Secondary authentication method applicable to voice command response of intelligent equipment

A voice command and smart device technology, applied in voice analysis, voice recognition, instruments, etc., can solve the problems that smart devices do not have authority authentication, are insecure, cannot recognize unauthorized commands, etc., and achieve smooth human-computer interaction secondary authentication Authorization method, high security, low power consumption effect

Active Publication Date: 2019-03-19
SOUTHEAST UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is to overcome the deficiencies of the prior art, provide a secondary authentication method suitable for voice command responses of smart devices, and solve the problem that smart devices do not have authority authentication and cannot recognize unauthorized commands, resulting in smart Unsafe problems introduced by equipment operation control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary authentication method applicable to voice command response of intelligent equipment
  • Secondary authentication method applicable to voice command response of intelligent equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0033] Such as figure 1 As shown, the present invention designs a secondary authentication method suitable for voice command responses of smart devices. In the method, the smart device recognizes the type of the monitored voice commands, and if there are no non-control commands related to security, general commands are performed. Execute the response, and if it involves safety control commands, judge the feature threshold according to the voice sample information to determine whether to refuse to execute the corresponding control commands for children, thus effectively preventing children from controlling smart home devices through voice. The smart device recognizes the location of the monitored voice command to determine whether the voice command is located in the direction of the door. For the voice command received from a direction other than the door, it dir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secondary authentication method applicable to voice command response of intelligent equipment, which comprises the following steps of: performing voice monitoring to obtain amonitored voice command; the types are divided into control type commands and non-control type commands in advance; identifying the monitored voice command, executing when the monitored voice commandis identified as a non-control column command, otherwise, extracting a characteristic threshold value at a certain voice frequency and comparing the characteristic threshold value with pre-constructed voice sample information to judge whether an adder is a child or not, and alarming and refusing to execute if the adder is the child; otherwise, comparing the identified sound source direction withthe direction of the sound source sample at the doorway; if it is judged that the applicator is located in the non-doorway direction, a command is executed, and if not, secondary confirmation in the doorway direction is executed: according to the sound source direction recognized again and the sound source sample direction, when it is judged that the applicator is located in the doorway again, itis judged that the applicator is located on the outer side of the doorway; otherwise, judging that the door is located inside the door and executing the command. According to the invention, effectivesafety control of the intelligent device is realized.

Description

technical field [0001] The invention relates to a secondary authentication method suitable for voice command responses of intelligent equipment, and belongs to the technical field of security control. Background technique [0002] Compared with traditional speakers, smart speakers are an upgraded product of speakers in smart devices. The latter, as the terminal of the entire audio system, only converts audio power into corresponding sound energy and radiates it to the space; while smart speakers are considered to be the entrance of the Internet of Things era. In the Internet age, what users face is no longer a scattered combination of various home appliances and mobile devices, but an organic whole, and the audio system is no exception. Speakers with increasingly intelligent functions not only inherit the functions of traditional audio systems, but also serve as an important part of smart homes. You can also control smart home devices, such as opening smart door / window loc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G10L15/22G10L17/02G10L17/22H04L12/28
CPCG06F21/32G06F2221/2133G10L15/22G10L17/02G10L17/22G10L2015/223H04L12/282
Inventor 陈翰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products