JPH0563681A - Device for preventing leakage of secrecy in information transmission - Google Patents

Device for preventing leakage of secrecy in information transmission

Info

Publication number
JPH0563681A
JPH0563681A JP3252999A JP25299991A JPH0563681A JP H0563681 A JPH0563681 A JP H0563681A JP 3252999 A JP3252999 A JP 3252999A JP 25299991 A JP25299991 A JP 25299991A JP H0563681 A JPH0563681 A JP H0563681A
Authority
JP
Japan
Prior art keywords
encryption
ciphering
information
switching means
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP3252999A
Other languages
Japanese (ja)
Inventor
Kiichi Murata
喜一 村田
Kanjirou Takahashi
莞爾郎 高橋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kajima Corp
Original Assignee
Kajima Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kajima Corp filed Critical Kajima Corp
Priority to JP3252999A priority Critical patent/JPH0563681A/en
Publication of JPH0563681A publication Critical patent/JPH0563681A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To prevent leakage of secrecy for extra insurance by eliminating a care about leakage of secrecy due to mis-operation such as a specific button switch left undepressed. CONSTITUTION:In a secrecy leakage prevention device in which a ciphering device 5 is provided to a route of a sender side when viewing from a transmission reception terminal equipment 1 as a device connecting the transmission reception terminal equipment and a line network and a ciphering decoder 6 is provided to a route of a receiver side, the input side of the ciphering device 5 is provided with a switching means 7 which is normally thrown to the position of the ciphering device and which is selected to bypass the ciphering device 5 through the release of connection to the ciphering device 5 by a specific operation, and the input side of the ciphering decoder 6 is provided with a switching means 8 which is thrown to the position of the ciphering decoder 6 when the information given to the input of the ciphering decoder 6 is ciphered and which is selected to bypass the ciphering decoder 6 when the information is not ciphered.

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【産業上の利用分野】本発明は、送受信端末から公衆回
線網などの回線網を用いて情報通信を行う場合の機密漏
洩防止装置に関するものである。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a confidential information leakage prevention device for transmitting and receiving information from a transmitting / receiving terminal using a public network such as a public network.

【0002】[0002]

【従来の技術】現在は高度情報化社会であり、多くの重
要(機密を要する)な情報が通信ネットワークを介して
日常的に送受信されている。電話による会話通信やファ
クシミリによる伝送、コンピュータ通信などがその例で
ある。
2. Description of the Related Art At present, in an advanced information society, many important (confidential) information is routinely transmitted and received via a communication network. Examples are conversational communication by telephone, transmission by facsimile, and computer communication.

【0003】このような通信ネットワークで企業内情報
通信ネットワークのような専用回線を用いての通信にお
いては、相手先が固定されているため、IDコード管
理、パスワード管理等のセキュリティ機能でほぼ情報も
れを防ぐことができる。
In communication using a dedicated line such as an in-house information communication network in such a communication network, since the other party is fixed, almost all information is also provided by security functions such as ID code management and password management. This can be prevented.

【0004】一方、公衆回線網(アナログ、デジタル)
を用いて情報通信を行う場合には、IDコード管理、パ
スワード管理だけでは充分でなく、機密漏洩・盗取に対
する対策も必要となる。さらに、公衆回線網を用いる場
合には操作ミスによる誤送信等についても対策をたてる
必要がある。
On the other hand, public network (analog, digital)
When information communication is performed using, the ID code management and the password management are not sufficient, and countermeasures against confidentiality leakage and theft are also required. Furthermore, when using a public line network, it is necessary to take measures against erroneous transmission due to an operation error.

【0005】一例としてファクシミリで電話の公衆回線
網を使用して秘密の図面や文書のの送信を行う場合に、
送り先の電話番号を短縮ダイヤル等で登録しておくこと
で間違いのないようにすることは行われているが、短縮
ダイヤルボタンの押し間違いによる誤操作は避けられな
い。
As an example, when a secret drawing or document is transmitted by facsimile using a public telephone network of a telephone,
It has been attempted to make a mistake by registering the destination telephone number with speed dial or the like, but erroneous operation due to a mistake in pressing the speed dial button is unavoidable.

