JPS59122039A - Secret communication control system - Google Patents

Secret communication control system

Info

Publication number
JPS59122039A
JPS59122039A JP21188582A JP21188582A JPS59122039A JP S59122039 A JPS59122039 A JP S59122039A JP 21188582 A JP21188582 A JP 21188582A JP 21188582 A JP21188582 A JP 21188582A JP S59122039 A JPS59122039 A JP S59122039A
Authority
JP
Japan
Prior art keywords
secret
terminal
connection
call
voice signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP21188582A
Other languages
Japanese (ja)
Inventor
Kohei Uchida
耕平 内田
Seietsu Sakamoto
坂本 征悦
Hiroshi Ochiai
博 落合
Hiroshi Maruyama
浩 丸山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP21188582A priority Critical patent/JPS59122039A/en
Publication of JPS59122039A publication Critical patent/JPS59122039A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Interface Circuits In Exchanges (AREA)

Abstract

PURPOSE:To utilize a secret service function effectively for secret communication by making a normal local connection for mutual connection between secret terminals, and making the connection to a local trunk where a secret device is connected when only one terminal has the secret service function. CONSTITUTION:A voice signal from a terminal E having the secret service function is modulated by the secret device SC6 into a secret voice signal, which is sent out to the opposite secret device SC7 through the link L4 of the network NW2 of a switchboard and the link L5 of the local trunk IOT2. This device SC7 demodulates and sends the secret voice signal to a terminal F. When communicating with a terminal G which has not the secret service function, the local trunk IOT2 controls a switching circuit CONN to connect the local trunk IOT2 to a secret device SC8. Then, a voice signal passed by the device SC8 is modulated into a secret signal or demodulated reversely and sent to the links L4 and L6 to offer the secret service.

Description

【発明の詳細な説明】 (1ン 発明の技術分野 本発明は、秘り機能を有する端末回線と秘匿機能のない
電話機端末回線を接続する交換機において、秘匿回線相
互、又は秘匿回線と一般回線の秘匿通話接続を行なう秘
匿通話制御方式に関するものである。
Detailed Description of the Invention (1) Technical Field of the Invention The present invention relates to an exchange that connects a terminal line with a secure function and a telephone terminal line without a secure function. This invention relates to a secret call control system for making secret call connections.

(2)技術の背景 近年通信回線の途中にて通話の盗聴とか、銀行等のオン
ライン専用線の途中からデータを抜き取って暗号符号を
解読される等の被害が多発しており、社会問題になって
きている0そのために各穐秘匿装置が開発され実用に供
され始めているが、コストがかかり、なかなか普及状態
にまでは至っていないのが実情である。
(2) Background of the technology In recent years, damage such as wiretapping of telephone calls in the middle of communication lines, data being extracted from the middle of online private lines of banks, etc., and encryption codes being decoded has been occurring frequently, and this has become a social problem. For this purpose, various concealment devices have been developed and put into practical use, but the reality is that they are costly and have not yet become widespread.

(3)従来技術と問題点 第1図に、従来性なわれている秘匿通話方式を示す。秘
匿機能を有する加入者Aが被呼者Bと通話する場合、加
入者Aの音声信号は秘匿装置SCOによって秘匿信号に
よる変調が加えられ、秘匿音声信号として秘匿装置SC
Iに送出される0秘匿装置SC1は、秘匿音声信号を音
声信号に復調し、ネットワークNWO−リンクLl−自
局内トランクIoTo−リンクL2を経由して、被呼者
Bに送出する。一方扱呼者Bの音声信号は、8匿装置S
CIによって秘匿音声信号として秘匿装置SCoに送出
する。秘匿装置SCOは、音声(N号に復調し、発呼者
Aに送出し、加入者A、Bの自局内相及通話を行なう。
(3) Prior Art and Problems FIG. 1 shows a conventional secret call system. When subscriber A, who has a concealment function, makes a call to called party B, the voice signal of subscriber A is modulated by a concealment signal by the concealment device SCO, and sent to the concealment device SC as a concealment voice signal.
The 0 secrecy device SC1 sent to I demodulates the secrecy audio signal into an audio signal and sends it to the called party B via the network NWO - link Ll - intra-office trunk IoTo - link L2. On the other hand, the voice signal of caller B is
The CI sends it as a secret audio signal to the secret device SCo. The secret device SCO demodulates the voice (N code) and sends it to the calling party A, and performs intra-office mutual communication between subscribers A and B.

第2図に秘匿回線相互の接続を示す。Figure 2 shows the connections between the secret lines.

