×

Method and apparatus for voice encryption in a communications system

  • US 5,528,693 A
  • Filed: 01/21/1994
  • Issued: 06/18/1996
  • Est. Priority Date: 01/21/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. In a communications system comprisinga source of digital signal information,a transmitter, a receiver, a communications link between said transmitter and receiver, first and second crypto-algorithm generators for generating crypto-algorithms, said first crypto-algorithm generator also generating a crypto sync signal, a first modulo-two summer responsive to said source and to said first crypto-algorithm generator for combining a crypto-algorithm with said digital signal information to provide an encrypted digital signal to said transmitter,a first data corrector responsive to said receiver for correcting, if necessary, said encrypted digital signal,a second modulo-two summer responsive to said first data corrector and to said second crypto-algorithm generator for decoding said crypto-algorithm from said encrypted digital signal to provide said digital signal information,a first delay means located between said first crypto-algorithm generator and said first modulo-two summer for delaying the output of said first crypto-algorithm generator by a predetermined period of time,a synchronization link between said first and second crypto-algorithm generators, said synchronization link comprisinga second data corrector responsive to said second crypto-algorithm generator for correcting, if necessary, said crypto sync signal, anda second delay means located between said second data corrector and said second crypto-algorithm generator for delaying the output of said second data corrector by said predetermined period of time,wherein the signal path lengths of said communications link and said synchronization link are continuously changing,a method for synchronizing said first and second crypto-algorithm generators, said method comprising the steps of:

  • (a) said system delaying the operation of said first and second crypto-algorithm generators for said predetermined period of time following initiation of said digital signal information from said source;

    (b) said system utilizing said predetermined period of time to synchronize said first and second crypto-algorithm generators; and

    (c) said system enabling the operation of said first and second crypto-algorithm generators after said predetermined period of time.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×