【0006】近年、機密漏洩に対する対策として、元情
報を各種の暗号化方式により加工し、スクランブルをか
ける暗号化装置と、加工された情報を前記の暗号化方式
のキーによりデスクランブルをかけ、元の情報にもどす
暗号化解読装置が開発されている。
[0006] In recent years, as a countermeasure against confidentiality leakage, an encryption device that processes and scrambles the original information by various encryption methods, and a descrambler of the processed information by the key of the encryption method, An encryption / decryption device has been developed that returns the information to.

【0007】[0007]

【発明が解決しようとする課題】しかし、NTT(日本
電信電話株式会社)などで実施を試みている前記暗号化
装置や暗号化解読装置を組み込む機密漏洩防止装置は、
送る情報が常に暗号化されるか、もしくは特定のスイッ
チを押すなどの特定な操作を経て初めて暗号化されるも
のである。
However, a security leakage prevention device incorporating the above-mentioned encryption device or encryption / decryption device, which is being implemented by NTT (Nippon Telegraph and Telephone Corporation), etc.
Information to be sent is always encrypted, or is encrypted only after a specific operation such as pressing a specific switch.

【0008】従って、送る情報が常に暗号化される場合
には、受け取る側に暗号化解読装置がある受信装置がな
ければならず、送信先が限定されてしまう。また、特定
のスイッチを押すなどの特定な操作を経て初めて暗号化
されるものでは、このスイッチ操作を忘れた場合には暗
号化されないで情報が送られてしまい、機密漏洩防止の
役に立たない。
Therefore, if the information to be sent is always encrypted, the receiving side must have a receiving device having an encryption / decryption device, and the destination is limited. In addition, in the case of encryption that is performed only after a specific operation such as pressing a specific switch, if this switch operation is forgotten, information will be sent without being encrypted, which is not useful for preventing confidentiality leakage.

【0009】本発明の目的は前記従来例の不都合を解消
し、操作ミスによる機密漏洩の心配をなくし、万全を期
することができる情報伝送の機密漏洩防止装置を提供す
ることにある。
An object of the present invention is to eliminate the inconvenience of the conventional example, to eliminate the fear of confidential information leakage due to an operation error, and to provide a confidential information leakage prevention apparatus for information transmission.

【0010】[0010]

【課題を解決するための手段】本発明は前記目的を達成
するため、送受信端末と回線網とを接続する装置とし
て、送受信端末からみて送信側のルートには暗号化装置
を設け、受信側のルートには暗号化解読装置を設ける機
密漏洩防止装置において、この暗号化装置の入力側に常
時は暗号化装置へ接続し、特定操作でこの暗号化装置へ
の接続を解除して暗号化装置をバイパスさせるように切
り換える切換手段を設け、また、暗号化解読装置の入力
側に受ける情報が暗号化されている場合には暗号化解読
装置に接続し、暗号化されていない場合には暗号化解読
装置をバイパスさせるように切り換える切換手段を設け
たことを要旨とするものである。
In order to achieve the above object, the present invention provides an encryption device as a device for connecting a transmission / reception terminal and a line network to the route of the transmission side as seen from the transmission / reception terminal, and In a confidentiality leak prevention device where an encryption / decryption device is installed at the root, always connect to the encryption device on the input side of this encryption device, and release the connection to this encryption device by a specific operation By providing switching means for switching to bypass, if the information received at the input side of the encryption / decryption device is encrypted, connect to the encryption / decryption device, and if it is not encrypted, decryption The gist is that a switching means for switching the device is provided.

【0011】[0011]

【作用】本発明によれば、送受信端末から送信する際に
特定スイッチを押すなどの特定操作を行わない限りは切
換手段が暗号化装置へ接続しており、送信された情報は
この暗号化装置でスクランブルされる。また、機密漏洩
防止の必要がない情報を送信する場合は、特定スイッチ
を押すなどの特定操作を行うと、切換手段が切り換わり
送信される情報は暗号化装置をバイパスしてそのままで
送り出せる。このようにして、特定操作を忘れても暗号
化が行われるので、機密は保持される。
According to the present invention, the switching means is connected to the encryption device unless the specific operation such as pressing the specific switch is performed when transmitting from the transmitting / receiving terminal, and the transmitted information is transmitted to the encryption device. Scrambled with. Further, when transmitting information that does not require confidentiality leakage prevention, when a specific operation such as pressing a specific switch is performed, the switching means is switched and the transmitted information can be sent out as it is, bypassing the encryption device. In this way, the confidentiality is maintained because the encryption is performed even if the specific operation is forgotten.

【0012】一方、情報を受ける側の送受信端末では、
送られてくる情報が暗号化されている場合にはそのこと
を検知して切換手段が暗号化解読装置に接続し、デスク
ランブルして出力する。また、暗号化されていない場合
にはそのことを検知して切換手段が切り換わり暗号化解
読装置をバイパスしてそのままで出力する。
On the other hand, in the transmitting / receiving terminal which receives information,
When the transmitted information is encrypted, it is detected and the switching means connects to the encryption / decryption device, descrambles and outputs it. If it is not encrypted, it is detected and the switching means switches to bypass the encryption / decryption device and output as it is.

【0013】以上の構成をとることにより、本発明の機
密漏洩防止装置を備えた送受信端末同士の送受信を行う
場合だけでなく、本発明の機密漏洩防止装置を備えた送
受信端末とこれを備えてない送受信端末との送受信も支
承なく行われ、仮に特定スイッチを押すなどの特定操作
を忘れて本発明の機密漏洩防止装置を備えてない送受信
端末に送信した場合には暗号化された情報が出力される
だけなので、機密漏洩のおそれはない。
With the above configuration, not only when transmitting / receiving between the transmitting / receiving terminals equipped with the security leakage prevention device of the present invention, but also including the transmission / reception terminal equipped with the security leakage prevention device of the present invention. Transmission / reception with a transmitting / receiving terminal that does not exist is performed without any support, and if you forget the specific operation such as pressing a specific switch and send to a transmitting / receiving terminal that is not equipped with the confidentiality leakage prevention device of the present invention, encrypted information is output. There is no risk of confidential information leakage because it is only done.

【0014】[0014]

【実施例】以下、図面について本発明の実施例を詳細に
説明する。図1は本発明の情報伝送の機密漏洩防止装置
のブロック図で、送受信端末1と公衆回線網2とを接続
する装置として、送受信端末1側のインターフェース回
路3と公衆回線網2側のインターフェース回路4との間
で、送受信端末1からみて送信側のルートには暗号化装
置(スクランブラー)5が設けられ、受信側のルートに
は暗号化解読装置(デスクランブラー)6が設けられ
る。
Embodiments of the present invention will now be described in detail with reference to the drawings. FIG. 1 is a block diagram of a confidential information leakage prevention apparatus for information transmission according to the present invention. As an apparatus for connecting a transmission / reception terminal 1 and a public line network 2, an interface circuit 3 on the transmission / reception terminal 1 side and an interface circuit on the public line network 2 side. 4, an encryption device (scrambler) 5 is provided on the transmission side route as viewed from the transmission / reception terminal 1, and an encryption / decryption device (descrambler) 6 is provided on the reception side route.

【0015】暗号化装置5は、元情報(データ)を各種
の暗号化方式により加工し、スクランブルをかけるもの
であり、また、暗号化解読装置6は加工された情報(デ
ータ)を前記の暗号化方式のキーによりデスクランブル
をかけ、もとの情報(データ)に戻すものである。図4
にこの暗号化装置5、暗号化解読装置6の構成を示す
が、鍵処理部11には暗号鍵/復号鍵12からの出力が導入
され、この鍵処理部11からの出力で、前処理→データか
く拌処理→データかく拌処理→後処理という処理が行わ
れる。
The encryption device 5 processes the original information (data) by various encryption methods and scrambles it, and the encryption / decryption device 6 processes the processed information (data) by the above-mentioned encryption. The data is descrambled with the key of the encryption method to restore the original information (data). Figure 4
The configuration of the encryption device 5 and the encryption / decryption device 6 is shown in Fig. 7. The output from the encryption key / decryption key 12 is introduced into the key processing unit 11, and the output from this key processing unit 11 is used for preprocessing → The process of data agitation processing → data agitation processing → post-processing is performed.