秘匿加入者Cの音声信号は、秘匿装置SC2にょp秘匿
音声信号に変調し、秘匿装置SC3に送出される。秘匿
装置SC3は、音声信号に復調しネットワークNWIの
リンクL2−自局内トランク■uT1−リンクL3を通
し、秘匿装置SC5に送出する。
The voice signal of the secret subscriber C is modulated into a secret voice signal by the secret device SC2 and sent to the secret device SC3. The secret device SC3 demodulates the voice signal and sends it to the secret device SC5 through the link L2 of the network NWI - the intra-office trunk uT1 - the link L3.

秘匿装置SC5は再び秘匿音声信号に変調し、秘匿装置
SC4に送出する。秘匿装置SC4は、再び音声信号に
復調して、被呼者りに送出する〇被呼者りの音声信号は
、上記逆の変可復調を行ない、発呼者C′に送出される
。本接続においては、秘匿信号の変調、復調がそれぞれ
、2回行なわれるため、通話の信号品質が非常に劣下し
、秘匿加入届相互の通話は、実用に供しないものとなっ
た。
The secret device SC5 modulates the secret audio signal again and sends it to the secret device SC4. The secret device SC4 demodulates the voice signal again and sends it to the called party. The voice signal of the called party undergoes the reverse variable demodulation described above and is sent to the calling party C'. In this connection, since the secret signal is modulated and demodulated twice each, the signal quality of the call is extremely poor, making the call between the secret subscribers unusable.

(4ン 発明の目的 本発明の目的は、秘匿機能を有する端末相互の8匿通話
を可能とし、秘匿機能を有する端末と秘匿機能を有しな
い端末が接続される交換機において、秘匿機能を有効に
オリ用し、秘匿通話を行なう秘匿通話制御方式を提供す
ることにある。
(4) Purpose of the Invention An object of the present invention is to enable anonymous calls between terminals with a security function, and to effectively use the security function in an exchange to which a terminal with a security function and a terminal without a security function are connected. An object of the present invention is to provide a secret call control method for conducting secret calls using a private phone.

(5)発明の構成 秘匿通話機能を有する同級端末を収容した電話交換機に
おいて、秘匿回線を端末相互間の接続であれは通常の自
局出接続を行ない、回線端末の一方のみ秘匿通話機能を
Mする接続の場合は自局内トランクを秘匿装置に接続し
、秘匿通話接続を行うことを%像とする秘匿通話制御方
式、又は秘匿画に通話機能を有する回線端末を収容した
tNLN交話機において、秘匿端末相互間の接続であれ
ば通常の自局出接続を行ない、端末の一方のみ秘匿通話
機能を有する接続の場合は秘匿装置の直結した自局内ト
ランクに接続し、秘匿通話接続を行うこと¥il:%歓
とする秘匿通話制御方式を提供することによって達成さ
れる。
(5) Structure of the Invention In a telephone exchange that accommodates terminals of the same class that have a secure call function, the secure line is connected between the terminals using a normal own-station connection, and only one of the line terminals has the secure call function. In the case of a connection in which a trunk within the own office is connected to a secret device and a secret call connection is made, a secret call control method is used, or a tNLN intercom that houses a line terminal with a call function in the secret picture is used to perform a secret call control method. If the connection is between terminals, use a normal outgoing connection from your own station, but if only one of the terminals has a secure call function, connect to the trunk within your own station that is directly connected to the concealed device to establish a secure call connection. : This is achieved by providing a secret call control method that provides 100% security.

(6ン 発明の実施例 第3図に、本発明の一実施例を示し、詳細に説明する。(6) Examples of the invention An embodiment of the present invention is shown in FIG. 3 and will be described in detail.

本発明は、秘匿機能を有する端末相互間lp の接続において、秘匿装置による〃号の変可後脚を1回
のみ行なうことを考慮したものであり、さらに秘tha
t能を有する端末と秘匿機能のない端末相互についても
、可能なかぎり秘匿機能を活用する秘匿通話接続を提供
するものである。秘匿機能を有する端末Eの音声信号は
、秘匿装置SC6により秘匿音声信号に変調されネット
ワーク1”JW2のリンクL4−IiAT2−リンクL
5を紅白して、秘匿装置SC7に送出される。秘匿装置
SC7は、秘匿音声信号を音声信号に復調し端末Fに送
出する0端末Fの音声は、上記のルートを逆に通り端末
Eに送出される。端末Eが、秘匿機能のない端末Gと通
話する場合は、切替回路C0NNを制御して自局内トラ
ンクl0T2と秘匿装置SC8を接続し、自局内トラン
クの中を通過するときに秘匿信号の変調、後脚を行なう
。第4囚は本発明にJる秘匿通話制御方式の具体的構成
図であるリレーSは、秘匿端末と一般内線が通話する場
合に動作し、秘匿装置を経由する通話を行なう。リレー
Cは、一般内線から秘匿端末を呼び出し通話する際に動
作するリレーである。秘匿端末から秘匿端末への通話は
、秘匿音声信号のまま、自局内トランクを通すため、秘
匿装置への接続リレーSを動作させない。秘匿端末から
一般電話機への通話は、sリレーのみを動作させ発呼側
の秘匿端末t−秘匿装置の秘匿音声信号側に接続し、被
呼側の一般電話機は、秘匿装置の音声信号側に接続する
。一般電話機から秘匿端末への通話は、sリレーとcリ
レーを動作はせ、それぞれが対応する秘匿装置の信号側
に接続する。第5図は本発明の他の実施例を示す。本例
は、自局内トランクのうち一部の自局内トランクのみ秘
匿装置を具備する方式である。自局内接続時に発呼、被
呼の加入者クラスによって秘匿端末と一般電話機との通
話であることを識別すると、上記秘匿装置を具備した自
局内トランク換機では従来からその識別機能を有してい
るため、本発明′f1:実施するためK特に新しい技術
を要はない0交換FAは秘匿端末から一般@話機、一般
一話4μから秘匿端末のいずれの接続であるかを職別し
、自局内トランクの発呼、被呼の口をそれぞれの端末に
、対応した信号方式に接続すれは、前述のS。
The present invention takes into consideration the fact that the variable rear leg of the symbol 〇 is performed only once by the concealing device in the connection of LP between terminals having a concealing function, and furthermore, the
The present invention also provides a secure communication connection between a terminal with a security function and a terminal without a security function, making use of the security function as much as possible. The voice signal of the terminal E having the concealment function is modulated into a concealed voice signal by the concealment device SC6 and is sent to the link L4-IiAT2-link L of the network 1''JW2.
5 is made red and white and sent to the secret device SC7. The secret device SC7 demodulates the secret audio signal into an audio signal and sends it to the terminal F.The audio from the terminal F is sent to the terminal E through the above route in reverse. When terminal E makes a call to terminal G that does not have a security function, it controls the switching circuit C0NN to connect the internal trunk L0T2 and the security device SC8, and modulates the confidential signal when passing through the internal trunk. Do the hind legs. The fourth figure is a concrete block diagram of the secret call control method according to the present invention.Relay S operates when a secret terminal and a general extension line communicate, and the call is made via the secret device. Relay C is a relay that operates when calling a secret terminal from a general extension line and making a call. Since a call from a secret terminal to a secret terminal is passed through the trunk within the own office as a secret voice signal, the connection relay S to the secret device is not operated. For a call from a hidden terminal to a regular telephone, only the s relay is activated and the calling party's hidden terminal is connected to the hidden voice signal side of the concealed device.The called party's regular telephone is connected to the voice signal side of the concealed device. Connecting. When making a call from a general telephone to a secret terminal, the s relay and c relay are activated, and each is connected to the signal side of the corresponding secret device. FIG. 5 shows another embodiment of the invention. In this example, only some of the trunks within the local office are equipped with a concealment device. When connecting within the local office, it is possible to identify whether the call is between a hidden terminal and a regular telephone based on the subscriber class of the caller or the called party. Therefore, the present invention'f1: No new technology is required to implement the invention.The exchange FA identifies whether the connection is from a hidden terminal to a general @phone, or from a general talk 4μ to a hidden terminal, and automatically To connect the in-office trunk calling and called ports to each terminal and the corresponding signaling system, use S mentioned above.

C/ リレーの制御が不安になる。C/ Relay control becomes uneasy.

