JPH0563681A - Device for preventing leakage of secrecy in information transmission - Google Patents
Device for preventing leakage of secrecy in information transmissionInfo
- Publication number
- JPH0563681A JPH0563681A JP3252999A JP25299991A JPH0563681A JP H0563681 A JPH0563681 A JP H0563681A JP 3252999 A JP3252999 A JP 3252999A JP 25299991 A JP25299991 A JP 25299991A JP H0563681 A JPH0563681 A JP H0563681A
- Authority
- JP
- Japan
- Prior art keywords
- encryption
- ciphering
- information
- switching means
- transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
Description
【0001】[0001]
【産業上の利用分野】本発明は、送受信端末から公衆回
線網などの回線網を用いて情報通信を行う場合の機密漏
洩防止装置に関するものである。BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a confidential information leakage prevention device for transmitting and receiving information from a transmitting / receiving terminal using a public network such as a public network.
【0002】[0002]
【従来の技術】現在は高度情報化社会であり、多くの重
要(機密を要する)な情報が通信ネットワークを介して
日常的に送受信されている。電話による会話通信やファ
クシミリによる伝送、コンピュータ通信などがその例で
ある。2. Description of the Related Art At present, in an advanced information society, many important (confidential) information is routinely transmitted and received via a communication network. Examples are conversational communication by telephone, transmission by facsimile, and computer communication.
【0003】このような通信ネットワークで企業内情報
通信ネットワークのような専用回線を用いての通信にお
いては、相手先が固定されているため、IDコード管
理、パスワード管理等のセキュリティ機能でほぼ情報も
れを防ぐことができる。In communication using a dedicated line such as an in-house information communication network in such a communication network, since the other party is fixed, almost all information is also provided by security functions such as ID code management and password management. This can be prevented.
【0004】一方、公衆回線網(アナログ、デジタル)
を用いて情報通信を行う場合には、IDコード管理、パ
スワード管理だけでは充分でなく、機密漏洩・盗取に対
する対策も必要となる。さらに、公衆回線網を用いる場
合には操作ミスによる誤送信等についても対策をたてる
必要がある。On the other hand, public network (analog, digital)
When information communication is performed using, the ID code management and the password management are not sufficient, and countermeasures against confidentiality leakage and theft are also required. Furthermore, when using a public line network, it is necessary to take measures against erroneous transmission due to an operation error.
【0005】一例としてファクシミリで電話の公衆回線
網を使用して秘密の図面や文書のの送信を行う場合に、
送り先の電話番号を短縮ダイヤル等で登録しておくこと
で間違いのないようにすることは行われているが、短縮
ダイヤルボタンの押し間違いによる誤操作は避けられな
い。As an example, when a secret drawing or document is transmitted by facsimile using a public telephone network of a telephone,
It has been attempted to make a mistake by registering the destination telephone number with speed dial or the like, but erroneous operation due to a mistake in pressing the speed dial button is unavoidable.
【0006】近年、機密漏洩に対する対策として、元情
報を各種の暗号化方式により加工し、スクランブルをか
ける暗号化装置と、加工された情報を前記の暗号化方式
のキーによりデスクランブルをかけ、元の情報にもどす
暗号化解読装置が開発されている。[0006] In recent years, as a countermeasure against confidentiality leakage, an encryption device that processes and scrambles the original information by various encryption methods, and a descrambler of the processed information by the key of the encryption method, An encryption / decryption device has been developed that returns the information to.
【0007】[0007]
【発明が解決しようとする課題】しかし、NTT(日本
電信電話株式会社)などで実施を試みている前記暗号化
装置や暗号化解読装置を組み込む機密漏洩防止装置は、
送る情報が常に暗号化されるか、もしくは特定のスイッ
チを押すなどの特定な操作を経て初めて暗号化されるも
のである。However, a security leakage prevention device incorporating the above-mentioned encryption device or encryption / decryption device, which is being implemented by NTT (Nippon Telegraph and Telephone Corporation), etc.
Information to be sent is always encrypted, or is encrypted only after a specific operation such as pressing a specific switch.
【0008】従って、送る情報が常に暗号化される場合
には、受け取る側に暗号化解読装置がある受信装置がな
ければならず、送信先が限定されてしまう。また、特定
のスイッチを押すなどの特定な操作を経て初めて暗号化
されるものでは、このスイッチ操作を忘れた場合には暗
号化されないで情報が送られてしまい、機密漏洩防止の
役に立たない。Therefore, if the information to be sent is always encrypted, the receiving side must have a receiving device having an encryption / decryption device, and the destination is limited. In addition, in the case of encryption that is performed only after a specific operation such as pressing a specific switch, if this switch operation is forgotten, information will be sent without being encrypted, which is not useful for preventing confidentiality leakage.
