Voice security between a composite channel telephone...

Telecommunications – Radiotelephone system – Security or fraud prevention

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S105000, C380S275000, C380S270000

Reexamination Certificate

active

06256491

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention relates to the security of telephone communications which utilize a composite channel telephone communications link, and in particular, to an apparatus and method to provide selectable voice security, by scrambling or encryption, of telephone calls over individual channels even though the calls travel in part over a composite communications telephone link such as T
1
or E
1
composite channel formats and in part over non-composite telephone communications links, including land line and cellular telephone networks, to the end point telephones.
2. Problems in the Art
Telecommunication transmission links can be either a loop, which connects a user with a serving office, or a trunk, which connects two offices. Telephone transmissions can be at voice frequency, or a number of voice-frequency channels can be multiplexed together using frequency-division techniques (analog carrier) or time-division techniques (digital carrier). The multiplexed signal can then be transmitted over guided wave media, such as wire and optical fibers, or through free space, as in radio or cellular systems.
The advantage of a multiplexed transmission is the greater economy of carrying many channels on a single medium element. One standardized digital carrier system or format is a 24-voice composite channel 1.544 Mb/s system referred to as T
1
. Voice channels (from a step-by-step switch, for example) are converted to digital form and multiplexed into digital groups in a primary pulse code modulation (PCM) multiplex also called a digital channel bank. This communications link can have terminals in, for example, public telephone company offices or be used at or between private company end-points.
The voice signals are converted to digital format by sampling and encoding the voice into digital words (e.g. 8 bit PCM). Each digitized voice or call is then multiplexed in synchronous fashion. Framing and signal bits are used to allow later de-multiplexing. From these individual frames, delineated by the framing bit, super frames of 12 and 24 frames are created. These super frames are used to encode additional call information. Each frame would also include all of the digitized voice for each of the 24 channels, (e.g. one frame contains twenty-four of the eight bit words which are the digital samples of the analog voice) as well as include one framing bit.
The digital information can also be encrypted if desired. It is not uncommon to do so over T
1
lines. However, the digital information is usually bulk encrypted. Therefore, the security added to the communications link is without regard to the individual channels or calls. There can be no selective encryption of a call. They are all encrypted or none are encrypted.
Furthermore, such security, if even used, only exists between terminals of the T
1
communications link. Ultimately, each call usually must traverse a T
1
terminal and then another communications link before arriving at the end point receiving telephone set. Thus, there is generally no security level in that other link and any security in the T
1
link is not helpful.
This security problem is well known. It is particularly significant because of the ever-increasing use of cellular telephones as the end point receiver. Any encryption or security in the T
1
link is lost after individual calls in the link leave the T
1
link. Cellular calls ultimately are transmitted in wireless fashion where anyone can intercept and listen, if they have the appropriate equipment and certain knowledge.
Some prior art has attempted to address communications security for cellular phones or radio links where the communications could be intercepted from the air. For example, U.S. Pat. No. 4,973,479 to Tobias, Jr. et al., teaches how a cellular phone with a scrambler or encryption mode could place calls to a phone without such capabilities. It uses a call diverter at, for example, a mobile telephone switching office (MTSO) to be instructed to route the scrambled or encrypted call through a scrambler/descrambler (or encrypter/decrypter). However, this does not address the problem of the security gap caused by lack of voice security after the terminal of a T
1
communications link. It also requires a caller to proactively engage and instruct the diverter. U.S. Pat. No. 5,365,590 to Brame discloses a similar call diverter arrangement for radio communications.
Therefore, there is no known satisfactory solution to security problems regarding telephone calls that travel in part through a composite telephone link but in part outside the link. Furthermore, there is no known satisfactory solution to whether individual calls or channels on a composite channel can selectively be secured or unsecured.
It is therefore a primary object of the present invention to provide an apparatus and method for voice security for calls that are communicated in part through a composite digital telephone link, which improve over and solve the problems and deficiencies in the art.
Further objects, features, and advantages of the present invention include an apparatus and method as above-described which:
1. can provide scrambling or encryption security for voice telephone calls outside of the composite communications link.
2. provide flexibility and selectability as to the security level desired for each channel of the composite communications link.
3. can be transparent to the callers.
4. do not require diversion steps.
5. are economical.
6. can be used by individuals, companies, or telephone companies.
7. are non-complex.
8. provide centralized security.
9. allow secure calls to be initiated between devices equipped with equal or lower levels of security.
10. allow various levels of security while providing good recovered voice quality.
These and other objects, features and advantages of the present invention will become more apparent with reference to the accompanying specification and claims.
SUMMARY OF THE INVENTION
The present invention relates to an apparatus and method for voice security for calls that are communicated in part through a composite digital telephone link. The method includes separating out one or more calls from the composite communications link. Once separated, the call can be put into a secure form by scrambling or encryption. The call, even outside the composite communications link, is therefore secured and can proceed to an end point, where it is descrambled or decrypted. Thus, individual handling of the security can be achieved even though the call passes through the composite communications link, where all calls are handled the same way.
The apparatus according to the invention includes a device having a connection to the composite communications channel. A component recognizes and separates out each channel of the composite communications channel by recognizing the identifying information for each call that is included in the digital bit stream of the composite communications channel. A component can be selectively controlled or automatically function to secure an individual call by scrambling or encryption. An output is connectable with another communications link to provide the secured call to an end point land line or cellular phone which is operatively associated with a corresponding descrambler or decrypter.
The invention can include optional features such as control by the caller over whether the call should be secured and automatic securement by virtue of the telephone number being called or some other criteria.


REFERENCES:
patent: 4020285 (1977-04-01), Branscome et al.
patent: 4167700 (1979-09-01), Coe et al.
patent: 4608456 (1986-08-01), Paik et al.
patent: 4652699 (1987-03-01), Akaiwa
patent: 4802220 (1989-01-01), Marker, Jr.
patent: 4815128 (1989-03-01), Malek
patent: 4920567 (1990-04-01), Malek
patent: 4972479 (1990-11-01), Tobias, Jr. et al.
patent: 5113443 (1992-05-01), Brockman
patent: 5168522 (1992-12-01), Simanis et al.
patent: 5365590 (1994-11-01), Brame
patent: 5410599 (1995-04-01), Crowley et al.
patent: 5418813 (1995-05-01), Schaffn

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Voice security between a composite channel telephone... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Voice security between a composite channel telephone..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Voice security between a composite channel telephone... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2555512

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.