【0016】インターフェース回路3,4は、CCIT
T(国際電信電話諮問委員会)の規格であるVインター
フェース、Xインターフェース、Iインターフェースや
IEEE(アメリカ電気電子技術者協会)の規格である
GP─IB、EIA(米国電子工業会)の規格であるR
S─232C、NTT(日本電信電話株式会社)の規格
であるYインターフェース等をその都度接続する網、端
末により使い分けるようにすればよい。
The interface circuits 3 and 4 are CCITs.
V interface, X interface, I interface which is a standard of T (International Telegraph and Telephone Consultative Committee), GP-IB which is a standard of IEEE (Institute of Electrical and Electronics Engineers), and EIA (American Electronics Industry Association) standard. R
The S-232C and the Y interface, which is a standard of NTT (Nippon Telegraph and Telephone Corporation), may be used properly depending on the network and terminal to which the connection is made.

【0017】前記暗号化装置5の入力側に、常時は暗号
化装置5へ接続し、押しボタンスッチ等の特定操作でこ
の暗号化装置5への接続を解除して暗号化装置5をバイ
パスさせるように切り換えるスイッチ等による切換手段
7を設ける。
The input side of the encryption device 5 is normally connected to the encryption device 5, and the connection to the encryption device 5 is released by a specific operation such as a push button switch to bypass the encryption device 5. The switching means 7 is provided by a switch or the like.

【0018】また、暗号化解読装置6の入力側に、受け
る情報が暗号化されている場合には暗号化解読装置6に
接続し、暗号化されていない場合には暗号化解読装置6
をバイパスさせるように切り換えるスイッチ等による切
換手段8を設けた。なお、暗号化装置5、暗号化解読装
置6および切換手段7,8はCPU(中央処理装置)9
に接続され、さらにこのCPU9は記憶装置(メモリ)
10を接続している。なお、該CPU9には切換手段8に
入力される情報が暗号化されものであるか否かを自動的
に判別して切換手段8を切り換えるように指令信号を発
する判別手段が形成される。この判別手段は受ける情報
がデジタル信号であれば、頭の何ビットかでその判断を
行うものである。
If the received information is encrypted on the input side of the encryption / decryption device 6, it is connected to the encryption / decryption device 6, and if it is not encrypted, the encryption / decryption device 6 is connected.
The switching means 8 is provided by a switch or the like for switching so as to bypass. The encryption device 5, the encryption / decryption device 6 and the switching means 7 and 8 are composed of a CPU (central processing unit) 9
And the CPU 9 is connected to a storage device (memory).
10 are connected. The CPU 9 is provided with a discriminating means for automatically discriminating whether or not the information inputted to the switching means 8 is encrypted and for issuing a command signal for switching the switching means 8. If the received information is a digital signal, this discriminating means makes the determination based on some bits of the head.

【0019】次に、使用法について説明する。図2はフ
ァクシミリ通信の場合の送信フローを示すもので、相手
先のダイヤルを回し、相手先に本発明装置が無い場合に
は特定スイッチとしてのスルーボタンを押してから、送
信ボタンを押す。これにより、切換手段7が作用して暗
号化装置5をバイパスしてそのままの状態で送信が行わ
れる。
Next, the usage will be described. FIG. 2 shows a transmission flow in the case of facsimile communication. The dial of the other party is turned, and if the other party does not have the device of the present invention, the through button as a specific switch is pushed and then the send button is pushed. As a result, the switching means 7 operates to bypass the encryption device 5 and the transmission is performed as it is.