【0009】本発明の目的は前記従来例の不都合を解消
し、操作ミスによる機密漏洩の心配をなくし、万全を期
することができる情報伝送の機密漏洩防止装置を提供す
ることにある。An object of the present invention is to eliminate the inconvenience of the conventional example, to eliminate the fear of confidential information leakage due to an operation error, and to provide a confidential information leakage prevention apparatus for information transmission.
【0010】[0010]
【課題を解決するための手段】本発明は前記目的を達成
するため、送受信端末と回線網とを接続する装置とし
て、送受信端末からみて送信側のルートには暗号化装置
を設け、受信側のルートには暗号化解読装置を設ける機
密漏洩防止装置において、この暗号化装置の入力側に常
時は暗号化装置へ接続し、特定操作でこの暗号化装置へ
の接続を解除して暗号化装置をバイパスさせるように切
り換える切換手段を設け、また、暗号化解読装置の入力
側に受ける情報が暗号化されている場合には暗号化解読
装置に接続し、暗号化されていない場合には暗号化解読
装置をバイパスさせるように切り換える切換手段を設け
たことを要旨とするものである。In order to achieve the above object, the present invention provides an encryption device as a device for connecting a transmission / reception terminal and a line network to the route of the transmission side as seen from the transmission / reception terminal, and In a confidentiality leak prevention device where an encryption / decryption device is installed at the root, always connect to the encryption device on the input side of this encryption device, and release the connection to this encryption device by a specific operation By providing switching means for switching to bypass, if the information received at the input side of the encryption / decryption device is encrypted, connect to the encryption / decryption device, and if it is not encrypted, decryption The gist is that a switching means for switching the device is provided.
【0011】[0011]
【作用】本発明によれば、送受信端末から送信する際に
特定スイッチを押すなどの特定操作を行わない限りは切
換手段が暗号化装置へ接続しており、送信された情報は
この暗号化装置でスクランブルされる。また、機密漏洩
防止の必要がない情報を送信する場合は、特定スイッチ
を押すなどの特定操作を行うと、切換手段が切り換わり
送信される情報は暗号化装置をバイパスしてそのままで
送り出せる。このようにして、特定操作を忘れても暗号
化が行われるので、機密は保持される。According to the present invention, the switching means is connected to the encryption device unless the specific operation such as pressing the specific switch is performed when transmitting from the transmitting / receiving terminal, and the transmitted information is transmitted to the encryption device. Scrambled with. Further, when transmitting information that does not require confidentiality leakage prevention, when a specific operation such as pressing a specific switch is performed, the switching means is switched and the transmitted information can be sent out as it is, bypassing the encryption device. In this way, the confidentiality is maintained because the encryption is performed even if the specific operation is forgotten.
【0012】一方、情報を受ける側の送受信端末では、
送られてくる情報が暗号化されている場合にはそのこと
を検知して切換手段が暗号化解読装置に接続し、デスク
ランブルして出力する。また、暗号化されていない場合
にはそのことを検知して切換手段が切り換わり暗号化解
読装置をバイパスしてそのままで出力する。On the other hand, in the transmitting / receiving terminal which receives information,
When the transmitted information is encrypted, it is detected and the switching means connects to the encryption / decryption device, descrambles and outputs it. If it is not encrypted, it is detected and the switching means switches to bypass the encryption / decryption device and output as it is.
【0013】以上の構成をとることにより、本発明の機
密漏洩防止装置を備えた送受信端末同士の送受信を行う
場合だけでなく、本発明の機密漏洩防止装置を備えた送
受信端末とこれを備えてない送受信端末との送受信も支
承なく行われ、仮に特定スイッチを押すなどの特定操作
を忘れて本発明の機密漏洩防止装置を備えてない送受信
端末に送信した場合には暗号化された情報が出力される
だけなので、機密漏洩のおそれはない。With the above configuration, not only when transmitting / receiving between the transmitting / receiving terminals equipped with the security leakage prevention device of the present invention, but also including the transmission / reception terminal equipped with the security leakage prevention device of the present invention. Transmission / reception with a transmitting / receiving terminal that does not exist is performed without any support, and if you forget the specific operation such as pressing a specific switch and send to a transmitting / receiving terminal that is not equipped with the confidentiality leakage prevention device of the present invention, encrypted information is output. There is no risk of confidential information leakage because it is only done.
