JPS6051341A - Cipher control method of communication terminal - Google Patents

Cipher control method of communication terminal

Info

Publication number
JPS6051341A
JPS6051341A JP58159826A JP15982683A JPS6051341A JP S6051341 A JPS6051341 A JP S6051341A JP 58159826 A JP58159826 A JP 58159826A JP 15982683 A JP15982683 A JP 15982683A JP S6051341 A JPS6051341 A JP S6051341A
Authority
JP
Japan
Prior art keywords
terminal
cipher
communication
circuit
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP58159826A
Other languages
Japanese (ja)
Inventor
Teruo Itakura
板倉 輝夫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp, Nippon Electric Co Ltd filed Critical NEC Corp
Priority to JP58159826A priority Critical patent/JPS6051341A/en
Publication of JPS6051341A publication Critical patent/JPS6051341A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

PURPOSE:To prevent the leak of a cipher by updating the cipher at every communication call for every communication destination. CONSTITUTION:When a communication is terminated, a cipher number generating circuit 26 of a terminal 2 is started, and a cipher is generated by, for example, rangom numbers and is sent to a terminal number cipher storage circuit 24. This circuit 24 updates contents of a memory corresponding to a destination terminal 1, with which a terminal 2 comunicates just before the communication is terminated, to said generated cipher. This new cipher is sent to the destination terminal 1 through a cipher transmitting circuit 27. Consequently, the new cipher is used for the next communication between terminals 1 and 2. Thus, even if the cipher used in the preceding communication is deciphered, communication contents are not leaked because another new cipher is used for communication.

Description

【発明の詳細な説明】 この発明は一般公衆通信網に接続される端末装置に適用
される通信端末暗号制御方法に関するものである。
DETAILED DESCRIPTION OF THE INVENTION The present invention relates to a communication terminal encryption control method applied to a terminal device connected to a general public communication network.

近年、データ通信やファクシミリ通信等において、人間
が介在しなくても端末同志が一般公衆通信網内で接続さ
れ通信を行々うものが増加している。この様な通信で通
信内容の秘密を守る必要がある場合には、暗号を定めて
通信開始時に確認する等の方法が取られる。しかし、こ
の方法は何等かの手段で暗号が漏れた場合には端末内の
暗号メモリを全て更新する必要があシ、また漏れたこと
に気が付かなければ通信内容も漏れ大きな損失を得るこ
とになるという欠点があった。
In recent years, in data communications, facsimile communications, and the like, an increasing number of terminals are connected within a general public communication network and communicate with each other without human intervention. If it is necessary to protect the confidentiality of the communication contents in such communication, a method such as determining a code and confirming it at the start of communication is taken. However, with this method, if the encryption is leaked by some means, it is necessary to update all the encryption memory in the terminal, and if the leak is not noticed, the communication contents will also be leaked and you will suffer a big loss. There was a drawback.

したがってこの発明の目的は暗号が容易に他の者に漏れ
ることがない通信端末暗号制御方法を提供することにあ
る。
Therefore, an object of the present invention is to provide a communication terminal encryption control method that prevents encryption from being easily leaked to others.

とのような目的を達成するためにとの発明は、通信端末
に自己の端末番号を送出する機能回路と相手端末番号を
受信する機能回路を設け、通信毎に相互に次の通信の暗
号を定め、その暗号を同じ相手端末と次に通信するまで
記憶し、通信開始時に相手よシ送出された端末番号と暗
号について自己が記憶している相手端末側暗号とを照合
するようにしたものである。以下、実施例を示す図面を
用いてこの発明の詳細な説明する。
In order to achieve the above object, the invention provides a communication terminal with a functional circuit that sends its own terminal number and a functional circuit that receives the other party's terminal number. It is designed to store the code until the next communication with the same terminal, and to check the terminal number sent by the other party at the start of communication with the code stored in the other party's terminal. be. Hereinafter, the present invention will be described in detail using drawings showing embodiments.

図はこの発明の方法を適用して構成した端末装置の一実
施例を示すブロック図である。1および2は端末装置で
あシ、これらは一般公衆通信網りを介して接続されてい
る。
The figure is a block diagram showing an embodiment of a terminal device constructed by applying the method of the present invention. 1 and 2 are terminal devices, which are connected via a general public communication network.

今、端末1が発呼動作を行なうと網制御回路11を起動
する。網制御回路11は、一般公衆通信網りを起動する
ので一般公衆通信網りは端末1と2を接続する。端末2
が接続されると網制御回路21が起動され端末1と端末
2は通信可能となる。端末1の端末番号送出回路12は
端末1の端末番号を送出し、この番号を端末2の端末番
号受信回路22が受信する。次に端末1の暗号送出回路
13は端末番号別暗号記憶回路14より端末2に相当す
る暗号を抽出して端末2に送出するので、その暗号は暗
号受信回路23で受信される。一方、端末番号受信回路
22は端末番号別暗号記憶回路24に受信端末番号(こ
こでは端末1の番号)を送シ端末1に相当する暗号番号
を抽出する。その後、暗号チェック回路25は端末1よ
り受信した暗号と端末番号別記憶回路24よシ抽出した
暗号とを照合し、一致すれば通常の通信を開始する。
Now, when the terminal 1 performs a calling operation, the network control circuit 11 is activated. Since the network control circuit 11 activates the general public communication network, the general public communication network connects the terminals 1 and 2. Terminal 2
When the terminals 1 and 2 are connected, the network control circuit 21 is activated and the terminals 1 and 2 are able to communicate. The terminal number sending circuit 12 of the terminal 1 sends out the terminal number of the terminal 1, and the terminal number receiving circuit 22 of the terminal 2 receives this number. Next, the cipher sending circuit 13 of the terminal 1 extracts the cipher corresponding to the terminal 2 from the terminal number-based cipher storage circuit 14 and sends it to the terminal 2, so that the cipher is received by the cipher receiving circuit 23. On the other hand, the terminal number receiving circuit 22 sends the receiving terminal number (in this case, the number of terminal 1) to the terminal number-specific code storage circuit 24 and extracts the code number corresponding to the terminal 1. Thereafter, the code check circuit 25 compares the code received from the terminal 1 with the code extracted by the terminal number storage circuit 24, and if they match, normal communication is started.

通信が終了するときには暗号番号発生回路26が起動さ
れ、例えば乱数によって暗号を発生させその暗号を端末
番号別暗号記憶回路24に送る。
When the communication ends, the code number generation circuit 26 is activated, generates a code using, for example, random numbers, and sends the code to the code storage circuit 24 for each terminal number.

そして端末番号別暗号記憶回路24は端末1に相当する
メモリを暗号番号発生回路26で発生した新しい暗号に
更新する。この暗号番号発生回路26は暗号送出回路2
7を通して新しい暗号を端末1に送る。暗号受信回路1
5は新しい暗号を受信して端末番号別暗号記憶回路14
の端末2に対応するメモリを新しい暗号に更新する。そ
の後、端末1と端末2間の接続は開放される。
Then, the terminal number-specific code storage circuit 24 updates the memory corresponding to the terminal 1 with the new code generated by the code number generation circuit 26. This code number generation circuit 26 is the code sending circuit 2.
7 to send the new cipher to terminal 1. Encryption receiving circuit 1
5 receives a new code and stores the code by terminal number circuit 14;
The memory corresponding to terminal 2 is updated to the new code. Thereafter, the connection between terminal 1 and terminal 2 is released.

々お端末1において、16は端末番号受信回路、1Tは
暗号チェック回路、18は暗号番号発生回路であシ、端
末2において2Bは端末番号送出回路であって、端末1
,2は相互に暗号および端末番号の送受信が行なえるよ
うに力っている。
In terminal 1, 16 is a terminal number receiving circuit, 1T is a code check circuit, 18 is a code number generation circuit, and in terminal 2, 2B is a terminal number sending circuit.
, 2 enable mutual transmission and reception of codes and terminal numbers.

この発明は以上説明したように、通信相手刈に1通信呼
毎に暗号を更新するようにしたので、暗号の漏洩を防ぎ
、通信の秘密の保持が行なえるという効果がある。
As explained above, this invention has the effect of updating the encryption code for each communication call to the communication partner, thereby preventing leakage of the encryption code and maintaining the confidentiality of communication.

【図面の簡単な説明】[Brief explanation of drawings]

図はこの発明を適用して構成した端末装置の一実施例を
示すブロック図である。 1.2・・e・端末装置、11,12@・―・網制御回
路、12,28・・・・端末番号送出回路、13,27
・・・・暗号送出回路、14,24・・・・端末番号別
暗号記憶回路、15.23・・・・暗号受信回路、16
.22−・・・端末番号受信回路、17,25・e・・
暗号チェック回路、18,26・・・・暗号番号発生回
路。
The figure is a block diagram showing an embodiment of a terminal device configured to apply the present invention. 1.2... e terminal device, 11, 12 @ -- network control circuit, 12, 28... terminal number sending circuit, 13, 27
...Cipher sending circuit, 14, 24...Cipher storage circuit for each terminal number, 15.23...Cipher receiving circuit, 16
.. 22-...terminal number receiving circuit, 17,25・e...
Encryption check circuit, 18, 26... Encryption number generation circuit.

Claims (1)

【特許請求の範囲】[Claims] 通信終了時に端末局の一方で新たた暗号を発生してその
暗号および通信していた端末局番号を自局および相手局
で記憶し、次回の通信時に相手局の端末番号および暗号
の一致したことを検出したときに通信が行なえるように
した通信端末暗号制御方法。
At the end of communication, a new code is generated on one side of the terminal station, and the code and the terminal station number with which the communication was made are memorized by both the local station and the other station, so that the terminal number and code of the other station match at the next communication. A communication terminal cryptographic control method that allows communication to occur when an error is detected.
JP58159826A 1983-08-31 1983-08-31 Cipher control method of communication terminal Pending JPS6051341A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP58159826A JPS6051341A (en) 1983-08-31 1983-08-31 Cipher control method of communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP58159826A JPS6051341A (en) 1983-08-31 1983-08-31 Cipher control method of communication terminal

Publications (1)

Publication Number Publication Date
JPS6051341A true JPS6051341A (en) 1985-03-22

Family

ID=15702090

Family Applications (1)

Application Number Title Priority Date Filing Date
JP58159826A Pending JPS6051341A (en) 1983-08-31 1983-08-31 Cipher control method of communication terminal

Country Status (1)

Country Link
JP (1) JPS6051341A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61279966A (en) * 1985-06-05 1986-12-10 Hitachi Ltd System for preventing erroneous connection of terminal equipment
JPS6352536A (en) * 1986-08-22 1988-03-05 Nippon Telegr & Teleph Corp <Ntt> Distribution system for shared cryptography key
JPS6369365A (en) * 1986-09-11 1988-03-29 Mitsubishi Electric Corp Telecontrol equipment
JPS6370654A (en) * 1986-09-12 1988-03-30 Mitsubishi Electric Corp Telecontrol device
JPH04196663A (en) * 1990-11-26 1992-07-16 Oki Electric Ind Co Ltd Method of mobil object communication

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61279966A (en) * 1985-06-05 1986-12-10 Hitachi Ltd System for preventing erroneous connection of terminal equipment
JPS6352536A (en) * 1986-08-22 1988-03-05 Nippon Telegr & Teleph Corp <Ntt> Distribution system for shared cryptography key
JPH0815272B2 (en) * 1986-08-22 1996-02-14 日本電信電話株式会社 Shared encryption key delivery method
JPS6369365A (en) * 1986-09-11 1988-03-29 Mitsubishi Electric Corp Telecontrol equipment
JPS6370654A (en) * 1986-09-12 1988-03-30 Mitsubishi Electric Corp Telecontrol device
JPH04196663A (en) * 1990-11-26 1992-07-16 Oki Electric Ind Co Ltd Method of mobil object communication

Similar Documents

Publication Publication Date Title
US6047066A (en) Communication method and device
US5216715A (en) Key distribution in public communication networks taking account of security gradations
US6925568B1 (en) Method and system for the processing of messages in a telecommunication system
CN100568800C (en) The system and method that is used for safety remote access
US5613214A (en) Mobile communication terminal authenticating system
EP1024630A2 (en) A secure electronic mail system
KR100449109B1 (en) Preventing shortened lifetimes of security keys in a wireless communication security system
EP1048181B1 (en) Procedure and system for the processing of messages in a telecommunication system
EP0658021A1 (en) A method and system for key distribution and authentication in a data communication network
EP0998080A2 (en) Method for securing over-the-air communication in a wireless system
JP2004048738A (en) Messaging method in communication system
CN1202060A (en) Method for enabling direct encrypted communication between two terminals of mobile radio network, and corresponding station and terminal facilities
JP2012110009A (en) Methods and arrangements for secure linking of entity authentication and ciphering key generation
KR20030019356A (en) Secure dynamic link allocation system for mobile data communication
BRPI0107925B1 (en) method and system to verify data integrity, and mobile terminal
MXPA96006339A (en) Communication method and device
JP4536934B2 (en) Authentication method for cellular communication system
KR20010051049A (en) Authentication method for establishing connection between devices
JPH10215488A (en) Host access method in mobile radio system
FI112315B (en) Integrity protection method for radio network signaling
JPS6051341A (en) Cipher control method of communication terminal
CN106302698B (en) The method and system of order business
CN113709088A (en) Data transmission method, device, equipment and storage medium based on wearable equipment
KR100538891B1 (en) Cordless telecommunications system and identification code modification process
CN117119449B (en) Vehicle cloud safety communication method and system