【0020】相手先に本発明装置がある場合には、その
まま送信ボタンを押す。切換手段7はインターフェース
回路3と暗号化装置5とを接続し、情報は暗号化装置5
で暗号化されて送信される。
When the other party has the device of the present invention, the send button is pressed as it is. The switching means 7 connects the interface circuit 3 and the encryption device 5, and the information is encrypted by the encryption device 5.
Will be encrypted and sent.

【0021】図3は着信フローを示すもので、着信され
る情報が暗号化されている場合にはそのことを検知して
切換手段が暗号化解読装置6に接続し、デスクランブル
(解説)して受信する。また、暗号化されていない場合
にはそのことを検知して切換手段8が切り換わり暗号化
解読装置6をバイパスしてそのままで受信する。
FIG. 3 shows an incoming call flow. When the incoming information is encrypted, the switching means detects it and connects to the encryption / decryption device 6 to descramble (explain) it. To receive. If it is not encrypted, it is detected and the switching means 8 switches to bypass the encryption / decryption device 6 and receive the data as it is.

【0022】なお、オプション機能をして、予め通信相
手先を登録設定しておき、通信毎に先ず相手先を確認し
てから通信を開始するようにしてもよい。この場合には
相手方が登録されていない時には通信を中止する。
The communication partner may be registered and set in advance by using the optional function, and the communication partner may be first confirmed before each communication. In this case, if the other party is not registered, the communication is stopped.

【0023】[0023]

【発明の効果】以上述べたように本発明の情報伝送の機
密漏洩防止装置は、特定ボタンスイッチの押し忘れ等の
操作ミスによる機密漏洩の心配をなくし、機密漏洩防止
の万全を期することができるものである。
As described above, the confidential information leakage prevention device for information transmission according to the present invention eliminates the fear of confidential information leakage due to operation mistakes such as forgetting to press a specific button switch, and ensures complete security leakage prevention. It is possible.

【図面の簡単な説明】[Brief description of drawings]

【図1】本発明の情報伝送の機密漏洩防止装置の1実施
例を示すブロック図である。
FIG. 1 is a block diagram showing an embodiment of a confidential information leakage prevention device for information transmission according to the present invention.

【図2】送信時の動作を示すフロー図である。FIG. 2 is a flowchart showing an operation during transmission.

【図3】着信時の動作を示すフロー図である。FIG. 3 is a flowchart showing an operation when an incoming call arrives.

【図4】暗号化装置、暗号化解読装置の説明図である。FIG. 4 is an explanatory diagram of an encryption device and an encryption decryption device.

【符号の説明】[Explanation of symbols]

1…送受信端末 2…公衆回線網 3,4…インターフェース回路 5…暗号化装置 6…暗号化解読装置 7,8…切換手段 9…CPU 10…記憶装置 11…鍵処理装置 12…暗号鍵/復号鍵 DESCRIPTION OF SYMBOLS 1 ... Transmission / reception terminal 2 ... Public line network 3, 4 ... Interface circuit 5 ... Encryption device 6 ... Encryption / decryption device 7, 8 ... Switching means 9 ... CPU 10 ... Storage device 11 ... Key processing device 12 ... Cryptographic key / decryption key

Claims (1)

【特許請求の範囲】[Claims] 【請求項1】 送受信端末と回線網とを接続する装置と
して、送受信端末からみて送信側のルートには暗号化装
置を設け、受信側のルートには暗号化解読装置を設ける
機密漏洩防止装置において、この暗号化装置の入力側に
常時は暗号化装置へ接続し、特定操作でこの暗号化装置
への接続を解除して暗号化装置をバイパスさせるように
切り換える切換手段を設け、また、暗号化解読装置の入
力側に受ける情報が暗号化されている場合には暗号化解
読装置に接続し、暗号化されていない場合には暗号化解
読装置をバイパスさせるように切り換える切換手段を設
けたことを特徴とする情報伝送の機密漏洩防止装置。
1. A security leakage prevention device, comprising an encryption device provided on a route of a transmission side as seen from the transmission / reception terminal and an encryption decryption device provided on a route of a reception side as a device for connecting a transmission / reception terminal to a network. , The input side of this encryption device is provided with switching means for connecting to the encryption device at all times, and switching to bypass the encryption device by disconnecting the connection to this encryption device by a specific operation. If the information received at the input side of the decryption device is encrypted, it is connected to the encryption decryption device, and if it is not encrypted, switching means is provided to switch to bypass the encryption decryption device. Special information leakage prevention device for information transmission.
JP3252999A 1991-09-03 1991-09-03 Device for preventing leakage of secrecy in information transmission Pending JPH0563681A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP3252999A JPH0563681A (en) 1991-09-03 1991-09-03 Device for preventing leakage of secrecy in information transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP3252999A JPH0563681A (en) 1991-09-03 1991-09-03 Device for preventing leakage of secrecy in information transmission