【0014】[0014]
【実施例】以下、図面について本発明の実施例を詳細に
説明する。図1は本発明の情報伝送の機密漏洩防止装置
のブロック図で、送受信端末1と公衆回線網2とを接続
する装置として、送受信端末1側のインターフェース回
路3と公衆回線網2側のインターフェース回路4との間
で、送受信端末1からみて送信側のルートには暗号化装
置(スクランブラー)5が設けられ、受信側のルートに
は暗号化解読装置(デスクランブラー)6が設けられ
る。Embodiments of the present invention will now be described in detail with reference to the drawings. FIG. 1 is a block diagram of a confidential information leakage prevention apparatus for information transmission according to the present invention. As an apparatus for connecting a transmission / reception terminal 1 and a public line network 2, an interface circuit 3 on the transmission / reception terminal 1 side and an interface circuit on the public line network 2 side. 4, an encryption device (scrambler) 5 is provided on the transmission side route as viewed from the transmission / reception terminal 1, and an encryption / decryption device (descrambler) 6 is provided on the reception side route.
【0015】暗号化装置5は、元情報(データ)を各種
の暗号化方式により加工し、スクランブルをかけるもの
であり、また、暗号化解読装置6は加工された情報(デ
ータ)を前記の暗号化方式のキーによりデスクランブル
をかけ、もとの情報(データ)に戻すものである。図4
にこの暗号化装置5、暗号化解読装置6の構成を示す
が、鍵処理部11には暗号鍵/復号鍵12からの出力が導入
され、この鍵処理部11からの出力で、前処理→データか
く拌処理→データかく拌処理→後処理という処理が行わ
れる。The encryption device 5 processes the original information (data) by various encryption methods and scrambles it, and the encryption / decryption device 6 processes the processed information (data) by the above-mentioned encryption. The data is descrambled with the key of the encryption method to restore the original information (data). Figure 4
The configuration of the encryption device 5 and the encryption / decryption device 6 is shown in Fig. 7. The output from the encryption key / decryption key 12 is introduced into the key processing unit 11, and the output from this key processing unit 11 is used for preprocessing → The process of data agitation processing → data agitation processing → post-processing is performed.
【0016】インターフェース回路3,4は、CCIT
T(国際電信電話諮問委員会)の規格であるVインター
フェース、Xインターフェース、Iインターフェースや
IEEE(アメリカ電気電子技術者協会)の規格である
GP─IB、EIA(米国電子工業会)の規格であるR
S─232C、NTT(日本電信電話株式会社)の規格
であるYインターフェース等をその都度接続する網、端
末により使い分けるようにすればよい。The interface circuits 3 and 4 are CCITs.
V interface, X interface, I interface which is a standard of T (International Telegraph and Telephone Consultative Committee), GP-IB which is a standard of IEEE (Institute of Electrical and Electronics Engineers), and EIA (American Electronics Industry Association) standard. R
The S-232C and the Y interface, which is a standard of NTT (Nippon Telegraph and Telephone Corporation), may be used properly depending on the network and terminal to which the connection is made.
【0017】前記暗号化装置5の入力側に、常時は暗号
化装置5へ接続し、押しボタンスッチ等の特定操作でこ
の暗号化装置5への接続を解除して暗号化装置5をバイ
パスさせるように切り換えるスイッチ等による切換手段
7を設ける。The input side of the encryption device 5 is normally connected to the encryption device 5, and the connection to the encryption device 5 is released by a specific operation such as a push button switch to bypass the encryption device 5. The switching means 7 is provided by a switch or the like.
【0018】また、暗号化解読装置6の入力側に、受け
る情報が暗号化されている場合には暗号化解読装置6に
接続し、暗号化されていない場合には暗号化解読装置6
をバイパスさせるように切り換えるスイッチ等による切
換手段8を設けた。なお、暗号化装置5、暗号化解読装
置6および切換手段7,8はCPU(中央処理装置)9
に接続され、さらにこのCPU9は記憶装置(メモリ)
10を接続している。なお、該CPU9には切換手段8に
入力される情報が暗号化されものであるか否かを自動的
に判別して切換手段8を切り換えるように指令信号を発
する判別手段が形成される。この判別手段は受ける情報
がデジタル信号であれば、頭の何ビットかでその判断を
行うものである。If the received information is encrypted on the input side of the encryption / decryption device 6, it is connected to the encryption / decryption device 6, and if it is not encrypted, the encryption / decryption device 6 is connected.
The switching means 8 is provided by a switch or the like for switching so as to bypass. The encryption device 5, the encryption / decryption device 6 and the switching means 7 and 8 are composed of a CPU (central processing unit) 9
And the CPU 9 is connected to a storage device (memory).