(7)発明の効果 本発明によれは、秘1回線相互の通話が可能となるばか
ジでなく、秘匿通話のトラヒック分に相轟する秘匿装置
を設備するだりでよいため、きわめて経済的な秘匿通話
システムを構築できるといった効果は大なるものである
(7) Effects of the Invention According to the present invention, it is not only possible to make calls between two secret lines, but it is also possible to install a secret device that responds to the traffic of secret calls, which is extremely economical. The effect of being able to construct a secret call system is great.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は従来の秘匿通話方式の構成図、第2図は従来の
秘匿通話方式の他の構成図、第3図は本発明による秘匿
通話方式の実施例としての構成図、第4図は第3図の具
体的構成図、第5図は本発明の秘匿通話方式の他の構成
図である。図面において、SCO〜5C11は秘匿装置
、A−Jは加入者(端末)、NWO−NW3はネットワ
ーク、L1〜LIOは接続リンク、l0TO〜l0T4
は自局内トランクをそれぞれ示す。
FIG. 1 is a block diagram of a conventional secret call system, FIG. 2 is another block diagram of the conventional secret call system, FIG. 3 is a block diagram of an embodiment of the secure call system according to the present invention, and FIG. 4 is a block diagram of a conventional secret call system. FIG. 3 is a specific configuration diagram, and FIG. 5 is another configuration diagram of the secure communication system of the present invention. In the drawing, SCO to 5C11 are hidden devices, A to J are subscribers (terminals), NWO to NW3 are networks, L1 to LIO are connection links, and l0TO to l0T4.
indicates the trunk within the local station.

Claims (2)

【特許請求の範囲】[Claims] (1)秘匿通話機能を有する回線′端末を収容した電秘
匿通話機能金有する接続の場合は自局内トラン。 りを秘匿装置に接続し、秘匿通話接続を行うことを特徴
とする秘匿通話制御方式。
(1) In the case of a connection with a line with a secret call function that accommodates a terminal with a secret call function, it is transcribed within the own station. A secret call control method characterized in that a secret call is connected to a secret device to establish a secret call connection.
(2)秘匿通話機能を有する回線端末を収容した通話交
換機において、秘匿回線端末相互間の接続であれば通常
の自局内接続を行ない、回線端末の一方のみ秘匿通話機
能を有する接続の場合は秘匿装置の直結した自局内トラ
ンクに接続し、秘匿通話接続を行うことを特徴とする秘
匿通話制御方式。
(2) In a telephone switchboard that accommodates line terminals with a secure call function, if the connection is between two confidential line terminals, a normal internal connection is performed, and if only one of the line terminals has a secure call function, the connection is confidential. A secret call control method characterized by connecting to a trunk within the own office that is directly connected to the device and performing a secret call connection.
JP21188582A 1982-12-02 1982-12-02 Secret communication control system Pending JPS59122039A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP21188582A JPS59122039A (en) 1982-12-02 1982-12-02 Secret communication control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP21188582A JPS59122039A (en) 1982-12-02 1982-12-02 Secret communication control system

Publications (1)

Publication Number Publication Date
JPS59122039A true JPS59122039A (en) 1984-07-14

Family

ID=16613235

Family Applications (1)

Application Number Title Priority Date Filing Date
JP21188582A Pending JPS59122039A (en) 1982-12-02 1982-12-02 Secret communication control system

Country Status (1)

Country Link
JP (1) JPS59122039A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5769941A (en) * 1980-10-21 1982-04-30 Nec Corp Mobile communication exchange system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5769941A (en) * 1980-10-21 1982-04-30 Nec Corp Mobile communication exchange system

Similar Documents

Publication Publication Date Title
US4196317A (en) Telephone intercom system
US6275573B1 (en) System and method for secured network access
KR950035234A (en) How to set up a modem device and voice call
JPH02311065A (en) Independent career circuit service system
DE69636988D1 (en) METHOD AND DEVICE FOR IMPLEMENTING A COMPUTER NETWORK / INTERNET REMOTE INTERCOM SYSTEM
FI20001162A (en) Aces Zion System
WO1998010573A3 (en) System and method for providing user connectivity to a remote data site
CN105306744B (en) Method and extension set conversion equipment and telephone switching system of the wireless terminal as extension set
JPS59122039A (en) Secret communication control system
KR100608811B1 (en) Signal processing system and structure of mobile communication device for triple-call
JP2625460B2 (en) Method of specifying call route in telephone exchange system
JPH02192254A (en) Telephone set with voice quality selecting function
JPH11331271A (en) Internet telephone gateway device
JPH0156584B2 (en)
JPS63198454A (en) Digital telephone set
JPH01245656A (en) Privacy telephone trunk line connection system
JPS5974744A (en) Privacy communication system
JP2756487B2 (en) Conference calling method
JPS61125268A (en) Individual telephone number system
JPH0832693A (en) Providing method for interception preventive service
SE9803174L (en) telecommunication systems
NO984317L (en) Telephone network-connected terminal for selective processing of dialing signals
JPS6046695A (en) Connection system for data call
JPH01218252A (en) Broad band exchange
JPH06104983A (en) Method for adjusting speech loss in communication line