JPS62264739A - Privacy call device - Google Patents

Privacy call device

Info

Publication number
JPS62264739A
JPS62264739A JP10829986A JP10829986A JPS62264739A JP S62264739 A JPS62264739 A JP S62264739A JP 10829986 A JP10829986 A JP 10829986A JP 10829986 A JP10829986 A JP 10829986A JP S62264739 A JPS62264739 A JP S62264739A
Authority
JP
Japan
Prior art keywords
frequency
secret
carrier frequency
audio
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP10829986A
Other languages
Japanese (ja)
Other versions
JPH0666758B2 (en
Inventor
Minoru Suzuki
稔 鈴木
Koji Akiyama
秋山 好司
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yaesu Musen Co Ltd
Original Assignee
Yaesu Musen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yaesu Musen Co Ltd filed Critical Yaesu Musen Co Ltd
Priority to JP61108299A priority Critical patent/JPH0666758B2/en
Publication of JPS62264739A publication Critical patent/JPS62264739A/en
Publication of JPH0666758B2 publication Critical patent/JPH0666758B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

PURPOSE:To realize the sophisticated privacy call system with simple constitution by sending 4-kind of pattern states in time division according to a privacy call key in the preset order and decoding the state at the reception side according to the order of the sake privacy call key as that of the sending side. CONSTITUTION:A voice signal from a microphone and the 1st carrier are added to the 1st BM1, and both side bands of its output are given to a BPF, an SSB wave is extracted, it and the 2nd carrier are fed to the 2nd BM and a privacy call pattern whose voice spectrum is modified is obtained at its output. The received privacy call signal is given to a balanced m demodulator (BD), from which both side bands are obtained, the result is iven to the BPF to form an SSB signal, which is demodulated by the 2nd BD to reproduce the voice signal. The 2nd carrier frequency is controlled by using a CPU from the 4-kind of privacy signal patterns.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 この発明は有琢と無線を問わず、音声を電気信号にして
通話する通信形式において、第3者による盗聴を防止す
るための秘話装置に関するものである。
[Detailed Description of the Invention] [Field of Industrial Application] The present invention relates to a confidential communication device for preventing eavesdropping by a third party in a communication format in which voice is converted into an electrical signal, whether it is a telephone or wireless communication. It is something.

〔従来技術と問題点〕[Conventional technology and problems]

音声の電気信号による通話においては、基本的には送話
側ではフィクロホンにより音波の強弱を電気量の大小に
直して、電線を通すか電波を変調して送出し、受話側で
は変調波は復調して音声信号にもどして、スピーカによ
り音波振動に直して受話するものである。従って有線通
信では通話線に受話装置を結合することにより、また無
線通信では受信電波を送話側と同じ変調形式の復調を行
うことにより、容易に通話内容t−聞くことが可能であ
り、このことは放送無線およびアマチュア無線を除く一
般電気通信にとっては望ましく彦いことである。そこで
重要な通話回線には第3者による傍聴を防止するための
秘話方式が採用され、最近ではデジタル信号化方式が多
く開発されているが、ここでは本発明に開運のあるアナ
ログ信号方式のみにつき述べる。
When making a call using electrical audio signals, basically the transmitting side uses a phycrophone to convert the strength of the sound waves into the magnitude of electricity, and sends it out by passing it through an electric wire or modulating the radio waves, and on the receiving side, the modulated waves are demodulated. The system converts the signal back into an audio signal, converts it into sonic vibration through a speaker, and receives the call. Therefore, in wired communication, it is possible to easily listen to the contents of a call by connecting a receiving device to the telephone line, and in wireless communication, by demodulating the received radio waves in the same modulation format as that of the transmitter. This is desirable for general telecommunications, excluding broadcast radio and amateur radio. Therefore, a confidential communication system is adopted for important communication lines to prevent eavesdropping by third parties, and recently many digital signaling systems have been developed, but here we will discuss only the analog signaling system that has the advantage of this invention. state

アナログ信号の秘話方式の基本は音波スペクトラムを変
形することにより傍聴者の了解を不可能とするにあり、
その方法としては音声スペクトラムパターンの周波数シ
フト、周波数反転、周波数帯の分割入れ替え等があるが
、これだけでは内容を理解できる程度の復元は比較的容
易であるので、上記各種のパターンを組み合わせて時分
割で送出する方法がある。これでは何個の・ぐターンの
復元は出来ても送出パターンの順序が判らなければ全体
の復元が出来力いから秘話性は極めて高く々る。
The basis of the confidential communication method for analog signals is to make it impossible for listeners to understand by changing the sound wave spectrum.
Methods for this include frequency shifting, frequency inversion, and division and replacement of frequency bands in the audio spectrum pattern, but since it is relatively easy to restore the content to an understandable level using only these methods, time-division There is a way to send it. In this case, even if it is possible to reconstruct a number of patterns, if the order of the sending patterns is not known, it will be impossible to reconstruct the whole, so the confidentiality is extremely high.

そのために送受話者間では同一に設定するパターンの順
序を秘話キーと称し、さらに受話側秘話キーの動作のタ
イミングを送話側と同一に保つために送話の開始時に同
期信号全発生し、同期信号の終了と同時に秘話キーの第
1パターンが動作するというのが普通である。
For this reason, the order of patterns that are set to be the same between the transmitter and the receiver is called a secret key, and in order to keep the operation timing of the secret key on the receiver side the same as that on the transmitter side, all synchronization signals are generated at the start of transmission. Usually, the first pattern of the secret key is activated at the same time as the synchronization signal ends.

無線通信あるいは搬送通信においては、特殊の変調形式
による秘話がある。例えばSSB波は通常のAM受信機
では了解できないため、初期には一種の秘話方式とされ
たが、検波にBFOキャリアを注入することにより復調
できるので、キャリア周波数を周期的に変動するウオブ
リングを加えた秘話方式は長らく国際電話通信に使用さ
れていたものである。ただこの程度の秘話は現在では比
較的容易に復調が可能であり、乱数的秘話キ一方式が必
要となるが、SSB波の発生および復調の技術は本発明
の秘話装置の構成に重要力関係があるので以下にSSB
波の発生および復調方法につき述べる。
In wireless communication or carrier communication, there are secrets due to special modulation formats. For example, since SSB waves cannot be understood by ordinary AM receivers, they were initially considered a type of secret communication method, but since they can be demodulated by injecting a BFO carrier into the detection, wobbling, which periodically fluctuates the carrier frequency, can be used for demodulation. The confidential telephone system was used for a long time in international telephone communications. However, this level of secret speech can be demodulated relatively easily at present, and a random number secret speech key method is required. However, the technology for generating and demodulating SSB waves is an important factor in the configuration of the secret speech device of the present invention. There is SSB below
This section describes wave generation and demodulation methods.

SSBは詳しくはSingle 5ide Band 
5uppresedCarrierの略であり、通常の
振幅変調波からキャリアを除去し、上下側帯波のいづれ
か一方のみを取り出したものである。その発生方式は3
種あるが最も実用的なのは第3図のフィルタ方式である
For details on SSB, see Single 5ide Band
It is an abbreviation for 5uppressed Carrier, and is obtained by removing the carrier from a normal amplitude modulated wave and extracting only one of the upper and lower sideband waves. The generation method is 3
Although there are various methods, the most practical one is the filter method shown in FIG.

図において音声信号とキャリアとを平衡変調器(以下に
はBMと略記する)に加えるとその出力はキャリアt−
20dB程度抑圧された振幅変調波であり、これを帯域
フィルタ(以下にはBPFと略記する)を通して上下の
いづれか一方の側帯波のみを取り出し、キャリアもさら
に20dB程度抑圧される。このようにして作られた側
帯波(SSB)は音声のスペクトラム配列は元の音声と
全く同一であるが、周波数はキャリア周波数に士の関係
であるので単にエンベロープ検波をしただけでは音声と
して復調されず、キャリアを加えてプロダクト検波をす
ることにより元の音声が復元されるのである。その際に
加えるキャリア周波数が元の周波数より側帯波に近けれ
ば復調音は低いピッチとカリ、逆に遠ければ高いピッチ
とカシ、その差が100 Hzを越すと了解が困難と力
ることはSSB波の受信時に経験するところである。
In the figure, when an audio signal and a carrier are applied to a balanced modulator (hereinafter abbreviated as BM), the output is the carrier t-
This is an amplitude modulated wave that has been suppressed by about 20 dB, and only one of the upper and lower sidebands is extracted through a bandpass filter (hereinafter abbreviated as BPF), and the carrier is also suppressed by about 20 dB. The sideband waves (SSB) created in this way have exactly the same spectral array as the original audio, but the frequency is related to the carrier frequency, so it cannot be demodulated as audio by simply performing envelope detection. First, the original audio is restored by adding a carrier and performing product detection. If the carrier frequency added at this time is closer to the sideband than the original frequency, the demodulated sound will have a low pitch and a low pitch, and conversely, if it is far away, the demodulated sound will have a high pitch and a low pitch, and if the difference exceeds 100 Hz, it will be difficult to understand. This is what you experience when receiving waves.

また復調時のキャリア周波数を側帯波の反対側までずら
すと、検波出力は音声スペクトラムが反転した形状と々
る。
Furthermore, if the carrier frequency during demodulation is shifted to the opposite side of the sideband, the detected output will have a shape in which the audio spectrum is inverted.

〔発明の目的〕[Purpose of the invention]

この発明は音声の電気通信による通話において、高度の
秘話方式を実現し得る比較的簡易な構成の秘話装置を提
供するのを目的とする。
SUMMARY OF THE INVENTION An object of the present invention is to provide a confidential communication device with a relatively simple configuration that can realize a highly confidential communication system in voice telecommunication calls.

〔発明の概要〕[Summary of the invention]

この発明は音声の電気通信による。通話において、第1
図に示すごとき、正常な周波数スペクトラム・臂り−ン
■と、その周波数をシフトしたスペクトラムパターン■
と、周波数スペクトラムを反転し六ノ々ターン■と、周
波数を反転およびシフトしたスペクトラムパターン■の
4踵の・卆ターン状態を予め設定した順列の秘話キーに
従って時分割で送出し、受話側では送話側と同一の秘話
キーの順列に従って受話信号の周波数スペクトラムパタ
ーン全正常彦周波数スペクトラムパターンに復元するこ
とを特徴とする秘話装置である。
This invention relies on voice telecommunications. In a call, the first
As shown in the figure, the normal frequency spectrum/arm ■ and the spectrum pattern with shifted frequency ■
Then, the frequency spectrum is inverted and the four-heel turn ■ and the frequency is inverted and shifted is the spectrum pattern ■, which are transmitted in a time-division manner according to a secret key in a preset permutation. This is a secret communication device characterized in that the frequency spectrum pattern of a received signal is restored to a completely normal frequency spectrum pattern according to the same permutation of secret keys as that of the speaking side.

特許請求の範囲第2項は送話側と受話側の秘話キーの同
期には、少なくも送信のスタート時に秘話キー動作のリ
セット信号を秘話キーの第1のノ4ターンに加えて送出
する構成を規定している。すなわち第2図において、第
(I1列は送受話の信号を表わし、受話状態″!、たは
休止状態から送話スイッチを入れると、先づ秘話キー動
作のリセット信号を送出して自機(送話側)と受話側の
秘話キー回路に加えて同時にスタートさせることにより
、送話側と受話側の秘話キー動作を同期させるものであ
る。このリセット信号としては単発ノぐルスでもよいが
、通話系ではライン雑音による誤動作の可能性がおるの
で、バースト信号あるいはパルス群によるリセット信号
を用い、その持続時間は秘話キーの1/J?ターンと等
しくするのが適当である。
Claim 2 provides a configuration in which, in order to synchronize the secret key on the transmitting side and the receiving side, a reset signal for the secret key operation is sent at least at the start of transmission in addition to the first four turns of the secret key. stipulates. In other words, in FIG. 2, column I1 represents the transmit/receive signal, and when the transmit switch is turned on from the receiving state "!" or the rest state, a reset signal for the private key operation is first sent and the own device ( This is to synchronize the confidential key operations on the transmitting and receiving sides by starting the confidential key circuits on the transmitting side and the receiving side at the same time.This reset signal may be a single-shot noggle, but In the communication system, there is a possibility of malfunction due to line noise, so it is appropriate to use a reset signal using a burst signal or a group of pulses, and to make the duration equal to 1/J? turn of the secret key.

第2図の第(n)列・第冊列は秘話・臂ターンの配列の
タイミングを示し、■〜■の・臂ターンはそれぞれ第1
図の■〜■の74ターンと同一である。図では便宜上■
■■■の順に配列してあるが、秘話キーの1サイクル内
でのパターンの配列は乱数とすることにより秘話キーが
成立するのでちり、秘話キーの容量さえ許せば秘話キー
サイクル内のパターンの重複組合わせにより秘話キーの
高度化が可能である。
The (n) column and the first book column in Figure 2 show the timing of the arrangement of the untold stories and arm turns, and the arm turns in ■ to ■ are the first rows, respectively.
This is the same as the 74 turns from ■ to ■ in the figure. For convenience, the diagram shows ■
They are arranged in the order of ■■■, but the secret key is established by using random numbers to arrange the patterns within one cycle of the secret key, so if the capacity of the secret key is allowed, the patterns within the secret key cycle It is possible to improve the sophistication of secret keys through overlapping combinations.

第2口笛(IF5列ではリセット信号の終了時から秘話
キーの最初のパターン■が動作上開始するのであるが、
特許請求の範囲第5項記載のように「長時間の送話継続
時には予定の時間間隔ごとに送話秘話音声に同期信号を
そう人する」場合には、予定時間間隔ごとにリセット信
号に合わせて秘話キーサイクルがスタートすることに力
るが、実際には同期がずれてい力いので無理に同期を掛
は直すのは不自然感が生じ易いし、秘話キーサイクルの
終了時にリセット信号金入れても次の秘話キーサイクル
は同期期間だけ遅れてスタートすることにカシ、もし受
話側でリセット信号の動作が抜けると同期が狂ってしま
うことになる。これに対して!@)列ではリセット信号
の発生に伴い秘話キーの最初のパターン■が動作を開始
し、リセット信号の終了時に第2のパターン■に切換わ
る構成であり、中間のリセット信号も秘話キーの最初の
/Jクーン■の期間にそう人すれば、リセット信号によ
り秘話キーは同期性を修正するだけで動作順列は変わら
々いから、中間リセット信号の動作抜けがおっても受話
に大き々支障を生ずることは無い、2送話から受話に移
る際には、先方が送話の最初に発生するリセット信号を
受けて秘話キーの同期が行なわれるのである。
The second whistle (in the IF5 row, the first pattern ■ of the secret key starts from the end of the reset signal, but
As stated in claim 5, when "when transmitting continues for a long time, a synchronization signal is sent to the transmitted secret voice at scheduled time intervals", the synchronization signal is synchronized with the reset signal at each scheduled time interval. However, in reality, the synchronization is out of order, so forcing the synchronization to be corrected tends to create an unnatural feeling. However, the next private key cycle will start delayed by the synchronization period, and if the reset signal is lost on the receiving side, the synchronization will be lost. On the contrary! In the @) row, the first pattern ■ of the secret key starts operating when the reset signal is generated, and switches to the second pattern ■ when the reset signal ends, and the intermediate reset signal also starts operating as the first pattern ■ of the secret key. If someone did that during the period of J. Kuhn■, the reset signal would only correct the synchronization of the secret key, but the order of operations would remain the same, so even if the intermediate reset signal were to fail, it would cause a major problem in receiving calls. 2. When moving from transmitting to receiving, the other party receives a reset signal generated at the beginning of transmitting and synchronizes the private key.

特許請求の範囲第3項は送話側の秘話・9ターンの作出
回路の構成であって、第3図の例示回路につき説明すれ
ば、第1のBMIにマイクロホン2よりの音声信号20
と第1の局部発振器3よりの第1のキャリア31とを加
えて、その出力の両側帯波11t”BPF4tl−通し
てSSB波41を取り出し、これを第2のBM5に第2
の局部発振器6よりの第2のキャリア61とを加えて、
その出力51に音声スペクトラムの変形され九秘話パタ
ーンを得る構成である。この回路において第1項記載の
4種の秘話パターンの作出には、 (Al  第4図上段に例示のように、音声信号のスペ
クトラム20は第1のBMIの出力において第1のキャ
リア31の上下に対称形のサイドバンドとして分布し、
BPF 4 ’ii−通して片方(図では上サイドバン
ド)のみ全取り出し、第4図中段のSSB信号41i得
て、第20BM5において第2のキャリア61の周波数
全第1のキャリア31と同じ周波数61aとすることに
よ#)第4図下段■のごとく正常な音声スペクトラムパ
ターンを得るのである。これは−見無駄な操作のようで
あるが、七と実施上の効果については後に説明する。
Claim 3 is the configuration of a secret speech/9-turn generation circuit on the transmitting side, and to explain the example circuit shown in FIG.
and the first carrier 31 from the first local oscillator 3, and extract the SSB wave 41 through the double-side band wave 11t''BPF4tl- of the output, and send this to the second BM5.
and the second carrier 61 from the local oscillator 6 of
The output 51 is configured to transform the audio spectrum to obtain nine secret speech patterns. In this circuit, in order to create the four types of secret patterns described in Section 1, (Al) As illustrated in the upper part of FIG. distributed as symmetrical sidebands,
Through BPF 4 'ii-, only one side (the upper sideband in the figure) is fully extracted, and the SSB signal 41i shown in the middle of FIG. By doing so, a normal voice spectrum pattern as shown in the lower part of Figure 4 (■) is obtained. Although this seems like a wasteful operation, the practical effects will be explained later.

(Bl  前記(A)と同様にして得fcSSB信号4
1と共に第2のBM5に加える第2のキャリア61の周
波数を第1のキャリア31から11だけシフトしたキャ
リア61bとすることによυ第4図下段■のごとき周波
数全シフトした音声スペクトラムパターンを得る。
(Bl fcSSB signal 4 obtained in the same manner as in (A) above)
By setting the frequency of the second carrier 61, which is added to the second BM5 along with 1, to the carrier 61b, which is shifted by 11 from the first carrier 31, an audio spectrum pattern in which the frequency is completely shifted as shown in the lower part of υ Figure 4 is obtained. .

(C1前記(A)と同様にして得7’jSSB信号41
と共に第2のBM5に加える第2のキャリア61の周波
数をサイドバンド41の反対位置に設定した第2のキャ
リア周波数61cとすることにより、第4図下段■のご
とき音声スペクトラムを反転したパターンを得る。
(C1 Obtained in the same way as in (A) above 7'jSSB signal 41
At the same time, by setting the frequency of the second carrier 61 added to the second BM5 to the second carrier frequency 61c set at the opposite position of the sideband 41, a pattern in which the audio spectrum is inverted as shown in the bottom part of FIG. 4 is obtained. .

(D)  前記(A)と同様にして得たSSB信号41
と共に第20BM5に加える第2のキャリア61の周波
数をサイドバンド41の反対位置からさらにf2だけシ
フトした第2のキャリア周波数61dと−イ゛ることに
より、第4図下段■のごとき音声スペ。
(D) SSB signal 41 obtained in the same manner as in (A) above
At the same time, the frequency of the second carrier 61 added to the 20th BM5 is changed to a second carrier frequency 61d shifted by f2 from the opposite position of the sideband 41, thereby producing an audio space as shown in the lower row of FIG.

トラムを反転およびシフトしたパターンを得るのである
You get a pattern of inverted and shifted trams.

特許請求の範囲第4項は受話側における秘話・卆ターン
よりの復元再生回路の構成であって、秘話パターンの作
成手順を逆行するという秘話復元再生の原則に従い、第
5図例示回路において、受信した秘話信号51は第1の
平衡復調器(以下にはBDと略記する)25全通して両
サイドバンド波251を得て、BPF24ffi通して
SSB信号241とし、第2のBD21で復調して音声
信号20 ”、(再元するのである。BPF 24は第
3図のBPF 4と同一特性で、l)、キャリア発振器
26・23はそれぞれ第3図の6と3と等しく取るの全
原則とし、26と23の周波数を入れ換えた場合には第
4図の■と■のノ々ターンにおいてシフト周波数分だけ
BPF 24の帯域幅を広くする必要がちる。
Claim 4 is a configuration of a recovery and reproducing circuit based on a confidential message/book turn on the receiver side, and in accordance with the principle of confidential message recovery and reproduction in which the procedure for creating a confidential message pattern is reversed, in the circuit illustrated in FIG. The secret signal 51 is passed through the first balanced demodulator (hereinafter abbreviated as BD) 25 to obtain both sideband waves 251, passed through the BPF 24ffi to become an SSB signal 241, and demodulated by the second BD 21 to generate audio. The general rule is that the signal 20'', (reconstructed), BPF 24 has the same characteristics as BPF 4 in FIG. 3, and carrier oscillators 26 and 23 are respectively equal to 6 and 3 in FIG. When the frequencies of 26 and 23 are swapped, it becomes necessary to widen the bandwidth of the BPF 24 by the shift frequency at the turns 2 and 2 in FIG.

キャリア発振器3・6・23・26のうち、固定周波数
は水晶発振器により、可変周波数は周波数設定と安定度
の点からPLL (Phase LockedLoop
)制御発振器により構成するのが普通でちり、PLL制
御発振器は数値入力により周波数設定ができるので、こ
れを秘話キー7・27の出力で制御し、送話側秘話キー
7と受話側秘話キー27の動作の同期は第2項および第
5項記載のように、少なくも送信のスタート時に秘話キ
ー動作のリセット信号を送出することにより行うもので
ある。
Among the carrier oscillators 3, 6, 23, and 26, the fixed frequency is a crystal oscillator, and the variable frequency is a PLL (Phase Locked Loop) for frequency setting and stability.
) Usually, it is configured with a controlled oscillator, and since the frequency of the PLL controlled oscillator can be set by numerical input, it is controlled by the output of the confidential key 7/27, and the confidential key 7 on the transmitting side and the confidential key 27 on the receiving side are controlled. The synchronization of the operations is performed by sending out a reset signal for the secret key operation at least at the start of transmission, as described in the second and fifth sections.

第3項(A)で述べたように、4種の秘話パターンの中
の■では第3図および第5図の入力音声信号20(51
)と出力音声信号51(20)とは全く同形であるので
、このよう力秘話回路を通す必要は無いのであるが、前
記4mの秘話・2ターンの作成と復元は秘話キーにより
キャリア周波数を制御するのみで行えるので構成上も動
作上も全く不利は無いのである。
As mentioned in Section 3 (A), among the four types of confidential conversation patterns, ■ is the input audio signal 20 (51
) and the output audio signal 51 (20) have exactly the same shape, so there is no need to pass the signal through the power secret circuit in this way, but the creation and restoration of the 4 m secret speech/2 turns is done by controlling the carrier frequency using the secret key. Since it can be done simply by doing the following, there is no disadvantage in terms of structure or operation.

〔発明の実施例〕[Embodiments of the invention]

第6図に本発明の実施例を示す。送話側秘話回路におい
て、第1BM−BPF・第2BMの構成は第3図と同一
であり、第1図の■■■■の4穏の秘話信号パターンは
第2キャリア発振器の周波数を秘話キーにより直接に設
定する代シに、電子頭脳として通信機にも最近は多く使
用されているCPU(Central Procssa
ing Unit )f:用いて第2キャリア周波数全
制御する構成とし、秘話キーもCPUに取り込んで、送
信開始信号としては送信電源電圧の立ち上りを利用し、
秘話キーのリセット信号として音声周波数帯内の特定周
波vを秘話キーサイクルの第1ノぐターン期間(この場
合は各パターン共に100m5に設定)だけ秘話信号出
力回路に送出し、該リセット信号の終了時にCPUは秘
話キーサイクルの第2ノ9ターンの設定データを第2キ
ャリア発振器に与え、以後は100 msのピッチで秘
話キーに順う秘話ノ々ターンを送出するのである。
FIG. 6 shows an embodiment of the present invention. In the transmitter-side secret signal circuit, the configuration of the first BM-BPF and the second BM is the same as in Figure 3, and the four-way secret signal pattern of ■■■■ in Figure 1 uses the frequency of the second carrier oscillator as the secret key. Instead of directly setting the
ing Unit)f: to fully control the second carrier frequency, the secret key is also taken into the CPU, and the rise of the transmission power supply voltage is used as the transmission start signal,
As a reset signal for the secret key, a specific frequency v within the audio frequency band is sent to the secret signal output circuit for the first turn period of the secret key cycle (in this case, each pattern is set to 100m5), and the reset signal is terminated. At times, the CPU provides setting data for the second ninth turn of the secret key cycle to the second carrier oscillator, and thereafter sends out the secret number turns in accordance with the secret key at a pitch of 100 ms.

受話側秘話回路は、第1 B D −BPF・第2BD
の構成は第5図と同一であり、入力信号はリセット信号
検出回路を通してリセット信号’1cPUに取り込み、
リセット信号の終了に同期して秘話キーの第2ノIター
ンをスタートさせて、CPUは第2パターン設定データ
を第1キャリア発振器に与え、以後は秘話キーは100
m5ピツチで同期して動作するのである。々お前記リセ
ット信号検出回路としては特定周波数のみを鋭敏に検出
する機械共振のマイクロフォークや周波数デコーダIC
等が実用されている。
The secret communication circuit on the receiver side is the 1st BD-BPF and the 2nd BD.
The configuration is the same as that in Fig. 5, and the input signal is taken into the reset signal '1cPU through the reset signal detection circuit.
Synchronizing with the end of the reset signal, the CPU starts the second I turn of the secret key, gives the second pattern setting data to the first carrier oscillator, and thereafter the secret key is set to 100.
They operate in synchronization with m5 pitches. The reset signal detection circuit may be a mechanically resonant micro fork or frequency decoder IC that sensitively detects only specific frequencies.
etc. have been put into practice.

〔他の実施例〕[Other Examples]

本発明の構成におけるBMとBDとは同一の部材にて構
成が可能であり、BPFは同一特性が望ましいので、こ
れらを送話時と受話時に共用した実施例を第7図に示す
In the configuration of the present invention, the BM and BD can be constructed from the same member, and it is desirable that the BPF have the same characteristics. Therefore, FIG. 7 shows an embodiment in which these are used in common for transmitting and receiving calls.

秘話回路2は送話時には入力スイッチS、と出力スイッ
チS2をT側に倒し、第1BM/BDはBM として動
作し、第1キャリア全固定周波数であり、第2BM/B
DもBM として動作し、第2キヤリアは秘話キーデー
タを取り込んだCPUの出力データにより第2キャリア
周波数を設定する。
When transmitting a message, the confidential communication circuit 2 turns the input switch S and the output switch S2 to the T side, and the first BM/BD operates as a BM, the first carrier is all fixed frequency, and the second BM/BD
D also operates as a BM, and the second carrier sets the second carrier frequency based on the output data of the CPU that has taken in the secret key data.

受話時にはスイッチS1と82’i R側に倒し、第1
と第2のBM/BDはBDとして動作し、第1キヤリア
は秘話キーデータを取り込んだCPUの出力データによ
り第1キャリア周波数を設定する構成である。
When receiving a call, flip switches S1 and 82'i to the R side, and press
The second BM/BD operates as a BD, and the first carrier is configured to set the first carrier frequency based on the output data of the CPU that has taken in the secret key data.

送話側と受話側の秘話キー動作の同期には、送信開始時
にCPUは送/受信号の送信信号の立上りで音声帯域内
の特定周波数のリセット信号を秘話信号出力ラインに送
出し、受話側では秘話信号入力ラインよりリセット検出
回路を通して受信リセット信号t−CPUに取り込んで
秘話キー動作のタイミングを送話側と一致させる構成で
ある。
To synchronize the private key operations on the transmitting side and the receiving side, at the start of transmission, the CPU sends a reset signal of a specific frequency within the audio band to the confidential signal output line at the rising edge of the transmitting/receiving signal, and In this case, the received reset signal is taken into the t-CPU from the secret signal input line through the reset detection circuit, and the timing of the secret key operation is made to match that of the transmitting side.

第8図にCPUのゼネラルフローチャートを示す。FIG. 8 shows a general flowchart of the CPU.

まず、電源オンもしくはリセットでスタートシ。First, start by turning on the power or resetting it.

始めに秘話キーデータを取り込み、次に送信か受信かを
チェックし、受信々ら同期捕捉動作を行ない、送信側か
ら送られたりセント信号を同期信号として調歩する。次
に秘話キーパターンの1ステップ周期のタイマ(この場
合は100m5に設定)を経て次のノ等ターンに切υか
える動作を継続する。
First, the secret key data is taken in, then it is checked whether it is transmitting or receiving, and the receiving side performs a synchronization acquisition operation, and the clock signal sent from the transmitting side or the cent signal is used as a synchronizing signal to start. Next, the operation of switching to the next equal turn υ is continued through the one-step cycle timer of the secret key pattern (set to 100m5 in this case).

送信状態ではまづリセット信号の同期送出を行い、以下
100m5タイマを経て秘話キーパターンの切替を継続
する。
In the transmission state, first, a reset signal is sent synchronously, and after a 100m5 timer, the secret key pattern continues to be switched.

〔発明の効果〕〔Effect of the invention〕

秘話通信においてはその目的である通話内容の秘密保持
が最も重要であるが、移動通信機や局数の多い加入者電
話等では費用やスペースの点から装置の簡易性と付加装
置として通信機本体に外付できることが望ましいのであ
る。
In confidential communication, the most important purpose is to maintain the confidentiality of the contents of the call, but in mobile communication devices and subscriber telephones with a large number of stations, due to cost and space considerations, it is necessary to simplify the device and use the main unit as an additional device. It is desirable to be able to attach it externally.

本発明では4種の秘話・卆ターンを乱数組合わせ念秘話
キーを用いる構成であるため、単式秘話方式に比して極
めて秘話性が高く、かつ秘話キー自体には直接的に秘話
/4ターンを指示する内容を含まず、特定の秘話装置と
組合わせてのみ動作するのであり、秘話装置のキャリア
周波数の選択により多様性を増すこともできるので、秘
話キー自体の秘密性はちまυ問題と々らないので安全性
が高いのである。
In the present invention, since the configuration uses a telepathic secret key that combines four types of secret stories/book turns with random numbers, the secret story property is extremely high compared to the single secret story method, and the secret story/four turns are directly attached to the secret story key itself. It does not contain any instructions for secrecy, and only works in combination with a specific secret device, and diversity can be increased by selecting the carrier frequency of the secret device, so the secrecy of the secret key itself is a problem. It is highly safe because it does not cause any damage.

秘話装置回路としては4種の秘話パターンの作成を同一
の回路でキャリア周波数を変えるだけで出来るし、実用
上はその他の実施例の第7図の回路のように送話装置と
受話装置を同一の回路で構成できるので、全装置の所要
部材はほぼ半減でき小形にまとめられるので、従来の通
信機にアダプタとして外付するのに便利である。
As a confidential communication device circuit, it is possible to create four types of confidential communication patterns by simply changing the carrier frequency using the same circuit, and in practical use, the transmitting device and the receiving device are the same as the circuit shown in FIG. 7 of other embodiments. Since it can be configured with the following circuits, the required components of the entire device can be reduced by almost half and the device can be made compact, making it convenient for externally attaching it to a conventional communication device as an adapter.

なお送受両用回路としては、BM/BDにダイオードを
用いた両方向回路音用いて、針えば第6図の送話側秘話
回路に受信秘話信号を逆方向に通すことにより、全く同
一の回路で送/受秘話装置を構成することも可能である
As a dual-purpose circuit for transmitting and receiving, a bidirectional circuit using diodes for BM/BD can be used, and by passing the received confidential signal in the opposite direction to the confidential signal circuit on the transmitting side as shown in Figure 6, it is possible to transmit using the same circuit. /It is also possible to configure a confidential communication device.

以上のごとく本発明の秘話装置においては、比較的簡単
力秘話回路の構成にょシ高度の秘話性全保持し得る効果
があるものである。
As described above, the confidential communication device of the present invention has the effect of maintaining a high degree of confidentiality with a relatively simple configuration of the confidential communication circuit.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は4種の秘話パターンの音声スペクトラム構成図
、第2図は秘話キーパターンサイクルの構成図、第3図
は送話側秘話装置構成図、第4図は第3図における秘話
74′メ一ン作成の説明図、第5図は受話側秘話装置構
成図、第6図は本発明の秘話装置の実施例の構成図、第
7図は本発明の他の実施例の構成図、第8図は第7図中
のCPUのゼネラルフローチャートである。 1・5・・・BM、2・・・マイクロホン、3・6・2
3・26・・・キャリア発振器、4・24・・・BPF
 。 21・25・・・BD、7・27・・・秘話キー。 特許出願人  八重洲無線株式会社 第   1  図 第3図 −−一一一一一一一一一一− iハ lFL+ 第  8  図
Figure 1 is a configuration diagram of the audio spectrum of four types of secret speech patterns, Figure 2 is a diagram of the composition of the secret key pattern cycle, Figure 3 is a diagram of the configuration of the secret speech device on the transmitting side, and Figure 4 is the secret speech 74' in Figure 3. 5 is a configuration diagram of the confidential communication device on the receiver side, FIG. 6 is a configuration diagram of an embodiment of the confidential communication device of the present invention, and FIG. 7 is a configuration diagram of another embodiment of the present invention, FIG. 8 is a general flowchart of the CPU in FIG. 1.5...BM, 2...Microphone, 3.6.2
3.26...Carrier oscillator, 4.24...BPF
. 21/25...BD, 7/27...secret key. Patent Applicant Yaesu Musen Co., Ltd. No. 1 Fig. 3--111111111- i-Haru FL+ Fig. 8

Claims (5)

【特許請求の範囲】[Claims] (1)音声の電気信号による通話において、正常な周波
数スペクトラムパターンと、その周波数をシフトしたス
ペクトラムパターンと、周波数スペクトラムを反転した
パターンと、周波数を反転およびシフトしたスペクトラ
ムパターンの4種のパターン状態を予め設定した順列の
秘話キーに従って時分割で送出し、受話側では送話側と
同一の秘話キーの順列に従って受話信号の周波数スペク
トラムパターンを正常な周波数スペクトラムパターンに
復元することを特徴とする秘話装置。
(1) In telephone calls using electrical audio signals, there are four types of pattern states: a normal frequency spectrum pattern, a spectrum pattern with the frequency shifted, a pattern with the frequency spectrum reversed, and a spectrum pattern with the frequency reversed and shifted. A secret communication device characterized by transmitting data in a time-division manner according to a preset permutation of secret keys, and restoring the frequency spectrum pattern of a received signal to a normal frequency spectrum pattern on the receiving side according to the same permutation of the secret keys as on the transmitting side. .
(2)送話側と受話側の秘話キーの同期には、少なくも
送信のスタート時に秘話キー動作のリセット信号を秘話
キーの第1のパターンに加えて送出する構成である、特
許請求の範囲第1項記載の秘話装置。
(2) In order to synchronize the confidential keys on the transmitting side and the receiving side, a reset signal for the confidential key operation is sent at least at the start of transmission in addition to the first pattern of the confidential key. The secret communication device described in paragraph 1.
(3)送話側の秘話パターンの作出回路の構成は、第1
の平衡変調器に音声信号と第1のキャリア周波数を加え
て、該第1の平衡変調器の出力を帯域ろ波器を通して片
サイドバンドのみを取り出して、第2の平衡変調器に第
2のキャリア周波数と共に加えて所望のスペクトラムパ
ターンを得るものであって、 (A)正常な音声スペクトラムパターンの作出には、第
1の平衡変調器の出力において第1のキャリア周波数の
上下に分布するサイドバンドを帯域ろ波器を通して不要
サイドバンドとキャリアを除去して片方のサイドバンド
のみを取り出し、これを第2の平衡変調器に第1のキャ
リア周波数と同一の周波数の第2のキャリアを加えて、
音声帯用低域ろ波器を通すことにより、第1の平衡変調
器に入力したと同一の正常なスペクトラムパターンの音
声出力信号を得る構成であり、 (B)周波数をシフトした音声スペクトラムパターンの
作出には、第1の平衡変調器の出力において第1のキャ
リア周波数の上下に分布するサイドバンドを帯域ろ波器
を通して不要サイドバンドとキャリアを除去して片方の
サイドバンドのみを取り出し、これを第2の平衡変調器
に第1のキャリア周波数とシフト周波数だけ異る第2の
キャリア周波数を加えて、音声帯用低域ろ波器を通すこ
とにより、周波数をシフトしたスペクトラムパターンの
音声出力信号を得る構成であり、 (C)周波数を反転した音声スペクトラムパターンの作
出には第1の平衡変調器の出力において第1のキャリア
の上下に分布するサイドバンドを帯域ろ波器を通して不
要サイドバンドとキャリアを除去して片方のサイドバン
ドのみを取り出し、これを第2の平衡変調器に第1のキ
ャリア周波数を該サイドバンドの反対位置に設定した第
2のキャリア周波数を加えて、音声帯用低域ろ波器を通
すことにより、第1の平衡変調器に入力した音声スペク
トラムを反転したスペクトラムパターンの音声出力信号
を得る構成であり、 (D)周波数を反転およびシフトした音声スペクトラム
パターンの作出には第1の平衡変調器の出力において第
1のキャリアの上下に分布するサイドバンドを帯域ろ波
器を通して不要サイドバンドとキャリアを除去して片方
のサイドバンドのみを取り出し、これを第2の平衡変調
器に第1のキャリア周波数と該サイドバンドの反対位置
からシフト周波数だけ異る第2のキャリア周波数を加え
て、音声帯用低域ろ波器を通すことにより、第1の平衡
変調器に入力した音声スペクトラムを反転および周波数
をシフトしたスペクトラムパターンの音声出力信号を得
る構成である、特許請求の範囲第1項記載の秘話装置。
(3) The configuration of the secret message pattern generation circuit on the sending side is as follows:
The audio signal and the first carrier frequency are applied to a balanced modulator, the output of the first balanced modulator is passed through a bandpass filter, only one sideband is taken out, and the second carrier frequency is applied to the second balanced modulator. (A) To create a normal audio spectrum pattern, sidebands distributed above and below the first carrier frequency are added to the output of the first balanced modulator to obtain the desired spectrum pattern. Pass through a bandpass filter to remove unnecessary sidebands and carriers, extract only one sideband, and add this to a second balanced modulator with a second carrier having the same frequency as the first carrier frequency.
By passing it through an audio band low-pass filter, it is configured to obtain an audio output signal with the same normal spectrum pattern as that input to the first balanced modulator. To create the output, the sidebands distributed above and below the first carrier frequency in the output of the first balanced modulator are passed through a bandpass filter to remove unnecessary sidebands and carriers, and only one sideband is extracted. A second carrier frequency that is different from the first carrier frequency by the shift frequency is added to the second balanced modulator, and is passed through an audio band low-pass filter to generate an audio output signal with a frequency-shifted spectrum pattern. (C) To create a frequency-inverted audio spectrum pattern, the sidebands distributed above and below the first carrier at the output of the first balanced modulator are filtered through a bandpass filter to eliminate unnecessary sidebands. The carrier is removed to extract only one sideband, and a second carrier frequency, in which the first carrier frequency is set at the opposite position of the sideband, is added to the second balanced modulator to generate a low frequency band for the audio band. It is configured to obtain an audio output signal with a spectrum pattern that is an inversion of the audio spectrum input to the first balanced modulator by passing it through a band pass filter. At the output of the first balanced modulator, the sidebands distributed above and below the first carrier are passed through a bandpass filter to remove unnecessary sidebands and carriers, extracting only one sideband, and using this as the second balanced modulator. A second carrier frequency that differs by a shift frequency from the opposite position of the first carrier frequency and the sideband is added to the modulator, and the second carrier frequency is passed through a low-pass filter for the audio band, thereby adding a second carrier frequency to the first balanced modulator. The secret speech device according to claim 1, which is configured to obtain an audio output signal having a spectrum pattern obtained by inverting an input audio spectrum and shifting its frequency.
(4)受話側における秘話パターンよりの復元再生回路
の構成は、第1の平衡復調器に受話した秘話信号と第1
のキャリア周波数を加えて、該第1の平衡復調器の出力
を帯域ろ波器を通して片サイドバンドのみを取り出して
、第2の平衡復調器に第2のキャリア周波数と共に加え
て、正常の音声に復元再生するものであって、特許請求
の範囲第3項記載の4種の音声秘話パターンの復元に際
しては、帯域ろ波器の周波数帯域を前記第3項の送話側
秘話装置の帯域ろ波器と等しく、第1平衡復調器の注入
キャリア周波数を前記第3項の送話側秘話装置の第2キ
ャリア周波数と等しく、第2平衡復調器の注入キャリア
周波数を前記第3項の送話側秘話装置の第1キャリア周
波数と等しく、4種それぞれの秘話音声パターンに同期
して切換える構成である、特許請求の範囲第1項記載の
秘話装置。
(4) The configuration of the restoration/reproduction circuit based on the secret pattern on the receiver side is such that the secret speech signal received by the first balanced demodulator and the first
The output of the first balanced demodulator is passed through a bandpass filter to take out only one sideband, and is applied to the second balanced demodulator together with the second carrier frequency to reproduce normal speech. In restoring and reproducing the four types of audio secret speech patterns as set forth in claim 3, the frequency band of the bandpass filter is changed to the bandpass filter of the transmitting side secret speech device as set forth in claim 3. the injected carrier frequency of the first balanced demodulator is equal to the second carrier frequency of the transmitting-side privacy device of the third term, and the injected carrier frequency of the second balanced demodulator is equal to the second carrier frequency of the transmitting side of the third term. The secret speech device according to claim 1, which is equal to the first carrier frequency of the secret speech device and is configured to switch in synchronization with each of the four types of secret speech audio patterns.
(5)特許請求の範囲第3項記載の送話秘話回路と、同
じく第4項記載の受話秘話回路との4種の秘話パターン
の復元再生のためのキャリア周波数切換の同期には、送
話側において送話動作の開始時に最初の送話音声パター
ンに代えて同期信号を送出し、該同期信号の停止時に送
話側・受話側共に予め設定してある秘話音声パターンの
組合わせの特定節より独立同期を行うものであって、長
時間の送話継続時には予定の時間間隔ごとに送話秘話音
声に同期信号をそう入することも可能とした構成である
、特許請求の範囲第1項記載の秘話装置。
(5) For synchronization of carrier frequency switching for restoring and reproducing four types of confidential patterns between the transmitting confidential circuit according to claim 3 and the receiving confidential circuit according to claim 4, At the start of the transmitting operation, a synchronizing signal is sent in place of the first transmitting voice pattern, and when the synchronizing signal is stopped, a specific clause of a combination of secret voice patterns that has been set in advance on both the transmitting and receiving sides is transmitted. Claim 1, which performs more independent synchronization, and is configured such that a synchronization signal can be input to the transmitted confidential voice at scheduled time intervals when transmitting continues for a long time. The secret device described.
JP61108299A 1986-05-12 1986-05-12 Confidential device Expired - Fee Related JPH0666758B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP61108299A JPH0666758B2 (en) 1986-05-12 1986-05-12 Confidential device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP61108299A JPH0666758B2 (en) 1986-05-12 1986-05-12 Confidential device

Publications (2)

Publication Number Publication Date
JPS62264739A true JPS62264739A (en) 1987-11-17
JPH0666758B2 JPH0666758B2 (en) 1994-08-24

Family

ID=14481167

Family Applications (1)

Application Number Title Priority Date Filing Date
JP61108299A Expired - Fee Related JPH0666758B2 (en) 1986-05-12 1986-05-12 Confidential device

Country Status (1)

Country Link
JP (1) JPH0666758B2 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58124343A (en) * 1982-01-20 1983-07-23 Sony Corp Transmitting method of sound encryption signal
JPS6143032A (en) * 1984-08-06 1986-03-01 Yaesu Musen Co Ltd Privacy telephone set

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58124343A (en) * 1982-01-20 1983-07-23 Sony Corp Transmitting method of sound encryption signal
JPS6143032A (en) * 1984-08-06 1986-03-01 Yaesu Musen Co Ltd Privacy telephone set

Also Published As

Publication number Publication date
JPH0666758B2 (en) 1994-08-24

Similar Documents

Publication Publication Date Title
US4171513A (en) Secure communications system
FI92004B (en) Bi-directional analog distortion
JPS62264739A (en) Privacy call device
JPH0326577B2 (en)
JP2875490B2 (en) Cordless telephone device and communication device
JPS6143032A (en) Privacy telephone set
JPH0149217B2 (en)
JPH08274753A (en) Secret talk method, and transmitter and receiver
JPH055209B2 (en)
JPS60208132A (en) Encoding and decoding system
JPS60210042A (en) Privacy telephone device
JPH0419730B2 (en)
JPH037169B2 (en)
JPS5970040A (en) Privacy telephone set of communication circuit
JPS6046148A (en) Radio communication system of inversional privacy
JPS60109941A (en) Signal synchronism circuit of ciphered communication device
JPH05292064A (en) Voice scrambling circuit, voice disscrambling circuit, and cordless telephone system
JPH0147062B2 (en)
JPH04137932A (en) Time division communication privacy call method for mobile body communication
JPS6014545A (en) Method and device for privacy communication
JPS61198840A (en) Privacy call equipment
JPH0530083A (en) Cordless telephone equipment
JPH0242260B2 (en)
JPS61150423A (en) Privacy telephone set for radio communication
GB1597365A (en) Apparatus for communicating an information signal over a bandwidth constrained channel

Legal Events

Date Code Title Description
S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

LAPS Cancellation because of no payment of annual fees