10 are connected. The CPU 9 is provided with a discriminating means for automatically discriminating whether or not the information inputted to the switching means 8 is encrypted and for issuing a command signal for switching the switching means 8. If the received information is a digital signal, this discriminating means makes the determination based on some bits of the head.
【0019】次に、使用法について説明する。図2はフ
ァクシミリ通信の場合の送信フローを示すもので、相手
先のダイヤルを回し、相手先に本発明装置が無い場合に
は特定スイッチとしてのスルーボタンを押してから、送
信ボタンを押す。これにより、切換手段7が作用して暗
号化装置5をバイパスしてそのままの状態で送信が行わ
れる。Next, the usage will be described. FIG. 2 shows a transmission flow in the case of facsimile communication. The dial of the other party is turned, and if the other party does not have the device of the present invention, the through button as a specific switch is pushed and then the send button is pushed. As a result, the switching means 7 operates to bypass the encryption device 5 and the transmission is performed as it is.
【0020】相手先に本発明装置がある場合には、その
まま送信ボタンを押す。切換手段7はインターフェース
回路3と暗号化装置5とを接続し、情報は暗号化装置5
で暗号化されて送信される。When the other party has the device of the present invention, the send button is pressed as it is. The switching means 7 connects the interface circuit 3 and the encryption device 5, and the information is encrypted by the encryption device 5.
Will be encrypted and sent.
【0021】図3は着信フローを示すもので、着信され
る情報が暗号化されている場合にはそのことを検知して
切換手段が暗号化解読装置6に接続し、デスクランブル
(解説)して受信する。また、暗号化されていない場合
にはそのことを検知して切換手段8が切り換わり暗号化
解読装置6をバイパスしてそのままで受信する。FIG. 3 shows an incoming call flow. When the incoming information is encrypted, the switching means detects it and connects to the encryption / decryption device 6 to descramble (explain) it. To receive. If it is not encrypted, it is detected and the switching means 8 switches to bypass the encryption / decryption device 6 and receive the data as it is.
【0022】なお、オプション機能をして、予め通信相
手先を登録設定しておき、通信毎に先ず相手先を確認し
てから通信を開始するようにしてもよい。この場合には
相手方が登録されていない時には通信を中止する。The communication partner may be registered and set in advance by using the optional function, and the communication partner may be first confirmed before each communication. In this case, if the other party is not registered, the communication is stopped.
【0023】[0023]
【発明の効果】以上述べたように本発明の情報伝送の機
密漏洩防止装置は、特定ボタンスイッチの押し忘れ等の
操作ミスによる機密漏洩の心配をなくし、機密漏洩防止
の万全を期することができるものである。As described above, the confidential information leakage prevention device for information transmission according to the present invention eliminates the fear of confidential information leakage due to operation mistakes such as forgetting to press a specific button switch, and ensures complete security leakage prevention. It is possible.
【図1】本発明の情報伝送の機密漏洩防止装置の1実施
例を示すブロック図である。FIG. 1 is a block diagram showing an embodiment of a confidential information leakage prevention device for information transmission according to the present invention.
【図2】送信時の動作を示すフロー図である。FIG. 2 is a flowchart showing an operation during transmission.
【図3】着信時の動作を示すフロー図である。FIG. 3 is a flowchart showing an operation when an incoming call arrives.
【図4】暗号化装置、暗号化解読装置の説明図である。FIG. 4 is an explanatory diagram of an encryption device and an encryption decryption device.
1…送受信端末 2…公衆回線網 3,4…インターフェース回路 5…暗号化装置 6…暗号化解読装置 7,8…切換手段 9…CPU 10…記憶装置 11…鍵処理装置 12…暗号鍵/復号鍵 DESCRIPTION OF SYMBOLS 1 ... Transmission / reception terminal 2 ... Public line network 3, 4 ... Interface circuit 5 ... Encryption device 6 ... Encryption / decryption device 7, 8 ... Switching means 9 ... CPU 10 ... Storage device 11 ... Key processing device 12 ... Cryptographic key / decryption key
Claims (1)
して、送受信端末からみて送信側のルートには暗号化装
置を設け、受信側のルートには暗号化解読装置を設ける
機密漏洩防止装置において、この暗号化装置の入力側に
常時は暗号化装置へ接続し、特定操作でこの暗号化装置
への接続を解除して暗号化装置をバイパスさせるように
切り換える切換手段を設け、また、暗号化解読装置の入
力側に受ける情報が暗号化されている場合には暗号化解
読装置に接続し、暗号化されていない場合には暗号化解
読装置をバイパスさせるように切り換える切換手段を設
けたことを特徴とする情報伝送の機密漏洩防止装置。1. A security leakage prevention device, comprising an encryption device provided on a route of a transmission side as seen from the transmission / reception terminal and an encryption decryption device provided on a route of a reception side as a device for connecting a transmission / reception terminal to a network. , The input side of this encryption device is provided with switching means for connecting to the encryption device at all times, and switching to bypass the encryption device by disconnecting the connection to this encryption device by a specific operation. If the information received at the input side of the decryption device is encrypted, it is connected to the encryption decryption device, and if it is not encrypted, switching means is provided to switch to bypass the encryption decryption device. Special information leakage prevention device for information transmission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP3252999A JPH0563681A (en) | 1991-09-03 | 1991-09-03 | Device for preventing leakage of secrecy in information transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP3252999A JPH0563681A (en) | 1991-09-03 | 1991-09-03 | Device for preventing leakage of secrecy in information transmission |
Publications (1)
Publication Number | Publication Date |
---|---|
JPH0563681A true JPH0563681A (en) | 1993-03-12 |
Family
ID=17245082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP3252999A Pending JPH0563681A (en) | 1991-09-03 | 1991-09-03 | Device for preventing leakage of secrecy in information transmission |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH0563681A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001203688A (en) * | 2000-01-24 | 2001-07-27 | Kyocera Corp | Voice communication terminal |
US7539858B2 (en) | 2004-04-05 | 2009-05-26 | Nippon Telegraph And Telephone Corporation | Packet encryption substituting device, method thereof, and program recording medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61121549A (en) * | 1984-11-16 | 1986-06-09 | Sanyo Electric Co Ltd | Control circuit for privacy communication device |
JPS61270940A (en) * | 1985-05-27 | 1986-12-01 | Mitsubishi Electric Corp | Cipher communicating equipment |
JPH02256343A (en) * | 1989-03-29 | 1990-10-17 | Aisin Seiki Co Ltd | Privacy communication controller |
-
1991
- 1991-09-03 JP JP3252999A patent/JPH0563681A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61121549A (en) * | 1984-11-16 | 1986-06-09 | Sanyo Electric Co Ltd | Control circuit for privacy communication device |
JPS61270940A (en) * | 1985-05-27 | 1986-12-01 | Mitsubishi Electric Corp | Cipher communicating equipment |
JPH02256343A (en) * | 1989-03-29 | 1990-10-17 | Aisin Seiki Co Ltd | Privacy communication controller |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001203688A (en) * | 2000-01-24 | 2001-07-27 | Kyocera Corp | Voice communication terminal |
US7539858B2 (en) | 2004-04-05 | 2009-05-26 | Nippon Telegraph And Telephone Corporation | Packet encryption substituting device, method thereof, and program recording medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5241597A (en) | Method for recovering from encryption key variable loss | |
US7113601B2 (en) | Method and apparatus for performing secure communications | |
KR100372495B1 (en) | Method and system for securely transferring a data set in a data communications system | |
US5392355A (en) | Secure communication system | |
US4797672A (en) | Voice network security system | |
JPH07162412A (en) | Device for generating enciphered confirmation in telecommunication system and its method | |
CA2126054A1 (en) | Method for point-to-point communications within secure communication systems | |
EP0018129B1 (en) | Method of providing security of data on a communication path | |
KR100287674B1 (en) | Communication method | |
JPH0563681A (en) | Device for preventing leakage of secrecy in information transmission | |
EP0445290B1 (en) | Adaptive data ciphering/deciphering apparatus and data communication system employing said apparatus | |
WO1991012680A1 (en) | Apparatus and method for data communication | |
JPH07303104A (en) | Storage type communication system with ciphering function | |
JPH07250249A (en) | Communication equipment | |
KR100227790B1 (en) | Information sending and receiving method in facsimile communication | |
JPH05244153A (en) | Digital communication equipment | |
KR100760804B1 (en) | Apparatus and Method of protecting Security for User Information | |
JP2940298B2 (en) | Secret communication method | |
JPH05102960A (en) | Cipher communication system | |
JPH05235933A (en) | Terminal equipment identification system | |
Goode | New developments in data and voice security | |
EP0691766A1 (en) | Enciphering of dialing information based on previous verification step | |
JPH02256343A (en) | Privacy communication controller | |
WO2000056000A1 (en) | Encryption device | |
JPH10336338A (en) | Digital encryption speech system using analog telephone line |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |