GB2262418A - Data transmission - Google Patents

Data transmission Download PDF

Info

Publication number
GB2262418A
GB2262418A GB9122056A GB9122056A GB2262418A GB 2262418 A GB2262418 A GB 2262418A GB 9122056 A GB9122056 A GB 9122056A GB 9122056 A GB9122056 A GB 9122056A GB 2262418 A GB2262418 A GB 2262418A
Authority
GB
United Kingdom
Prior art keywords
data
transmission protocol
facsimile
receiving
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9122056A
Other versions
GB9122056D0 (en
Inventor
Jennifer Mallows
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB9122056A priority Critical patent/GB2262418A/en
Publication of GB9122056D0 publication Critical patent/GB9122056D0/en
Publication of GB2262418A publication Critical patent/GB2262418A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

A secure facsimile transmission system separates the transmission protocol (3) from data to be transmitted, encrypts the data only by a key code algorithm (5) known only to the sender and authorised receiver and transmits the encrypted transmission protocol together with the encrypted data (6). Thus, the data is received intelligibly by only an authorised receiver, whilst an unauthorised one receives unintelligible data, but of a length and number of sheets in accordance with the information sent. Thus an 'innocent' wrong recipient does not have the expense and inconvenience of a large number of sheets being outputted, as might happen if the transmission protocol were encrypted also. <IMAGE>

Description

DATA TRANSMISSION This invention relates to data transmission and in particular it relates to the transmission of data by means facsimile machines (telecopiers).
Facsimile machines are now commonly used to transmit data in the form of written data or pictures across telephone lines. A facsimile provides a efficient and usually error free method of transmitting this data and has the advantage over, for instance, telex that pictoral data an he transmitted almost instantly between any two parts of the world.
Any facsimile machine can communicate with any other facsimile machine in the worold, provided the two are both connected to the telephone network.
This can create a problem if a first facsimile machine inadvertently contacts a wrong machine ie not the one the sender wished to transmit data to. At the present time, if a wrong recipient were selected, that recipient would receive the message to be transmitted. This canm create embarrasement if that message is not intended to be viewed by that recipient and can also create severe security problems.
According to the present invention there is provided apparatus for secure transmission of facsimile messages, comprising means, for encrypting data, to be transmitted by facsimile, before transmission and means for decrypting the received data at a remote facsimile machine In tis way, if a message is inadvertently directed to a wrong machine, that machine will not include thje appropiate decryption and the message will not be decrypted. Garbage will result.
Preferably, the encrypting apparatus comprises means to separate transmission protocol information from the data, means for encrypting the data only, and means for transmitting the transmission protocol together with the encrypted data. The receiving apparatus may include means for noting and responding to the transmission protocol and means for decrypting only the data portion of the message.
The transmission protocol is preferably transmitted unchanged, in its correct temporal phase with respect to the information to be transmitted.
If the transmission protocol is not separated from the data before encryption, then a receiving facsimile machine, which is not intended to receive the message, will have no idea about the relevant transmissio^. protocol. Thus, it will not be able to set up line feeds, page feeds and so on ani may, in attempting to output the message to its paper roll, feed out many sheets of paper, all of which contain meaningless garbage. This can be very wasteful of paper and unfair to the wrongful recipient who may, through no fault of his, be receiving the unauthorised message, albeit in an unreadable form.Separating of the transmission protocol from the data, and transmitting the transmission protocol in an unmodified form, enables any receiving machine to at least set up its transmissions in accordance with the protocol. Thus, although it would not be able to decrypt the data, which would still be meaningless garbage, the line feed and page feeds, etc would still remain. If one page of information were transmitted, then only one page would be printed out by an unauthorised receiving machine, that page having the correct line feeds but having data which was meaningless and Essentially, the key code is applied to the encrypted part of the message in a particular manner. The key code is, of course, required to be known by both the sender and receiver.
Embodiments of the present invention will be described, b way of example only, with reference to the accompanying drawings, in which: Figure 1 shows, schematically, a line of data transmitted by a facsimile machine; Figure 2 shows the signal of Figure 1 when modified by an apparatus; and Figure 3 shows an decryption apparatus.
Facsimile comunication is determined by means of a method of coding known as the Huffman code. This determines the manner in which signals are transmitted along telephone lines between two machines. An important element of the transmission is the transmission protocol whcih, firstly, defines the hand shaking protocol which enable each machine to tell what type the other machine is and enables each machine appropiate. Secondly, the transmission protocol includes data such as page feeds, lines feeds, and so on which instruct the scanners and paper feeding mechanisms of the receiving machine when to move onto a new line and/or page.Other integers are resent in the transmission protocol as will be known to those skilled in the art. Figure 1 shows shcematically the information included in one line of transmission. As shown, at the beginning of the line is relevant transmission protocol T which induces, a+ least, a line feed and may also include page feeds cc. Following this, the data is transmitted. The data is shown in simple digital form in this example, but in practice systems such a frequency shift keying frequency or amplitude modulation are used.The digital data is used to modulate a carrier a frequency in knows manner. The data is shown schematically in the figure by D.
Figure 2 shows the line, in its digital form, before modulating a carrier frequency, when modified by the present invention. It is seen that the transmission protocol T remains unchanged and that the same relative point of the cycie or line, but that the transmission data DT representing image itself, is changed.
Figure 3 shows one apparatus for a achieving the encryption. An image, which is shown as lines of script on a sheet of paper is scanned in conventional fashion by a digital scanner 2. The scanning may be done in real time, or lIne by line or page by page, or example, as desired. Th digitised information from the scanner is fed to a transmission protocol separator 3 which is arranged to separate out all the transmisson protocol data. This may be done using timing methods, delays, etc. The separated trarim ssion protocol data may then be stored or fed to a suitable delay means 4 whilst the data which remains is applied to a encrytion apparatus 5. There, it is suitably encrypted before being transmitted. Prior to transmission the transmission protocol is reapplied, in its correct position, by means of the delay function or timers on the store, for example, and the message is then transmitted over telephone lines 6 to a receiving machine.
At the receiving machine, which is provided with a decryption apparatus having the same code as the encryption apparatus, the transmission protocol data is first separated, the encrypted data is then decrypted, and the separated transmission protocol used to set up the receiving machines transmission protocol, from which the message can be received correctly and printed by the receiving machine.
If, by an error or by calculation, the message is received by an unauthorised machine, then this machine will still recognise the transmission protocol but will be able to make no sense oQ the data itself. Thus, if one page of data is transmitted then one page will be printed by the receiving machine although this page will be meaningless to the reaper. Similarly, to or more paghes will produce an equivalent number of received pages.
The encryption unit 5 may be arranged to include an encryption key, which is known only to the users of the respective sending and receiving facsimile machines. In one embodiment, this key can be up to fifty two characters long. Encryption methods, per se, are known in the art, but in one method, each character may be stoired in turn in a look up table and each character in turn acts upon each received binary digit of the data. Thus the first digit in the message 1, is acted upon by the first digit of the keycode. The operation may be an addition, subtraction, multiplication or any other suitable operater in one particular embodiment. It is preferable that only unique result is the outcome of each operation, to avoid ambiguity t the eceiving end.After the first key code character has actet upon the first binary digit, and the second character has acted upon the second digit, if a t character cone is used, for example, then the third digit will eb acted upon by first character again ant so on. It will be appreciated that many other encryption methods could be used.
Each facsimile machine in a network would preferably be provided with both encryption and decryption apparatus. Authorised facsimile machines will of course be provided with the same key code.
For additional security, this key code may be changed periodically, such as daily or weekly. This may be done in an agreed, planned, manner which may be pseudo random or may be agreed periodically as appropriate. Different levels of authorisation may be included in the system, so that each machine includes a plurality of different key codes. Thus, a first machine, which could be a master machine, may be allowed to communicate with all other machines by using their own individual key code. Other machines may only be allowed to communicate with the master itself and not with th each other or in certain redefined sub networks. Alternatively, only certain types of infor:nation may be allowed to be received by certain machines, the transmission protocol determining whether a receiving machine is authorised to receive any particular message.
For some types of encryption/decryption systems, the key codes at the receiver and sender may not necessarily be identical, but could complementary so that, for example, one is the inverse of the other.

Claims (12)

1. Apparatus for secure transmission of facsimile messages, comprising means for encrypting data, to be transmitted by facsimile, before transmission and means for decrypting the received data at a remote facsimile machine.
2. Apparatus as claimed in Claim 1, wherein the encrypting apparatus comprises means to separate transmission protocol information from the data, means for encrypting the data only, and means for transmitting the transmission protocol together with the encrypted data.
3. Apparatus as claimed in Claim 2, wherein the receiving apparatus includes means for noting and responding to the transmission protocol and means for decrypting only the data portion of the message.
4. Apparatus as claimed in Claim 2 or Claim 3, wherein the transmission protocol is transmitted unchanged, in its correct temporal phase with respect to the information to be transmitted.
5. Apparatus as claimed in any one of Claims 2 to 4, wherein line feeds and/or page feeds are transmitted unchanged.
6. Apparatus as claimed in any of Claims 2 to 5, wherein the means for separating and/or reinstating the transmission protocol comprises timing means.
7. Apparatus as claimed in any of Claims 2 to 5, wherein the means for separating and/or reinstating the transmission protocol comprises a delay means.
8. Apparatus as claimed in any one the preceding claims, wherein the encryption and decryption means are adapted to act upon data in accordance with a key code known at both the transmitting and receiving ends.
9. Apparatus as claimed in Claim 6, wherein the key code is variable.
10. Apparatus for transmitting facsimile messages, including means to separate the transmission protocol from the data, encryption means adapted to encrypt data only, by a specific algorithm such that the data when received is only intelligible if acted upon by a specific identical or complementary algorithm, and means for transmitting the transmission protocol and the encrypted data.
11. Apparatus for receiving facsimile messages from a remote apparatus as claimed in Claim 10, which receiving apparatus comprises means for receiving the transmission protocol and the encrypted data, means for decrypting the encrypted data using an identical or complementary algorithm to that of the transmitter, and means for outputting or displaying the data.
12. Facsimile apparatus substantially as hereinbefore described with reference to, and as illustrated by, the accompanying drawings.
GB9122056A 1991-10-17 1991-10-17 Data transmission Withdrawn GB2262418A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9122056A GB2262418A (en) 1991-10-17 1991-10-17 Data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9122056A GB2262418A (en) 1991-10-17 1991-10-17 Data transmission

Publications (2)

Publication Number Publication Date
GB9122056D0 GB9122056D0 (en) 1991-11-27
GB2262418A true GB2262418A (en) 1993-06-16

Family

ID=10703092

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9122056A Withdrawn GB2262418A (en) 1991-10-17 1991-10-17 Data transmission

Country Status (1)

Country Link
GB (1) GB2262418A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0663761A2 (en) * 1994-01-12 1995-07-19 Mita Industrial Co., Ltd. Cipher data communications apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1144831A (en) * 1965-05-21 1969-03-12 Csf Arrangement for synchronizing a communication link
US4091423A (en) * 1975-03-17 1978-05-23 Datotek, Inc. Synchronous digital data scrambling system
GB2217949A (en) * 1988-03-29 1989-11-01 Aisin Seiki Secure facsimile system
US4985919A (en) * 1988-09-30 1991-01-15 Aisin Seiki Kabushiki Kaisha Secure communication control system
US5001750A (en) * 1989-03-07 1991-03-19 Aisin Seiki Kabushiki Kaisha Secret communication control apparatus
EP0418742A1 (en) * 1989-09-18 1991-03-27 Omnisec Ag Method and device for secure data transmission

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1144831A (en) * 1965-05-21 1969-03-12 Csf Arrangement for synchronizing a communication link
US4091423A (en) * 1975-03-17 1978-05-23 Datotek, Inc. Synchronous digital data scrambling system
GB2217949A (en) * 1988-03-29 1989-11-01 Aisin Seiki Secure facsimile system
US4985919A (en) * 1988-09-30 1991-01-15 Aisin Seiki Kabushiki Kaisha Secure communication control system
US5001750A (en) * 1989-03-07 1991-03-19 Aisin Seiki Kabushiki Kaisha Secret communication control apparatus
EP0418742A1 (en) * 1989-09-18 1991-03-27 Omnisec Ag Method and device for secure data transmission

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0663761A2 (en) * 1994-01-12 1995-07-19 Mita Industrial Co., Ltd. Cipher data communications apparatus
EP0663761A3 (en) * 1994-01-12 1995-10-04 Mita Industrial Co Ltd Cipher data communications apparatus.

Also Published As

Publication number Publication date
GB9122056D0 (en) 1991-11-27

Similar Documents

Publication Publication Date Title
EP0564745B1 (en) Method for Encryption and Decryption of Color Image Signals
US4924516A (en) Method and system for a synchronized pseudo-random privacy modem
JP2761281B2 (en) Encrypted communication method for multi-carrier communication system
US5077830A (en) Method and apparatus to selectively address recipients and recover missing messages on a broadcast distribution network
US5864625A (en) Methods and apparatus for secure optical communications links
EP0891670B1 (en) Method for providing a secure communication between two devices and application of this method
KR20000023124A (en) Safe transmission of broadband data messages
HK1011806A1 (en) A method and network for communicating between a group of entities a text encrypted using an encryption key intrinsic to the group of entities in a network having a plurality of entities and a center
GB2336512A (en) Apparatus and method for preventing disclosure through user-authentication at aprinting node
EA200100093A1 (en) METHOD AND DEVICE FOR CRYPTOGRAPHIC DATA TRANSMISSION
US4811394A (en) Variable starting state scrambling circuit
CN1972185A (en) Method for transmission of secure data through a network by exchanging encryption information and corresponding encryption/decryption device
CA2207169C (en) File transfer using facsimile modem
JPH07162692A (en) Cipher communication method and terminal equipment for cipher communication
CA2226831A1 (en) Decryption of retransmitted data in an encrypted communication system
RU98102784A (en) DECODING REPEATED DATA IN THE ENCRYPTED COMMUNICATION SYSTEM
GB2262418A (en) Data transmission
JP2002152189A (en) Open key distributing method, and open key transmitting device and open key receiving device used for the same method
KR970004617A (en) Communication method
RU2007121323A (en) METHOD AND ENCRYPTION SYSTEM
KR20100105619A (en) Method and apparatus for secured facsimile transmission
EP0100106B1 (en) Communications systems and transmitters and receivers including scrambling devices
JPH10336128A (en) Scrabble system for digital broadcast
JPS6032449A (en) Ciphered digital broadcast equipment
US4219891A (en) Countermeasures system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)