填寫本頁> -訂 — ' ίν 經濟部中央樣準局員工消費合作社印¾ 14 本紙浪尺度適用中國國家標準(CNS ) A4说格(210X297公釐)Printed by A7 ______B7 of the Consumer Cooperatives of the Central Standards Bureau of the Ministry of IT and Economics V. Invention Description (54), and the digital signal is directly transmitted from the central processor 52 to the encryption / encryption device 53 for processing. The descrambling device 54 is the same. In addition, the compression / decompression device 51 can be used instead of the churning / de-scrambling device 54. The signal processing situation is only one less than the signal processed by the preferred embodiment of the present invention in the second circle. The rest of the processing performed by the iodine / unscramble device are the same, and the result of confidential communication can also be obtained. Any public key that uses the encryption / decryption device in the communication system and is used for encryption and decryption Jin Jing is a random I number generator based on the RSA (Rivest Shamir Adleman) algorithm. (In a preferred embodiment of the present invention, it can be generated by sampling the user's audio signal and adding random random numbers generated by RSA. All are the preferred embodiments of the present invention, and therefore do not depart from the spirit of the present invention. If the above-mentioned secret bit is set to 512 bits, the combination of its denser numbers can reach 2512, which is approximately equal to ( One trillion) 17 kinds of 'is almost impossible to crack. A preferred embodiment of the present invention uses RSA full-time instant encryption, and the compression / decompression standard is in line with TU-T G.72 3.1 voice compression / decompression, So its sound quality is better than average The sound quality of the traditional security device is greatly improved. In addition, in a preferred embodiment of the present invention, the communication protocol time is very short, which can reach 10 seconds, and the connection speed is only 9600bps (bit packets per second). ), The connection success rate reaches almost 100%. And it is full duplex (the full duplex), and its communication interface complies with the US regulatory pSTN (Public Switched Telephone Network) and the European regulatory standard. In addition, it can be plug-and-play The above-mentioned encrypted digital security device of the present invention can be used for the first time. The paper size applies to China National Standards (CNS) A4 (210X297). 〇! Please see the back of the document Note for β, please fill in this tile) Order A7 B7 V. Description of the invention () Before the news, the connection between it and the communication system and the object to be communicated is shown in the connection situation in Figure 1. The difference is the first end 10 The telephone line socket 28 'of the encrypted digital security device 20 must be directly and electrically coupled with the telephone line socket of the encrypted digital security device 25 of the second end 15 to directly transmit the individual public key to the other party' and store it in the other party. The public key list (pub | jc key directory) is relative to the address of the communication partner β. The gold record generation method for the first exchange of gold coins is randomly generated by the RSA algorithm. If the first communication is performed later, That is, the information containing the other party's public Jing Jing is encrypted with its own private key and the encrypted message is transmitted to the other party. At the same time, the other party does the same action, sends an encrypted message to the party, and then uses the party's private key. Decrypt the received encrypted message. If you get your own public key, it means that this communication process needs to be confidential. In this communication, your own encrypted communication will be used by Pei Zhi. After the audio signal of the person has been digitized, the signal is extracted and combined with the password randomly generated by the RSA algorithm to generate another pair of his public key and private gold. Similarly, the other party also does the same. During the communication process, the two parties will exchange the public key generated later and store it in the public gold list. From the above, it can be known that the encrypted digital security system of the present invention can change the password each time, and through the structure of the RSA algorithm such as the public key and the private key, the password of the present invention is not leaked during transmission, so its communication is very secure. This case does not generate the password completely according to the traditional RSA algorithm. This case extracts a part of it and cooperates with the method used in this case to prevent the generated garbled code from appearing in order because the RSA algorithm is cryptography. The method is widely used in China, so its principle is not repeated here. 13 This paper size is applicable to the Chinese national standard (CNS > Λ4 is now Πΐ〇729Τ ^ ^ Q! · (T first read the note f on the back and fill in this Page) 'ITI I.—. —I ^ v * y—. Employee Consumer Cooperatives of the Central Bureau of Standards, Ministry of Economic Affairs, A7, B7, and V5. Description of the invention (in addition. In addition, the encryption algorithm used in the encrypted digital security device of the present invention is inferred. Of course, it is an RS A algorithm, but this algorithm is only one embodiment of the present invention. It is still possible to use other algorithms to generate secrets. In addition, a preferred embodiment of the present invention also provides a method for preventing communication between systems. Anti-eavesdropping method for communication, this method is the function performed by each element of the encrypted digital security device according to the present invention, and processes the message to be transmitted separately, so that the communication message containing the message When transmitting in the medium, the content of the message cannot be interpreted by recipients other than the communicating parties. The above is only a preferred embodiment of the present invention, and is not intended to limit the scope of patent application of the present invention. Equivalent changes or modifications made without departing from the spirit disclosed in the present invention should be included in the following patent application groups. * (Jing first read the note on the back before filling out this page >-订 — 'ίν Printed by the Employees' Cooperatives of the Central Bureau of Standards, Ministry of Economic Affairs of the People's Republic of China 14 14 This paper applies the Chinese National Standard (CNS) A4 standard (210X297 mm)

Claims (1)

A8 B8 C8 D8 、申請專利範圍 1, 一種加密(enCryptj〇n)數位保密裝置,係用於提供第— 加密數位保密裝置電性耦合至第一通訊裝置,並提供第二 加密數位保密裝置電性耦合至第二通訊裝置’使該第一通 訊裝置欲經由一媒介(mecjja)傳輸訊息至該第二通訊裝置 時,防止該訊患傳送到該第一通訊裝里以及該第二通訊裝 置以外’該加密數位保密裝置至少包含: 類比/數位轉換裝置,係用於將該訊息數位化,以形 成一數位訊號; 壓縮✓解壓縮裝置,係用於將該數位訊號壓縮,以形 成一壓縮訊號; 攪碼/解攪碼裝置,係用於將由中央處理單元所傳送 過來的該壓縮訊號的位元依照一預設順序調換,以形成一 攪碘訊號; 經濟部中央揉準局負工消费合作社印製 (犄先«讀背面之注$項再填窝本頁) 加密/解密裝置,係用於將由該中央處理單元所傳送 過來的該攪碼訊號,以一密碼產生裝置所產生的密碼加 密’以產生一加密訊號,然後該中央處理單元再將該加密 訊號傳送到該攪碼/解攪碼裝置,以將該加密訊號中的位 元依照該預設順序調換而形成一經扰瑪加密訊號,該密场 產生裝置係以一 RSA(Rivest Shamir Adleman)演算法產 生該密瑪’該密碼至少包含公開金墙以及私人金鑰;以及 調變/解調變裝置,係用於對由該中央處理單元所傳 送過來的該經攪碼加密訊號調變(modulate),以產生一調 本紙張尺度逋用中國國家橾準(CNS > A4*l格(210X297公釐) 、申請專利範囷 變訊號,使該調變訊號適合於在該媒介中傳送 號内至少包含有經過該私人金鑰加密的铉訊息。調變訊 2. 如申請專利範圍第,項之裝置其中上述之钒 先 下列其中之一:語音、视訊以及資料(data)。"以為 3. 如申諝專利範面第1項之裝置,其中上述之第〜 JT 位保密裝置舆該第二加密數位保密裝置直接電2密數 時,係依㈣咖演丨法將該第一加密數位保密教:合 公開金鎗傳送到該第二加密數位保密裝置並儲存之同= 將該第二加密數位保密裝置之公開金鑰傳送到該第一加 密數位保密裝置並儲存之,該第一加密數位保密裝置與該 第二加密數位保密裝置透過該媒介電性耦合時,係依據該 RSA演算法舆該第一加密數位保密裝置中的該壓缩訊號 共同產生之第二密碼而產生該第—加密數位保密裝置之 公開金鑰’並傳送到該第二加密數位保密裝置而儲存之。 4.如申請專利範圍第1項之裝置,其中上述之媒介可以為 下列其中之一:網際網路、電話線、電纜線以及無線通訊 媒介。 經濟部中央橾準局負工消费合作社印装A8 B8 C8 D8, patent application scope 1, an encrypted (enCryptj〇n) digital security device, is used to provide the first-encrypted digital security device is electrically coupled to the first communication device, and provides the second encrypted digital security device electrical Coupling to the second communication device 'When the first communication device wants to transmit a message to the second communication device via a medium (mecjja), prevent the patient from being transmitted to the first communication device and outside the second communication device' The encrypted digital security device includes at least: an analog / digital conversion device for digitizing the information to form a digital signal; a compression ✓ a decompression device for compressing the digital signal to form a compressed signal; The scramble / unscramble device is used to exchange the bits of the compressed signal transmitted by the central processing unit according to a preset order to form an iodine scramble signal. System (犄 read the note on the back of the page before filling in the page) An encryption / decryption device is used to encode the code sent by the central processing unit To encrypt a password generated by a password generating device to generate an encrypted signal, and then the central processing unit transmits the encrypted signal to the scramble / de-scramble device, so that the bits in the encrypted signal are in accordance with The preset sequence is exchanged to form a scrambled encrypted signal. The dense field generating device generates the dense Mara using an RSA (Rivest Shamir Adleman) algorithm. The password includes at least a public golden wall and a private key; and modulation / A demodulation device is used for modulating the scrambled and encrypted signal transmitted from the central processing unit to generate a modulated paper size using the Chinese National Standard (CNS > A4 * l Grid (210X297 mm), patent application for change signal, make the modulation signal suitable for transmitting in the medium the number contains at least the private message encrypted by the private key. Modulation message 2. If the scope of patent application The device of item 1, in which the vanadium mentioned above is one of the following: voice, video, and data. &Quot; Think 3. The device of item 1 of the patent scope, such as the above item When the JT security device directly transmits the second encryption number to the second encrypted digital security device, the first encrypted digital security device is transmitted to the second encrypted digital security device and stored in accordance with the law. The same = When the public key of the second encrypted digital security device is transmitted to the first encrypted digital security device and stored, the first encrypted digital security device and the second encrypted digital security device are electrically coupled through the medium. Is based on the RSA algorithm and the second password jointly generated by the compressed signal in the first encrypted digital security device to generate the public key of the first encrypted digital security device and transmits it to the second encrypted digital security device And save it. 4. For the device in the scope of patent application, the above medium can be one of the following: Internet, telephone line, cable line and wireless communication medium. Printed by the Consumer Affairs Cooperative of the Central Procurement Bureau of the Ministry of Economic Affairs 矬濟部中夹梂率扃負工消费合作社印装 A8 B8 C8 ______ D8 六、申請專利範圍 時,防止該訊息傳送到該第一通訊裝置以及該第二通訊裝 置以外,該加密數位保密裝置至少包含: 顓比/數位轉換裝置’係用於在該訊息由該第一通訊 裝置傳送到該第二通訊裝置的過程中,將該訊息數位化, 以形成一數位訊號’該類比/數位轉換裝置在該第二通訊 裝置欲傳送到該第一通訊裝置的過程中,將該數位訊號類 比化,以形成一類比格式的該訊息; 壓缩/解麇缩裝置,係用於在該訊惠由該第一通訊裝 置傳送到該第二通訊裝置的過程中,將該數位訊號壓缩, 以形成一壓縮訊號’該壓缩/解壓缩裝置在該第二通訊裝 置欲傳送到該第一通訊裝置的過程中,將該壓缩訊號解麈 縮成該數位訊號; 攪碼/解攪碼裝置,係用於在該訊息由該第一通訊裝 置傳送到該第二通訊裝置的過程中,將由中央處理單元所 傳送過來的該廑縮訊號的位元依照一預設順序調換,以形 成一攪碼訊號,該攪鴣/解攪碼裝置在該訊息由該第二通 訊裝置傳送到該第一通訊裝置的過程中,將該扰场訊號解 扰瑪,以產生該壓縮訊號; 加密/解密裝置’係用於在該訊息由該第一通訊裝置 傳送到該第二通訊裝置的過程中’將由該中央處理單元所 傳送過來的該攪碼訊號,以一密碼產生裝里所產生的密场 加密,而產生一加密訊號,然後該中央處理單元再將該加 密訊號傳送到該攪病/解扰碍裝置,以將該加密訊號中的 位元依照該預設順序調換而形成一經攪瑀加密訊號,該密 (请先S请背面之注f項存填寫本買) 1T· icr 17A8, B8, C8, ______ D8, printed by the Ministry of Economic Affairs and Consumer Cooperatives 6. When applying for a patent, prevent the message from being transmitted to the first communication device and the second communication device. The encrypted digital security device must be at least Including: "Analog / digital conversion device" is used to digitize the message during the process of transmitting the message from the first communication device to the second communication device to form a digital signal 'The analog / digital conversion device In the process that the second communication device wants to transmit to the first communication device, the digital signal is analogized to form the message in an analog format; the compression / decompression device is for During the process of the first communication device transmitting to the second communication device, the digital signal is compressed to form a compressed signal. The compression / decompression device is in the process of the second communication device transmitting to the first communication device. To decompress the compressed signal into the digital signal; the scramble / unscramble device is used for transmitting the message from the first communication device to the second communication device In the process, the bits of the crimping signal transmitted by the central processing unit are exchanged according to a preset order to form a scramble signal. The scramble / descramble device transmits the second communication device in the message. In the process of the first communication device, descramble the scrambled field signal to generate the compressed signal; the encryption / decryption device is used for transmitting the message from the first communication device to the second communication device. In the process, the scrambled signal transmitted by the central processing unit is encrypted with a password to generate the secret field generated in the package, and an encrypted signal is generated, and then the central processing unit transmits the encrypted signal to the scrambled signal. Disease / unscramble the device to exchange the bits in the encrypted signal according to the preset order to form a scrambled encrypted signal. (Please first save the note f on the back and fill in the purchase) 1T · icr 17 經濟部中央揉準局員工消费合作社印«. A8 B8 C8 D8 中請專利範圍 碑產生裝置係以一 RSA(Rivest ShamirAdle巾an)演算法 產生該密碼,該密瑪至少包含公開金鑰以及私人金鑰’在 該訊息由該第二通訊裝置傳送到該第一通訊裝置的過程 令’由該攪磚/解攪鴒裝置透過該令央處理裝置傳送到該 加密/解密裝置的該加密訊號’經過該加密/解密裝置以該 密蜗解密之後,產生該攪碼訊號,然後再將該攪碼訊號傳 送到該攪’/解撲场裝置進行解攪碘而獲得該壓縮訊號; 以及 調變/解調變裝置’係用於在該訊息由該第一通訊裝 置傳送到該第二通訊裝置的過程中,對由該中央處理單元 所傳送過來的該經攪瑪加密訊號調變(m〇du丨ate),以產生 第一調變訊號,使該第一調變訊號適合於在該媒介令傳 送,該調變訊號内至少包含有經過該私人金鑰加密的該訊 息’該調變/解調變裝置在該訊息由該第二通訊裝置傳送 到铉第一通訊裝置的過程中,處理來自該媒介的該調變訊 號而產生該經挽瑪加密訊號,並傳送到該加密/解密裝 置。 6. 如申請專利範圍第5項之裝置,其中上述之訊息可以為 下列其中之一:语音、視訊以及資料(data)。 7. 如申請專利範圍第5項之裝置,其中 述 之第一加密數 位保密裝置與該第二加密數位保密裝置直接電性麵合 時,係依據該RSA演算法將該第—加密數位保密裝置: 公開金鑰傳送到該第二加密數位保密裝置並館存之同時 1S 各紙張尺度速用中國國家揲準(CNS} A4規格(210x297公釐) --------II (请先閱請背面之注$項再填寫本霣) 订 經濟部中央標準局貝工消费合作社印裝 、申請專利範圍 將該第二加密數位保密裝置 密數位保密裝置並錄存之,該第傳送到該第-加 第二加密數位保密裝曼透過該媒密數位保密裝置與該 RSA演算法舆M —加密合時,係、依據该 共同產生之第二“而產生該第保:加裝密置數中=縮訊破 公開金墙,並傳送到該第二加密數:保密密=密裝里之 切聚位保密裝置而儲存之。 8下二:專利範"5項…,其中上述之媒介可以為 Z其中之―:”網路、電話辕1缆線以及無辕通訊 媒介β 9.一種加密(encryption)數位保密裝置,係用於提供第一 加密數位保密裝置電性輛合至第一通訊裝置,並提供第二 加密數位保密裝置電性耦合至第二通訊裝置,使該第一通 訊裝置欲經由一媒介(media)傳輪訊息至該第二通訊裝置 時,防止該訊息傳送到該第一通訊裝置以及該第二通訊裝 置以外,該加密數位保密裝置至少包含: 類比/數位轉換裝置’係用於在該訊息由該第一通訊 裝置傳送到該第二通訊裝置的過程中,將該訊息數位化, 以形成一數位訊號,該類比/數位轉換裝置在該第二通訊 裝置欲傳送到該第一通訊裝置的過程中,將該數位訊號類 比化,以形成一類比格式的該訊息; 壓縮/解壓缩裝置,係用於在該訊息由該第一通訊裝 置傳送到該第二通訊裝置的過程中,將該數位訊號壓缩, 19 本紙浪尺度逋用中國國家橾準(匸阳)八4規/格(210><297公釐) I------PI — - (请先《讀背面之注$項再4寫本貰) 订 C. 經濟部中央揉準局身工消費合作社印装 A8 B8 C8 _D8 _ 六、申請專利範圍 以形成一壓缩訊號,該麈缩/解壓缩裝置在該第二通訊裝 置欲傳送到該第一通訊裝置的過程中,將該壓缩訊號解魘 缩成該數位訊號; 攪碣/解攪碼裝置,係用於在該訊患由該第一通訊裝 置傳送到該第二通訊裝置的過程中,將由中央處理單元所 傳送過來的該壓缩訊號的位元依照一預設順序調換,以形 成一攪碼訊號,該攪碼/解攪玛裝置在該訊息由該第二通 訊裝置傳送到該第一通訊裝置的過程中,將該攪碼訊號解 攪碼,以產生該壓缩訊號; 加密/解密裝置,係用於在該訊息由該第一通訊裝置 傳送到該第二通訊裝置的過程中,將由該中央處理單元所 傳送過來的該攪碼訊號,以一密碼產生裝置所產生的密碼 加密,而產生一加密訊號,然後該中央處理單元再將該加 密訊號傳送到該攪碼/解攪碼裝置,以將該加密訊號中的 位元依照該預設順序調換而形成一經攪鴒加密訊號,該密 碼產生裝置係以一 RSA(Ri vest Shamir Ad lem an)演算法 產生該密瑪,該密瑪至少包含公開金鑰以及私人金錄,在 該訊息由該第二通訊裝置傳送到該第一通訊裝置的過程 中,由該攪碼/解攪碼裝置透過該中央處理裝置傳送到該 加密/解密裝置的該加密訊號,經過該加密/解密裝置以該 密瑪解密之後,產生該攪碼訊號,然後再將該攪碼訊號傳 送到該挽碼/解攪碼裝置進行解挽碼而獲得該壓缩訊號’ 在該第一加密數位保密裝置與該第二加密數位保密裝置 直接電性耦合時,係依據該RSA演算法將該第一加密數 20 本紙佚尺度逍用中國國家揲準(CNS )Α4^·( 210x297^) (請先《讀背面之注$項弄填窝本肓)Printed by the Consumer Affairs Cooperative of the Central Bureau of the Ministry of Economic Affairs of the People's Republic of China. A8 B8 C8 D8 The patent scope tablet generation device uses an RSA (Rivest ShamirAdle towel) algorithm to generate the password. The password contains at least a public key and a private key. The key 'in the process of transmitting the message from the second communication device to the first communication device' passes the encrypted signal transmitted by the churning / unscrambling device to the encryption / decryption device via the order processing device. After the encryption / decryption device decrypts with the dense worm, the scrambled signal is generated, and then the scrambled signal is transmitted to the scrambled / unlocked field device to descramble the iodine to obtain the compressed signal; and modulation / decryption; and The modulation device is used to modulate the encrypted signal sent by the central processing unit (m〇du 丨) during the process of transmitting the message from the first communication device to the second communication device. ate) to generate a first modulation signal, so that the first modulation signal is suitable for transmission on the media order, and the modulation signal contains at least the message encrypted by the private key 'the modulation / demodulation Means during the message transmitted by the second communication device to the first communication device Hyun, the processing of the modulated information from the media number is generated by the pull Maccabees density signal, and transmits to the encryption / decryption means. 6. For the device under the scope of patent application, the above information can be one of the following: voice, video, and data. 7. For the device in the scope of application for patent No. 5, in which the first encrypted digital security device and the second encrypted digital security device are directly electrically connected, the first encrypted digital security device is based on the RSA algorithm. : The public key is transmitted to the second encrypted digital security device and stored at the same time. At the same time, the 1S paper standards are quickly used by China National Standards (CNS) A4 (210x297 mm) -------- II (please first Please read the note $ on the back and fill in this. 霣) Order the second encrypted digital security device and record the digital security device and record the second digital encrypted security device. The first-plus second encrypted digital security device and the RSA algorithm M through the media-crypto digital security device are encrypted together, and the first security is generated according to the co-produced second ": installed additional number Medium = Small message breaks the golden wall and sends it to the second encryption number: Secret Secret = Cut the secret device in the cover and store it. 8 Bottom two: Patent Model " 5 items ... Among the above media Can be one of Z ":" Circuit, telephone cable, and wireless communication medium β 9. An encryption digital security device is used to provide the first encrypted digital security device to the first communication device and to provide the second encrypted digital The security device is electrically coupled to the second communication device, so that the first communication device prevents the message from being transmitted to the first communication device and the second communication when the first communication device intends to transmit a message to the second communication device via a media. In addition to the device, the encrypted digital security device includes at least: an analog / digital conversion device is used to digitize the message to form a digit when the message is transmitted from the first communication device to the second communication device. Signal, the analog / digital conversion device analogizes the digital signal in the process of the second communication device transmitting to the first communication device to form the message in an analog format; the compression / decompression device is used In the process of transmitting the message from the first communication device to the second communication device, the digital signal is compressed, and the paper is in use. National Standards (Liyang) Eighty-four Regulations / Grid (210 > < 297mm) I ------ PI —-(Please read the “$” on the back and then write the 4th script 贳) Order C. Economy Ministry of the People's Republic of China prints A8 B8 C8 _D8 _ for the consumer labor cooperative 6. The scope of the patent application to form a compressed signal, the shrinking / decompressing device is in the process of the second communication device to be transmitted to the first communication device In the process, the compressed signal is decompressed into the digital signal; the scramble / unscramble device is used to process the signal from the first communication device to the second communication device by a central processing unit. The bits of the transmitted compressed signal are exchanged according to a preset order to form a scrambled signal. The process of the scrambled / unscrambled device transmits the message from the second communication device to the first communication device. The descrambling signal is descrambled to generate the compressed signal. The encryption / decryption device is used by the central processing unit during the process of transmitting the message from the first communication device to the second communication device. The scrambled signal sent by The password generated by the password generating device is encrypted to generate an encrypted signal, and then the central processing unit transmits the encrypted signal to the scramble / de-scramble device, so that the bits in the encrypted signal follow the preset order The exchange generates a scrambled encrypted signal. The password generating device generates the secret key by using an RSA (Ri vest Shamir Ad lem an) algorithm. The secret key includes at least a public key and a private gold record. In the process of transmitting from the second communication device to the first communication device, the encrypted signal transmitted from the scramble / de-scramble device to the encryption / decryption device through the central processing device passes the encryption / decryption device to the encryption device. After decryption, the scrambled signal is generated, and then the scrambled signal is transmitted to the pull / unscramble device for unrolling to obtain the compressed signal. In the first encrypted digital security device and the second encrypted When the digital security device is directly electrically coupled, the first encrypted number of 20 papers will be used in accordance with the RSA algorithm. Chinese National Standards (CNS) A4 ^ ((210x297 ^) (please first Note the back of the item get $ fossa fill this blind) A8 B8 C8 D8 六、申請專利範圍 位保密裝置之公開金鑰傳送到該第二加密數位保密裝夏 並館存之’同時將該第二加密數位保密裝置之公開金論傳 送到該第一加密數位保密裝置並儲存之,玆第一加密數俊 保密裝置舆铉第二加密數位保密裝置透過該媒介電性相 合時’係依據該RSA演算法與該第一加密數位保密发夏 中的該壓缩訊號共同產生之第二密碼而產生該第—加密 數位保密裝置之公開金鑰,並傳送到該第二加密數位保密 裝置而傩存之;以及 調變/解調變裝置,係用於在該訊息由該第一通訊裝 置傳送到該第二通訊裝置的過程中,對由該中央處理單元 所傳送過來的該經撲场加密訊號調變(m〇dU|ate),以產生 第一調變訊號,使該第一調變訊號適合於在該媒介中傳 送’該調變訊號内至少包含有經過該私人金鑰加密的該訊 息,該調變/解調變裝置在該訊息由該第二通訊裝置傳送 到該第一通訊裝置的過程中,處理來自該媒介的該調變訊 號而產生該經挽场加密訊號,並傳送到該加密/解密裝 置。 10.如申請專利範圍第9項之裝置’其中上述之訊息可以 為下列其中之一:語音、視訊以及資料(data)。 中上述之媒介可以 電观線以及無.線通 11.如申請專利範圍第9項之裝置,其 為下列其中之一:網際網路、電話線、 訊媒介。A8 B8 C8 D8 VI. The public key of the patent-protected bit-secret device is transmitted to the second encrypted digital security device, which is stored in the Xia Ping Pavilion. At the same time, the public encryption of the second encrypted digital security device is transmitted to the first encryption device. The digital encryption device is stored and stored here. The first encrypted digital security device and the second encrypted digital security device are electrically connected through the medium. The compression is based on the RSA algorithm and the first encrypted digital security. The second key generated by the signals together generates the public key of the first encrypted digital security device, and transmits it to the second encrypted digital security device to store it; and a modulation / demodulation device, which is used in the In the process of transmitting the message from the first communication device to the second communication device, the encrypted encrypted signal transmitted by the central processing unit is modulated (m0dU | ate) to generate a first modulation. Signal to make the first modulation signal suitable for transmission in the medium 'the modulation signal contains at least the message encrypted by the private key, and the modulation / demodulation device is in the message The second communication device transmits the first communication device to the process, the inquiry process the modulation from the number of the media generated by the field-pull signal encrypted, and transmitted to the encryption / decryption means. 10. The device according to item 9 of the scope of patent application, wherein the above-mentioned information may be one of the following: voice, video, and data. The media mentioned above can be viewed through the line and not connected. 11. If the device in the scope of patent application is No. 9, it is one of the following: Internet, telephone line, and media. 本紙張尺度逋用中鬮國家#準(CNS ) A4規格(210X297公釐) A8 B8 C8 08 ___一 夂、申請專利範圍 ‘一種加密(encryption)數位保密裝里,係用於提供第一 加密數位保密裝置電性耦合至第一通訊裝置,並提供第二 加密數位保密裝置電性耦合至第二通訊裝置,使该第一通 訊裝置欲經由一媒介(media)傳輸訊患至該第二通訊裝里 時,防止該訊息傳送到該第一通訊裝里以及該第二通訊裝 置以外,該加密數位保密裝置至少包含: 類比/數位轉換裝置,係用於在該訊息由該第一通訊 裝置傳送到該第二通訊裝置的過程中,將該訊息數位化, 以形成一數位訊號,該類比/數位轉換裝置在該笫二通訊 裝置欲傳送到該第一通訊裝置的過程中,將該數位訊號類 比化,以形成一類比格式的該訊息; 經濟部中央橾準局貝工消费合作社印策 (请先S讀背由之注f項再填寫本貰) 加密/解密裝置,係用於在該訊息由該第一通訊裝置 傳送到該第二通訊裝里的過程中,將由中央處理單元所傳 送過來的數位訊號,以一密碼產生裝置所產生的密碼加 密,而產生一加密訊號,該密碼產生裝置係以一 RSA(Rivest Shamir Adleman)演算法產生該密碼,該密 碼至少包含公開金鑰以及私人金鑰,在該訊息由該第二通 訊裝置傳送到該第一通訊裝置的過程中,該加密訊號經過 該加密/解密裝置以將該密碼解密之後,產生該數也訊 號,在該第一加密數位保密裝置舆該第二加密數位保密裝 置直接電性耦合時,係依據該RSA演算法將該第—& $ 數位保密裝置之公開金鑰傳送到該第二加密數位保密I 置並储存之,同時將該第二加密數位保密裝置之公開金# 傳送到該第一加密數位保密裝置並储存之,該第~加密數 22 本纸浪尺度逍用中國國家輮準(CNS ) A4洗格(2ί0><297公鼇) 經濟部中央標率扃Λ工消费合作社印装 A8 B8 C8 08 六、申請專利範圍 位保密裝置舆該第二加密數位保密裝置透過該媒介電性 叙合時’係依據該RS A演算法舆該第一加密數位保密襄 置中的該數位訊號共同產生之第二密碼而產生該第一加 密數位保密裝置之公開金鑰,並傳送到該第二加密數位保 密裝里而儲存之;以及 調變/解調變裝置,係用於在該訊息由該第一通訊聚 里傳送到該第二通訊裝置的過程中,對由該中央處理單元 所傳送過來的該加密訊號調變(modu iate),以產生調變訊 號’使該綢變訊號適合於在該媒介中傳送,該調變訊號内 至少包含有經過該私人金錄加密的該訊息,該調變/解辨 變裝置在該訊息由該第二通訊裝置傳送到該第一通訊袭 置的過程中,處理來自該媒介的該調變訊號而產生該加密 訊號’並傳送到該加密/解密裝置。 13. 如申請專利範圍第12項之裝置,其中上述之加密數 位保密裝置更包含: 壓縮/解壓缩裝置,係用於在該訊息由該第一通訊裝 置傳送到該第二通訊裝置的過程中,將該數位訊號壓縮, 以形成一壓缩訊號,該壓缩訊號傳送到該加密/解密裝董 加密後,即形成該加密訊號,該壓縮/解壓缩裝置在該第 二通訊裝置欲傳送該訊息到該第一通訊裝置的過程中,將 該壓缩訊號解壓缩成該數位訊號。 14. 如申請專利範圍第12項之裝置,其中上述之加密數 本纸張尺度逋用中國两家棵率(cns )Α4規格(2ΐ〇χ297公羞) ί琦先S積背面之注$項再填寫本!> 訂 —tr A8 B8 C8 D8 、申請專利範圍 位保密裝置更包含: 攪碼/解攪碼裝置,係用於在該訊息由該苐一通訊裝 置傳送到該第二通訊裝置的過程中,將由該中央處理單元 所傳送過來的該數位訊號的位元依照一預設順序調換,以 形成一攪磾訊號,然後該攪碘訊號經由該中央處理裝置傳 送到該機/解密裝置,以對該攪碼訊猇依據該密碼進行加 密而形成該加密訊號,然後該加密訊號被傳送到該攪碼/ 解攪碼裝置進行攪碼,以將該加密訊號中的位元位羹依照 該預設位置調換,而形成一經攪碼加密訊號,並且该經攪 碼加密訊號由該裝央處理單元傳送到該調變/解調變裝 置,以產生該調變訊號,該挽场,解槌喝裝置在該訊息由 該第二通訊裝置傳送到該第一通訊裝置的過程中,將由該 調變/解調變裝置產生的該加密訊號先傳送到該攪碣/解 挽场裝置進行解挽碑’以對該加密訊婕中的位元依照该預 設項序調整其位置,而產生一經解撩碍加密訊號,然後此 經解攪场加密訊號經由中央處理單元傳送到加密/解密裝 置以該密碑進行解密’以獲得一經解密訊號,接著將該經 解密訊號傳送至該攪碟/解挽瑪裝置遨行解授碑,以將该 解密訊號的位元依照該預設順序納驽其位置而產生該數 位訊號。 (誇先«讀背面之注$項鼻填寫本荑) ο· 經濟部中央橾準局真工消费合作社印裝 15.如申請專利範®第12項之裝置’其中上述之訊息可 以為下列其中之一:語音、視訊以及資料(data)。 24 本紙張尺度逋用中國國家«率(CNS)A4规格(210X297公釐) 經濟部中夬操準局負工消費合作社印装 A8 B8 C8 —_ D8 六、申請專利範園 16.如申請專利範团第12項之裝置,其中上述之媒介可 以為下列其中之一:網際绸路、電話線、電纜線以及無線 通訊媒介。 17· 一種防竊聽方法,係用於防止包含於發射端所發出的 通訊訊號中之訊息被接收端以外的接收者所解出,該通訊 钒號由該發射端發出後,經過一媒介(media)而到達該接 收端,該防竊聽方法至少包含下列步驟: 將該訊息數位化,以產生數位訊號; 將該數位訊號以一密碼加密,以獲得一加密訊號, 該密項係由一 RSA(Rivest Shamir Adieman)演算法產生 該密碼,該密碼至少包含公開金鑰以及私人金鑰,在該發 射端直接耦合至該接收端時,係將該發射端之公開金鑰傳 送到該接收端並储存之,同時該接收端的公開金鑰傳送到 该發射端並儲存之,在該發射端與該接收端透過該媒介電 性耦合時,係依據該RSA演算法與該發射端中的該數位 訊號共同產生之第二密碼而產生該發射端之公開金鑰,並 傳送到該接收端而儲存之;以及 將該加密訊號調變成適合於傳輸於該媒介中之該 通訊訊號。 18.如申請專利範团第17項之方法,其中上述之防竊聽 方法更包含下列步驟: 本纸張尺度逋用中國國家梯率(CNS ) A4規格(210X297公釐) t \si ------1T---.—Ίοτ -. * (请先Μ讀背面之注$項昇填寫本霣) '申請專利範囷 將該數位訊號廑缩後產生一廑缩訊號’並將該磨缩 訊辣以該密瑪加密,以產生該加密訊號β 19. 如申請專利範圍第17項之方法,其中上述之防竊聽 方法更包含下列步驊: 將該數位訊號攪碼,以依據一預設順序調換該數位 訊敢之位元頌序而產生一授场訊號; 將該攪碼訊號依據該密碼加密而產生依第二加密 訊號;以及 將該第二加密訊號攪碼,以依據該預設順序調換第 二加密訊號之位元順序而產生該加密訊號;以及 對該加密訊號調變使適合於該媒介中傳輸而形成 該通訊訊號。 20. 如申諳專利範面第17項之方法,其中上述之訊息可 以為下列其中之一:語音、視訊以及資料(data)。 21. 如申請專利範圍第17項之方法,其中上述之媒介可 以為下列其中之一:網際網路、電話線 '電規線以及無線 通訊媒介。 經濟部中央橾準扃貝工消费合作社印裝 (請先W讀背面之注$項再4寫本頁) 22. —種防竊聽方法,係用於防止發射端所發出的通訊訊 號所包含之訊息被接收端以外的接收者所解出,該通訊訊 號由該發射端發出後’經過一媒介(media)而到達該接收 26 本紙張尺度速用中困國家標率) Μ洗格(210X297公釐) A8 B8 C8 D8 389016 六、申請專利範圍 端’该防竊聽方法至少包含下列步驟: 將該訊息數位化,以產生數位訊號; 將該數位訊號魘缩後產生一壓縮訊號; 將該數位訊號挽碼’以依據一預設顺序調換該數位 訊珑之位元順序而產生一攪碘訊號; 將該授场訊號以一密爲加密而產生一加密訊號,該 密考係由一 RSA(Rivest Shamir Adleman)演算法羞生, 該密瑪至少包含公開金鑰以及私人金鑰,在該發射端直接 轉合至該接收蛾時,係將該發射端之公開金錄傳送到該接 收端並儲存之,同時該接收端的公開金鑰傳送到該發射端 並儲存之,在該發射端舆該接收端透過該媒介電性編合 時’係依據該RSA演算法舆該發射端中的該數位訊號共 同產生之第二密碼而產生該發射端之公開金鑰,並傳送到 該接收端而鍺存之; 將該加密訊號攪碼’以依據該預設順序調換加密訊 號之位元順序而產生經攪碼加密訊號;以及 對該經攪碼加密訊號調變,使其適合於該媒介令傳 輸而形成該通訊訊號。 23. 如申請專利範圍第20項之方法,其中上述之訊息可 以為下列其中之一:語音、視訊以及資料(data)。 24. 如申請專利範圜第20項之方法,其中上述之媒介可 以為下列其中之一:網際網路、電話線、電纜線以及無線 本紙張尺度逋用中國國家糅準(CNS ) A4规格(210X297公釐) (請先閨讀背面之注f項再填寫本頁) .訂 0 nn 1· » 經濟部中央標準局貝工消费合作社印裝 A8 B8 pg _〇f___ 六、申請專利範圍 通訊媒介。 22.—種防竊聽方法,係用於在第一端舆第二端透過一媒 介(media)傳輸訊惠時,防止該第一端與該第二端中間所 傳輪的包含該訊息之通訊訊猇被該第一端以及該第二端 以外的接收者所解出,該防竊聽方法至少包含下列步驊: 在由該第一端傳輸該通訊訊號到該第二端時: 將該訊息數位化,以產生數位訊號; 將該數位訊號壓缩後產生一壓縮訊號; 將該數位訊號攪碼,以依據一預設頬序調換該數位 訊號之位元順序而產生一攪碼訊號; 將該授瑪訊號以一密瑪加密而產生一加密訊號,該 密項係由一 RSA(Rivest Shamir Adieman)演算法產生, 該密碼至少包含公開金鑰以及私人金鑰,在該發射端直接 耦合至該接收端時,係將該發射端之公開金鑰傳送到該接 收端並儲存之,同時該接收端的公開金鑰傳送到該發射端 並儲存之,在該發射端舆該接收端透過該媒介電性相合 時,係依據該RSA演算法與該發射端中的該數位訊號共 同產生之第二密碼而產生該發射端之公開金鑰,並傳送到 該接收端而儲存之; 經濟部中央椹準局貝工消费合作社印装 {請先s讀背面之注$項再填寫本頁) 將該加密訊號攪碼,以依據該預設順序調換加密訊 號之位元順序而產生經攪碼加密訊號; 對該經攪碼加密訊號調變,使其適合於該媒介中傳 輸而形成該通訊訊號,並將該通訊訊號由該第_端傳送到 ( CNS ) A4^ ( 210X297^* ) ' '— I A8 389016 cl 六、申請專利範圍 該第二端, (請先聞讀背面之注^^項再埃寫本頁) 在由該第二端傳輪該通訊訊號到該第一端時: 將該通訊訊號解調變成適合於該第一端中處理的 形式,以形成該經攪碼加密訊號; 將該經攪碼加密訊號解攪碼,使該經攪碼加密訊號 中的位元位置依據該預設位置而調換,以形成該加密訊 號; 將該加密訊號依據該密碼解密,以形成該攪碼訊 WL, 將該攪碼訊號解攪碼以依據該預設順序對該攪瑪 訊號調換其位元位置而形成該壓縮訊號; 將該壓缩訊號解壓縮,以形成該數位訊號;以及 將該數位訊號轉換成為類比形式,以得到該訊息内 容。 23. 如申請專利範圍第22項之方法,其中上述之訊息可 以為下列其中之一:語音、視訊以及資料(data)。 24. 如申請專利範圍第22項之方法,其中上述之媒介可 以為下列其中之一:網際網路、電話線、電纜線以及無線 通訊媒介。 經濟部中央#準局貞工消费合作社印裝 本紙張尺度逋用中國國家搮準(CNS ) A4規格(210X297公釐)This paper standard uses China National Standard #CNS (A4) (210X297 mm) A8 B8 C8 08 ___One, application for patent scope 'A kind of encryption (encryption) digital security package, used to provide the first encryption The digital security device is electrically coupled to the first communication device, and a second encrypted digital security device is provided to be electrically coupled to the second communication device, so that the first communication device intends to transmit information to the second communication via a medium. During the installation, to prevent the message from being transmitted to the first communication device and outside the second communication device, the encrypted digital security device includes at least: an analog / digital conversion device for transmitting the message by the first communication device. In the process of the second communication device, the information is digitized to form a digital signal, and the analog / digital conversion device, during the process of the second communication device transmitting to the first communication device, digitizes the digital signal Analogize to form the message in an analog format; the policy of the Shellfish Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs (please read the note f of the back note before filling in this card) Encryption The decryption device is used to encrypt the digital signal transmitted by the central processing unit with a password generated by a password generating device during the process of transmitting the message from the first communication device to the second communication device. An encrypted signal is generated. The password generating device generates the password using an RSA (Rivest Shamir Adleman) algorithm. The password includes at least a public key and a private key. The message is transmitted from the second communication device to the first communication device. In the process of a communication device, after the encrypted signal passes through the encryption / decryption device to decrypt the password, the digital signal is generated. When the first encrypted digital security device is directly electrically coupled with the second encrypted digital security device According to the RSA algorithm, the public key of the first encrypted digital security device is transmitted to the second encrypted digital security device and stored, and the open gold of the second encrypted digital security device is transmitted to The first encrypted digital security device is stored and stored. The first to encrypted number 22 paper waves are used in China National Standards (CNS) A4 wash grid (2ί0 > < (297 Gongao) Printed by A8 B8 C8 08 of the Central Standards of the Ministry of Economic Affairs of the Consumer Cooperatives 6. The scope of the patent application for the security device is that the second encrypted digital security device is electrically classified through the medium according to the RS A The algorithm generates a public key of the first encrypted digital security device using a second password generated by the digital signal in the first encrypted digital security device and transmits it to the second encrypted digital security device for storage. And a modulation / demodulation device for modulating the encrypted signal transmitted by the central processing unit during the process of transmitting the message from the first communication cluster to the second communication device ( modu iate) to generate a modulation signal 'to make the silken signal suitable for transmission in the medium, the modulation signal contains at least the message encrypted by the private gold record, and the modulation / decoding device is in The message is transmitted from the second communication device to the first communication device. The encrypted signal is generated by processing the modulation signal from the medium and transmitted to the encryption / decryption device. 13. The device of claim 12 in which the above-mentioned encrypted digital security device further includes: a compression / decompression device, which is used in the process of transmitting the message from the first communication device to the second communication device. The digital signal is compressed to form a compressed signal. The compressed signal is transmitted to the encryption / decryption device and encrypted to form the encrypted signal. The compression / decompression device sends the message to the second communication device to In the process of the first communication device, the compressed signal is decompressed into the digital signal. 14. For the device with the scope of patent application No. 12, in which the above-mentioned encrypted paper size is based on the two Chinese tree rate (cns) A4 specifications (2ΐ〇χ297 公)), and the $ item on the back of S product Fill in this again! ≫ Order—tr A8 B8 C8 D8, patent application range security device further includes: code scramble / de-scramble device, used to transmit the message from the first communication device to the second communication device In the process, the bits of the digital signal transmitted by the central processing unit are exchanged according to a preset order to form a churning signal, and then the iodine churning signal is transmitted to the machine / decryption device through the central processing device. To encrypt the scrambled signal according to the password to form the encrypted signal, and then the encrypted signal is transmitted to the scrambled / unscrambled device for scrambling, so that the bits in the encrypted signal are in accordance with The preset position is exchanged to form a scrambled encrypted signal, and the scrambled encrypted signal is transmitted from the central processing unit to the modulation / demodulation device to generate the modulation signal, the field, and the solution. Mallet drink In the process of the message being transmitted from the second communication device to the first communication device, the encrypted signal generated by the modulation / demodulation device is first transmitted to the stir / unlock field device for unlocking the monument ' The bits in the encrypted message are adjusted in accordance with the preset order to generate an unblocked encrypted signal. Then the unencrypted encrypted signal is transmitted to the encryption / decryption device via the central processing unit to encrypt the encrypted signal. The tablet is decrypted 'to obtain a decrypted signal, and then the decrypted signal is sent to the disc-cranking / unlocking device to decipher the tablet, so that the bits of the decrypted signal are stored in their positions in the preset order. Generate the digital signal. (Preface «read the note on the back of the item and fill in this note) ο · Printed by the Real Consumer Cooperatives of the Central Bureau of Quasi-Ministry of Economic Affairs 15. If you apply for a patent application ® Item 12 of the device, where the above information can be the following one One: voice, video, and data. 24 This paper size uses China's national «rate (CNS) A4 size (210X297 mm) printed by the Consumer Goods Cooperatives of the China National Standards and Quarantine Bureau of the Ministry of Economic Affairs A8 B8 C8 —_ D8 VI. Patent Application Park 16. If applying for a patent The device of the fan group item 12, wherein the above medium can be one of the following: internet silk, telephone line, cable line and wireless communication medium. 17. · An anti-eavesdropping method is used to prevent the information contained in the communication signal sent by the transmitting end from being interpreted by receivers other than the receiving end. After the communication vanadium number is sent by the transmitting end, it passes through a media (media ) To reach the receiving end, the anti-eavesdropping method includes at least the following steps: digitizing the message to generate a digital signal; encrypting the digital signal with a password to obtain an encrypted signal, the secret item is an RSA ( (Rivest Shamir Adieman) algorithm generates the password. The password contains at least a public key and a private key. When the transmitting end is directly coupled to the receiving end, the public key of the transmitting end is transmitted to the receiving end and stored. At the same time, the public key of the receiving end is transmitted to the transmitting end and stored. When the transmitting end and the receiving end are electrically coupled through the medium, it is based on the RSA algorithm and the digital signal in the transmitting end. The generated second password generates the public key of the transmitting end and transmits it to the receiving end to store it; and the encrypted signal is adjusted to be suitable for transmission in the The communication signal in the media. 18. The method according to item 17 of the patent application group, wherein the above-mentioned anti-eavesdropping method further includes the following steps: This paper size uses the Chinese National Slope (CNS) A4 specification (210X297 mm) t \ si --- --- 1T ---.— Ίοτ-. * (Please read the note on the reverse side and fill in this text first) 'Apply for a patent application to shrink the digital signal to generate a shrinking signal' and grind the The message is encrypted with the Mima to generate the encrypted signal β 19. For the method of claim 17 in the scope of patent application, the above-mentioned anti-eavesdropping method further includes the following steps: Code the digital signal according to a pre- It is assumed that the digital signal daring order is exchanged sequentially to generate an award signal; the scrambled signal is encrypted based on the password to generate a second encrypted signal; and the second encrypted signal is scrambled to comply with the pre- It is assumed that the bit sequence of the second encrypted signal is reversed to generate the encrypted signal; and the encrypted signal is adjusted to be suitable for transmission in the medium to form the communication signal. 20. For the method of claim 17 of the patent paradigm, the above information can be one of the following: voice, video, and data. 21. For the method of applying for item 17 of the patent scope, the above medium may be one of the following: the Internet, telephone lines, electrical wires, and wireless communication media. Printed by the Central Ministry of Economic Affairs and the Zhuhai Gongcong Consumer Cooperative (please read the note on the back and then write this page) 22.-An anti-eavesdropping method used to prevent the communication signals sent by the transmitter from containing The message was deciphered by a receiver other than the receiving end, and the communication signal was sent by the transmitting end and 'received through a medium to reach the receiving 26 paper-scale quick-to-use national standard rate] M Washer (210X297) (%) A8 B8 C8 D8 389016 6. The scope of the patent application 'The anti-eavesdropping method includes at least the following steps: digitizing the message to generate a digital signal; shrinking the digital signal to generate a compressed signal; and converting the digital signal The “pin code” is to generate an iodine signal by exchanging the bit sequence of the digital signal according to a preset sequence; the encrypted field signal is encrypted with a secret code to generate an encrypted signal. The secret test is performed by an RSA (Rivest Shamir Adleman) algorithm, the mima contains at least a public key and a private key. When the transmitting end is directly transferred to the receiving moth, the public gold record of the transmitting end is transmitted to the receiving And store it, and at the same time, the public key of the receiving end is transmitted to the transmitting end and stored, and when the transmitting end is electrically assembled by the receiving end through the medium, it is based on the RSA algorithm and the The second key generated by the digital signal together generates the public key of the transmitting end and transmits it to the receiving end and stores it; the code is scrambled to change the bit order of the encrypted signal according to the preset order. Generating a scrambled encrypted signal; and modulating the scrambled encrypted signal to make it suitable for transmission by the medium to form the communication signal. 23. For the method of applying for the scope of patent application No. 20, the above information may be one of the following: voice, video, and data. 24. For the method of applying for patent No. 20, the above medium can be one of the following: Internet, telephone line, cable, and wireless paper standard, using China National Standard (CNS) A4 specification ( 210X297 mm) (please read the note f on the back before you fill out this page). Order 0 nn 1 · »Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A8 B8 pg _〇f ___ VI. Patent Application Communication Media . 22. An anti-eavesdropping method, which is used to prevent communication including the message transmitted between the first end and the second end when the first end and the second end transmit information via a medium. The message is deciphered by the first end and receivers other than the second end. The anti-eavesdropping method includes at least the following steps: When the communication signal is transmitted from the first end to the second end: the message Digitize to generate a digital signal; compress the digital signal to generate a compressed signal; scramble the digital signal to generate a scrambled signal by transposing the bit order of the digital signal according to a preset sequence; The sema signal is encrypted with a dense key to generate an encrypted signal. The key is generated by an RSA (Rivest Shamir Adieman) algorithm. The key contains at least a public key and a private key, and is directly coupled to the transmitter at the transmitting end. At the receiving end, the public key of the transmitting end is transmitted to the receiving end and stored, and the public key of the receiving end is transmitted to the transmitting end and stored. At the transmitting end, the receiving end communicates with the receiving end through the medium. Sex At the time of coincidence, the public key of the transmitting end is generated according to a second password generated by the RSA algorithm and the digital signal in the transmitting end, and transmitted to the receiving end for storage; the Central Bureau of Standards, Ministry of Economic Affairs Printed by Bei Gong Consumer Cooperative (please read the note $ on the back before filling this page), scramble the encrypted signal to exchange the bit order of the encrypted signal according to the preset order to generate the scrambled encrypted signal; The scrambled encrypted signal is modulated to make it suitable for transmission in the medium to form the communication signal, and the communication signal is transmitted from the first terminal to (CNS) A4 ^ (210X297 ^ *) '' — I A8 389016 cl 6. The second end of the scope of patent application, (please read the note ^^ on the back before writing this page) When the second end passes the communication signal to the first end: the communication The signal demodulation becomes a form suitable for processing in the first end to form the scrambled encrypted signal; descrambling the scrambled encrypted signal, so that the bit position in the scrambled encrypted signal is based on the preamble Set the position and swap to form the encrypted signal Decrypt the encrypted signal according to the password to form the scrambled signal WL, descramble the scrambled signal to exchange the bit position of the churned signal according to the preset sequence to form the compressed signal; and compress the compressed signal; The signal is decompressed to form the digital signal; and the digital signal is converted into an analog form to obtain the content of the message. 23. For the method of applying for the scope of patent application No. 22, the above information may be one of the following: voice, video, and data. 24. In the method of applying for the scope of patent application No. 22, the above-mentioned medium may be one of the following: the Internet, telephone lines, cables, and wireless communication media. Printed by the Central Ministry of Economic Affairs # Associate Bureau Zhengong Consumer Cooperative Co., Ltd. This paper size is in accordance with China National Standard (CNS) A4 (210X297 mm)
TW87117561A 1998-10-23 1998-10-23 Encryption device for communication system and method thereof TW389016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW87117561A TW389016B (en) 1998-10-23 1998-10-23 Encryption device for communication system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW87117561A TW389016B (en) 1998-10-23 1998-10-23 Encryption device for communication system and method thereof

Publications (1)

Publication Number Publication Date
TW389016B true TW389016B (en) 2000-05-01

Family

ID=21631745

Family Applications (1)

Application Number Title Priority Date Filing Date
TW87117561A TW389016B (en) 1998-10-23 1998-10-23 Encryption device for communication system and method thereof

Country Status (1)

Country Link
TW (1) TW389016B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8630414B2 (en) 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8630414B2 (en) 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system

Similar Documents

Publication Publication Date Title
US6266418B1 (en) Encryption and authentication methods and apparatus for securing telephone communications
KR100563108B1 (en) Ic card and cryptographic communication method between ic cards
KR20010107519A (en) System, device and method for secure communication and access control
JPH07298065A (en) Communication equipment
JPH03214834A (en) Multi-medium network system
US20030217263A1 (en) System and method for secure real-time digital transmission
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
US8290160B1 (en) Method and apparatus for secured facsimile transmission
JPH10242956A (en) Privacy telephone set
JPH09147072A (en) Personal authentication system, personal authentication card and center equipment
TW389016B (en) Encryption device for communication system and method thereof
AU753951B2 (en) Voice and data encryption method using a cryptographic key split combiner
JPH0918601A (en) Communication method
CN215186781U (en) Quantum computing resistant mobile communication system based on quantum secret communication network
CN210693957U (en) Quantum encryption device of PSTN telephone
EA016739B1 (en) Method and apparatus for secured facsimile transmission
GB2241414A (en) Apparatus and method for data communication.
JPH06152587A (en) Method and device for digital communication
JPH07303104A (en) Storage type communication system with ciphering function
WO2010069102A1 (en) Moblie terminal, cipher key transmission method, decrypt method and secrecy communication realizing method
CN113132090A (en) System for sharing quantum key and secret communication method based on system
CN111641646A (en) Safety enhancement type communication positioning terminal
JPH05304614A (en) Picture information ciphering method
HU226781B1 (en) Device set for secure direct information transmission over internet
JPH02195377A (en) Ic card provided with key sharing function

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees