|Publication number||US3674936 A|
|Publication date||Jul 4, 1972|
|Filing date||Feb 26, 1970|
|Priority date||Feb 26, 1970|
|Publication number||US 3674936 A, US 3674936A, US-A-3674936, US3674936 A, US3674936A|
|Inventors||Fred G Wolfe|
|Original Assignee||Burroughs Corp|
|Export Citation||BiBTeX, EndNote, RefMan|
|Referenced by (12), Classifications (6), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
5 T, United States atet [151 3,674,936 Wolfe July 4,' 1972 s41 VOICE CONFERENCE SYSTEM 2,449,467 9/1948 Goodall ..179 1.s 2,453,461 11/1948 Shelleng ..179/1.5 [721 Fred 2,950,348 8/1960 Mayer et al.... ..179/1.s  Assignee: BurroughsCorporation, Detroit, Mich, 3,071,649 1/1963 Goodall ...l79/1.5 3,384,717 5/1968 Coston ..179/l8  Filed: Feb. 26, 1970 L N 14,771 Primary ExaminerBenjamin A.Borchelt [211 App Assistant Examiner-HA. Birmiel Related U.S. Application Data Attorney-Carl Fissell, Jr.
 Continuation of SCI. NO. 625,067, March 22, 1967, 57 ABSTRACT abandoned.
The present application discloses a voice conference system 179 15 R 179 3 which may be utilized to provide virtual cut-through (VCT) "H04", 3/16 service when used in conjunction with a modular data proces- 1 R 1 CN sor in a store and forward message switching system. The virtual cut-through service so provided allows the transmission of  U.S. Cl.  Int. Cl.  Field of Search continuous traffic as well as digital voice communications.  References Cited This feature coupled with other novel characteristics of the NTTED STATES PATENTS system make it possible to implement an extremely effective secure voice conference service. 3,302,182 1/1967 Lynch et a1. ..340/172.5 2,437,707 3/1948 Pierce ..l79/l .5 6 Claims, 4 Drawing Figures CUT-THROUGH PATH SELECT ACTIVE CHANNEL 0F HIGHEST PREcEDENcE m H0 |-|2 I T K NPUT ENCIPHER VOICETODIGITAL AL coAFEREE DEDTPRE D DTTALTDvDTDE LISTEN He A H4 l 1i 1 DATA DuFFER DATA sum 1 I MODULE MODULE l l l l i i T i l DATA DEMAND DATA DEMAND l MODULE MODULE i l H6 T DDT I T FADE w TDD: i
L L l WAGE (ALL CHANNELS) L NORMAL uNPRDTEcTED VIRTUAL i I VIA DOM CUT-THROUGH PATH WA DDM I l CRYPTOGRAPHIC CRYPTOGRAPH1C l I MODULE DEClPHER 136 F MODULE ENCIPHER l 1-28 VIA DDM WA 0011 m" MEMORY "f MEMORY cLEAR-TExT MODULE gAg gg MODULE sToRAcE- I (ALLCHANNELS) l I Ho 1 NORMAL PROTECTEDVIRTUAL i I I I L PATENTEDJDL "4 I972 SHEET 20F 2 2-|0-' Now SPEAKING a;
2-|2- IN CONFERENCE E E [El E El OOOOO 244 EHZIEHE =1 2-!8 222 E E] E1 2 E] El U:::::E| P??? CUT-|N TALK CONFERENCE SELECT REPERTOIRE SELECT z-le 2-20 Fig.2
VOICE VOICE lllll II III! Hill! ll llllllll II III llll lllll 3-l6 5-|D 5-20 VOICE VOICE Ill! 1| nll THIN mm III I!!! lllll DATA DATA DATA 5-22 5-24 Fig.3
T254 Ts I6 TT l8 I9 20 2| 22 52 55545556 5T 48 V SYNCHRAMING TALK REQUEST SIGNAL "PRESENT SIGNAL" NT M TTDA 4-l4 4-l6 PRIORITY CUT-IN SIGNAL INVENTOR- 4-|2 FRED G. WOLFF ATTORNEY vorcs CONFERENCE SYSTEM CROSS REFERENCE TO RELATED U.S. PATENT This application is a continuation of an earlier application filed Mar. 22, 1967, Ser. No. 625,067 and now abandoned.
The content of the related patent entitled A Store and Forward Message Switching System by IT. Lynch et al., US. Pat. No. 3,302,182, assigned to the present assignee, is to be included as part of this disclosure, since it is in such a system that the present invention will find a contemplated use.
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to the transmission and reception of continuous message traffic using a modular data processor as an automatic secure message switching center. In addition, the present invention discloses a means of providing the transmission of continuous traffic as well as digital voice communications.
For many applications, it is desirable to provide the equivalent of circuit-switching service in a message-switching center. One of these applications is the transmission of continuous traffic or very long messages; another, the transmission of voice communications.
2. Description of the Prior Art Previous switching centers have been capable of continuous traffic or very long messages. However, in most cases, these systems required continuous supervision of the traffic during these long periods of transmission.
Another disadvantage of previous systems was that traffic did not arrive in the exact order in which it was transmitted, without interspersed messages from other sources.
In addition, because the same system components had to act upon each incoming message, and further because these components presented a fixed interface to all incoming messages, the use of special codes in a message or the requirement by a message of a special procedure was usually prohibited, since they were normally incompatible with the fixed switching center requirements and hence were not permitted.
Further, in those systems where voice communication was possible the element of immediacy ideally required was not always preserved.
BRIEF SUMMARY OF THE INVENTION A system is provided for giving a modular data processinG system the facility for providing virtual cut-through (VCT) service which allows the transmission of continuous traffic as well as digital voice communications. The term Virtual Cut- Through refers to the ability of the system to receive the message and pass it through the system for transmission practically simultaneously. That is, it is accomplished as if the incoming circuit were actually switched to the outgoing circuit as is done in a circuit switching system. For example, in a telephone switching exchange the incoming call circuit is physically switched to the selected outgoing lines. This of course, would be actual cut through. In the present system this is accomplished without circuit switching. Rather it is accomplished by providing a path through the system between input and output lines virtually directly. It is done without any inspection of the incoming data whatsoever. This lack of inspection of the incoming data simulates still closer, the operation in a circuit switching system.
In the related U.S. Pat. No. 3,302,182, issued to the present assignee, entitled A Store and Forward Message Switching System Utilizing a Modular Data Processing, By John T. Lynch and Fred G. Wolff, a rather different concept is described. As its title implies, the incoming messages are are received, stored and later forwarded out of the system. In the present system this store and forward feature is bypassed to accomplish a virtual cut-through the system by the message. Although a modular system is shown and described, however, it is not a specific requirement for the operation or practice of the presently proposed system. This, of course, does not means that a data processing system is not necessary, it merely means that a modular system is not required. In a non-modular system, the conference is set up merely by connecting the conferees to the input and output buffer means of the data processing system. The advantages of using a modular system for a store and forward message switching system is set forth in the related application of Lynch et al. previously cited. However, as noted therein, switching centers are possible using data processing systems which are not modular. Thus, any switching center may utilize the present scheme provided it is one in which incoming and outgoing data are buffered before and afler processing. Further, although a Cryptographic Module (CPM) is illustrated in the present embodiment, such a specific module is not required. In the absence of the cryptographic module secure traffic can be handled as described for unprotected traffic by the use of conventional cryptographic equipment. In the present system the virtual cut-through is accomplished by transferring all incoming data directly to the proper outgoing channel(s) without inspection of the data. Where protected channels are used this transfer is done after deciphering and before enciphering. Thus, different cryptographic techniques can be used on different channels.
A plurality of the individual modules from a Modular Data Processing system such as have been previously described in the US. Pat. No. 3,302,182 are utilized in a unique configuration. Thus a plurality of Data Bufi'er Modules (DBM) are utilized in conjunction with a plurality of Data Demand Modules (DDM) to provide a normal unprotected virtual cut-through path of communications through a plurality of Memory Modules. (MM) When a normal protected (secured) virtual cut-through path is needed, an additional plurality of Cryptographic Modules together with a plurality of Memory Modules used in association with a Computer Module (CM) are required.
Among the advantages of this configuration are:
l. The switching center is relieved of continuous supervision of traffic during long transmission periods;
2. Traffic arrives in the exact order in which it was transmitted, without interspersed messages from other sources;
3. Special codes and procedures, not compatible with normal switching center requirements, are permissible;
4. Generation of headers, etc., is not necessary;
5. The element of immediacy is preserved (for voice communication).
BRIEF DESCRIPTION OF THE DRAWINGS These and other features will become increasingly apparent when the following specification is considered in conjunction with the accompanying drawings. In the drawings:
FIG. 1 illustrates a block diagram showing the data flow for Virtual Cut-Through (VCT) over both protected and unprotected channels;
FIG. 2 shows an improved subscriber set configuration in a suggested embodiment;
FIG. 3 provides a digital coding scheme for use with the present system;
FIG. 4 illustrates a 48 bit data word showing the various signals and the framing information.
In a message switching center, it is not practical (nor desirable) actually to use circuit-switching techniques for the purpose of connecting the input message lines to the output message lines. Virtual cut-through can, however, be effected by transferring all incoming data directly to the proper outgoing channel(s), without inspection of the data. Where protected channels are used, this transfer is done after deciphering and before enciphering (in clear text). Thus, difi'erent cryptographic techniques can be used in different links. A Cryptographic Processor Module may be used just as in normal message-switching service. FIG. 1 illustrates the data flow for Virtual Cut-Through (VCT) over both protected and unprotected channels.
Once a VCT connection has been acquired, any kind of data, including digital voice, can be transmitted. Present secure voice transmission methods do not allow the superposition of two or more voices. Thus it is necessary to permit only one conferee to talk at a time. The controls that would be required for Secure Voice Conference Service are normally difficult to implement, partly because of their complexity. However, with a switching center, such as that disclosed in U.S. Pat. No. 3,302, l 82 available, the necessary control facility can be easily programmed into the switching centers processor. To prevent superposition of voices, a simple priority scheme is used, each participant automatically excluding those below him while he is talking. The assignment of conference precedence is made by the originator in the sequencing of routing indicators when setting up the call or by other procedural methods.
FIG. 1 shows the flow of information in and out of the switching center. Encrypted digital voice channels are independently received via the Data Buffer and Data Demand Modules, deciphered, and stored in memory. The Computer Module examines the various incoming channels and selects the one channel which will be transmitted to all conferees.
The actual methods of selection of the voice to be transmitted depends on the type of voice-encoding device used by the conferees. In its simplest form the incoming channel of highest (predetermined) precedence showing audio activity is selected for transmission. (A more complex scheme is also described below.) In any event, the data stored in the section of memory assigned to the selected channel is transferred to the appropriate memory section for independent re-enciphering and transmission to all conferees.
Any type of digital voice communication can be used provided, of course, that communication channels of sufficient bandwidth are available between each participant and the switching center. The voice-to-digital and digital-to-voice converters of all participants must be compatible; but cryptographic equipment used by subscribers may be of any type provided corresponding equipment is provided at the switching center. For example, if a Cryptographic Processor Module is included in the system, it can be shared by all links at the switching center provided their respective signalling speeds are the same.
To illustrate the additional capabilities of an automated secure message switching center when it is provided with a more sophisticated secure voice conference service, an improved subscriber set utilizing a digital coding scheme is shown in FIGS. 2,3 and 4. At regular intervals the digltal voice stream is interrupted and a 48-bit data word inserted. This short interruption is not harmful to the voice quality. The data word contains a -bit sync marker code to identify it as a data word. In order to preclude the accidental interpretation of voice as data should this 15-bit sequence be generated by the voice equipment, the voice-generated data stream is continuously monitored, and should any sequence occur, one of its bits is arbitrarily inverted. This again, is not harmful to the voice quality. The 16 bit is a priority cut-in signal. Bits 17-32 are talk request signals for up to 16 conferees, and bits 33-48 are used to indicate the presence of the 16 conferees.
Data words sent by the subscriber to the switching center are utilized as follows. The voice to be transmitted is selected on the basis of bits 16 to 32. If bit positions 17 to 32 are assigned to subscribers in the order of predetermined precedence, the highest binary value (bit position 16 is considered high order; 32 low order) indicates the proper selection.
The data word is sent by each subscriber to the switching center. The data word to be sent by the switching center to each subscriber is generated in the following manner. The first 15 bits are, of course, the sync marker. Bits 16 through 32 are copied from the corresponding bits of the selected incoming channel. Bits 33 through 48 of all input channels are superimposed to produce the corresponding output bits.
At the subscriber set, the incoming data word is used to indicate visually those conferees present (bits 33 to 48), as well as the individual presently speaking (bits 17 to 32).
Some of the unused combinations of data bits are assigned to control functions, such as initiation and termination of calls. Such unused data bits are those bits available to each subscriber after his identification and speaking bits have been decided. Thus, each subscriber requires only one of the 16 bits (33 to 48) for indicating that he is present. Similarly, he requires only one bit (of bits 17 32) to shown that he is presently speaking. The remaining bits are available for other purposes.
Referring in particular to FIG. 1, there is illustrated in block form the subscriber set 1-10. In this set there is included a voice to digital converter 1-12, which receives the voice of the particular conferee and converts it to a corresponding binary digital representation. This digitally represented voice signal is then coupled to the enciphering means 1-18, where it is encoded in a predetermined manner. From there it is connected to the modular processing system as an input line to the Data Buffer Module 1-22. A number of other input information lines are also shown entering the Data Buffer Module l-22. Such lines may be assumed to be connecting other subscriber sets similar to the set 1-10 to the modular processing system.
The Data Buffer Module may be of the type disclosed and described in the previously noted US. Pat. No. 3,302,182.
As its name implies, the enciphered information data is buffered into the system by this module. Next, the Data Demand Module l-24 scans the respective lines of the Buffer Module l-22 and transfers the selected information into the Memory Module 1-26.
From the stored contents of the Memory Module, the information may take one of two paths dependent upon whether the information is protected or unprotected. In this context, the words protected and unprotected mean secured and unsecured respectively. Thus classified messages would travel the protected or secured path while unclassified information would be passed along the unprotected or unsecured path.
In the case of a normal unprotected message, the virtual cut-through path would be directly to the Memory Module l-38, from which it would pass through the Data Demand Module l-40 and the Data Buffer Module 1-42 to information output lines. In the illustrated version, one set of output lines would be connected to the Digital to Voice Converter 1-14 for transfer to the Conferee.
A somewhat longer path is used for a protected message. In this case, the protected message leaves the Memory Module 1-26 and travels to the Cryptographic Module 1-28.
Although this path is shown as a direct line between the Memory Module and the Cryptographic Module, it should be noted that this is merely done for the sake of simplicity. Actually, the path is through the Data Demand Module 1-24 and this is noted on the drawing as via DDM.
From the Cryptographic Module l-28, the protected path again travels via the Data Demand Module 1-24 prior to the storage of the protected message in clear text in the Memory Module l-30. The protected message was, of course, deciphered in the Cryptographic Module prior to its transfer to the Memory Module 1-30.
From the Memory Module, the path of a normal protected virtual cut-through message travels to the Memory Module I-34 for ultimate transfer out of the system. The protected message to be so transferred is selected by the Computer Module l-32. This selection is based upon the degree of precedence and the Computer module [-32 selects the active channel of the highest precedence in the Memory Module 1-34 to accomodate the transfer.
The clear text of the message of the selected channel passes into the Cryptographic Module 1-36. Here again this transfer is via a Data Demand Modules l-40. The Cryptographic Module 1-38 enciphers the clear text of the message and then transfers it to the Memory Module 1-38 again via the Data Demand Module l-40.
From the Memory Module 1-38 the path of a normal protected virtual cut-through is the same as the previously described path of a normal unprotected VCl'. Thus the message passes to the subscriber set 1-10 and hence to the conferee.
In FIG. 2, a suggested embodiment of the subscriber is illustrated. For example, the conferee selects a plurality of individuals upon the pushbuttons of his conference selection means 2-16 and/or via the telephone-like dial 2-18, or similar signaling means. These are the particular parties whose presence he desires at the conference. Those persons at the conference are noted by the in conference lights 2-12, while the person speaking at the moment is noted by the illumination of a now speaking" light 2-10. In addition a set of various predetermined conference groups are available to the speaker by the repertoire selection means 2-20.
Finally, the push-to-talk" means 2-22 provides its noted function as does the priority cut-in means 2-14. It might be noted that the conference initiator can decide the individual priorities of the various conferees.
In FIG. 3, there is shown the digitally represented waveforms of a voice transmission. This is illustrated in the upper portion of the figure. At regular intervals 3-10,3-12,3- 14 in the transmission a 48-bit data word is inserted. This is represented in greater detail in the lower portion of the figure wherein the data segments 3-16, 3-18, 3-20 of the transmission are shown inserted between the voice segments 3-22 and 3-24. It has been previously mentioned that these 48-bit data insertions are sufficiently short as not to appreciably affect the quality of the voice transmission.
Finally, FIG. 4 identifies the 48 bits of the data word. Bits l-l5 include the sync and framing information 4-10, bit 16 determines the priority cut-in signal 4-12, bits 17 to 32 provide the talk-request signal 4-14 and bits 33 to 48 indicate those present by the present signal 4-16.
While there has been shown and described a particular embodiment of the present invention, it is obvious that many modifications are possible which are within the scope of the resent concept. It is, therefore, the applicants intention to be bound only by the scope of the following claims.
1. A secure voice conference system comprising a switching center including a plurality of incoming channels, a plurality of outgoing channels, a plurality of functional modules connected therebetween for transferring all data received by said incoming channels directly to the proper outgoing channels without inspection of the information contained in said received data, at least one of said plurality of functional modules being a computing module and including means for selectively activating the one of said incoming channels having the highest precedence of a predetermined priority, a plurality of subscriber sets, each having an enciphering means, a deciphering means, a digital to voice conversion means and a voice to digital conversion means adapted to receive audio signals and couple its corresponding digital output signals to said enciphering means for entry via one of said incoming channels to said switching center, said digital to voice conversion means similarly adapted to provide audio output signals upon receipt of corresponding digital signals from said deciphering means for exit via one of said outgoing channels from said switching center.
2. The system as set forth in claim 1 wherein each of said subscriber sets includes means for interrupting said received audio input signals and inserting a data word into the incoming stream of audio signals at an interrupting period and rate such as to be substantially harmless to the voice quality of the audio signals.
3. The system as set forth in claim 2 wherein further means are included for inserting into said data word a synchronizing marker code to identify said information as a data word.
4. The system as set forth in claim 3 including further means in each of said subscriber sets for inserting a priority cut-in binagy sTignal into said data word e system as set forth in claim 4 wherein each of said subscriber sets also includes means for inserting a plurality of talk request signals into said data word.
6. The system as set forth in claim 5 wherein each of said subscriber sets further includes means for inserting into said data word a plurality of conferee-present signals.
H050 UNITED STATES PATENT OFFICE CERTIFlCATlL OF CGRRECTION Patent No. I 3 7 93 D d July t, 1972 Inventoifs) Fred G. Wolff It is certified that error appears in the above-identified p atent and that said Letters Patent are hereby corrected as shown below:
a The inventor's name is spelled "Fred G. Wolfe! in the heading of the patent It should be. -eorreoted 150 read Fred G. Welfi' s Signed and sealed this -20th dayvof February 197-3 QSEAL) Attest:
EDWARDMJLETCHERJR; ROBERT-V GOTTSCHALK Attesting Officer I I a Commissioner of; Patents
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US3794763 *||Jul 10, 1972||Feb 26, 1974||Philips Corp||Speech-controlled switching arrangement|
|US3869576 *||Mar 19, 1974||Mar 4, 1975||David Thurston Griggs||Mechanical stenographic apparatus for transcribing group proceedings|
|US3958084 *||Sep 30, 1974||May 18, 1976||Rockwell International Corporation||Conferencing apparatus|
|US4167700 *||May 2, 1977||Sep 11, 1979||Motorola, Inc.||Digital voice protection system and method|
|US5003593 *||Jun 5, 1989||Mar 26, 1991||Motorola, Inc.||Teleconferencing method for a secure key management system|
|US5136648 *||Sep 5, 1990||Aug 4, 1992||Octel Communications Corporation||Message storage security system|
|US5210794 *||Dec 21, 1990||May 11, 1993||Alcatel, N.V.||Apparatus and method for establishing crypto conferences on a telecommunications network|
|US5916302 *||Dec 6, 1996||Jun 29, 1999||International Business Machines Corporation||Multimedia conferencing using parallel networks|
|US6765880 *||Jan 18, 2000||Jul 20, 2004||Cisco Technology Inc.||Method and apparatus for eliminating unprotectable paths from consideration during computation of a protectable shortest path tree|
|US6810116||Sep 12, 2000||Oct 26, 2004||International Business Machines Corporation||Multi-channel telephone data collection, collaboration and conferencing system and method of using the same|
|US7161944||May 31, 2000||Jan 9, 2007||Cisco Technology, Inc.||Method and system for optimized routing and protection of VT traffic in SONET networks|
|US7564859||Nov 27, 2006||Jul 21, 2009||Cisco Technology, Inc.||Method and system for optimized routing and protection of VT traffic in SONET networks|
|U.S. Classification||380/257, 713/153, 379/202.1|
|Nov 22, 1988||AS||Assignment|
Owner name: UNISYS CORPORATION, PENNSYLVANIA
Free format text: MERGER;ASSIGNOR:BURROUGHS CORPORATION;REEL/FRAME:005012/0501
Effective date: 19880509
|Jul 13, 1984||AS||Assignment|
Owner name: BURROUGHS CORPORATION
Free format text: MERGER;ASSIGNORS:BURROUGHS CORPORATION A CORP OF MI (MERGED INTO);BURROUGHS DELAWARE INCORPORATEDA DE CORP. (CHANGED TO);REEL/FRAME:004312/0324
Effective date: 19840530