Publications (1)

Publication Number Publication Date
JPH0563681A true JPH0563681A (en) 1993-03-12

Family

ID=17245082

Family Applications (1)

Application Number Title Priority Date Filing Date
JP3252999A Pending JPH0563681A (en) 1991-09-03 1991-09-03 Device for preventing leakage of secrecy in information transmission

Country Status (1)

Country Link
JP (1) JPH0563681A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001203688A (en) * 2000-01-24 2001-07-27 Kyocera Corp Voice communication terminal
US7539858B2 (en) 2004-04-05 2009-05-26 Nippon Telegraph And Telephone Corporation Packet encryption substituting device, method thereof, and program recording medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61121549A (en) * 1984-11-16 1986-06-09 Sanyo Electric Co Ltd Control circuit for privacy communication device
JPS61270940A (en) * 1985-05-27 1986-12-01 Mitsubishi Electric Corp Cipher communicating equipment
JPH02256343A (en) * 1989-03-29 1990-10-17 Aisin Seiki Co Ltd Privacy communication controller

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61121549A (en) * 1984-11-16 1986-06-09 Sanyo Electric Co Ltd Control circuit for privacy communication device
JPS61270940A (en) * 1985-05-27 1986-12-01 Mitsubishi Electric Corp Cipher communicating equipment
JPH02256343A (en) * 1989-03-29 1990-10-17 Aisin Seiki Co Ltd Privacy communication controller

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001203688A (en) * 2000-01-24 2001-07-27 Kyocera Corp Voice communication terminal
US7539858B2 (en) 2004-04-05 2009-05-26 Nippon Telegraph And Telephone Corporation Packet encryption substituting device, method thereof, and program recording medium

Similar Documents

Publication Publication Date Title
US5241597A (en) Method for recovering from encryption key variable loss
US7113601B2 (en) Method and apparatus for performing secure communications
KR100372495B1 (en) Method and system for securely transferring a data set in a data communications system
US5392355A (en) Secure communication system
US4797672A (en) Voice network security system
JPH07162412A (en) Device for generating enciphered confirmation in telecommunication system and its method
CA2126054A1 (en) Method for point-to-point communications within secure communication systems
EP0018129B1 (en) Method of providing security of data on a communication path
KR100287674B1 (en) Communication method
JPH0563681A (en) Device for preventing leakage of secrecy in information transmission
EP0445290B1 (en) Adaptive data ciphering/deciphering apparatus and data communication system employing said apparatus
WO1991012680A1 (en) Apparatus and method for data communication
JPH07303104A (en) Storage type communication system with ciphering function
JPH07250249A (en) Communication equipment
KR100227790B1 (en) Information sending and receiving method in facsimile communication
JPH05244153A (en) Digital communication equipment
KR100760804B1 (en) Apparatus and Method of protecting Security for User Information
JP2940298B2 (en) Secret communication method
JPH05102960A (en) Cipher communication system
JPH05235933A (en) Terminal equipment identification system
Goode New developments in data and voice security
EP0691766A1 (en) Enciphering of dialing information based on previous verification step
JPH02256343A (en) Privacy communication controller
WO2000056000A1 (en) Encryption device
JPH10336338A (en) Digital encryption speech system using analog telephone line

Legal Events

Date Code Title Description
R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees