A secondary authentication method suitable for voice command responses of smart devices

A voice command, smart device technology, applied in speech analysis, voice recognition, home automation network and other directions, can solve the problem that smart devices do not have authority identification, are insecure, cannot recognize unauthorized instructions, etc., and achieve smooth human-computer interaction. The effect of secondary authentication method, high security, and low power consumption

Active Publication Date: 2021-07-27
SOUTHEAST UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is to overcome the deficiencies of the prior art, provide a secondary authentication method suitable for voice command responses of smart devices, and solve the problem that smart devices do not have authority authentication and cannot recognize unauthorized commands, resulting in smart Unsafe problems introduced by equipment operation control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secondary authentication method suitable for voice command responses of smart devices
  • A secondary authentication method suitable for voice command responses of smart devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0033] like figure 1 As shown, the present invention designs a secondary authentication method suitable for voice command responses of smart devices. In the method, the smart device recognizes the type of the monitored voice commands, and if there are no non-control commands related to security, general commands are performed. Execute the response, and if it involves safety control commands, judge the feature threshold according to the voice sample information to determine whether to refuse to execute the corresponding control commands for children, thus effectively preventing children from controlling smart home devices through voice. The smart device recognizes the location of the monitored voice command to determine whether the voice command is located in the direction of the door. For the voice command received from a direction other than the door, it direct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secondary authentication method suitable for voice command responses of intelligent equipment, comprising: voice monitoring, obtaining the monitored voice commands; pre-classifying types into control and non-control commands; recognizing the monitoring voice commands, Execute when it is recognized as a non-control sequence command, otherwise extract the feature threshold at a certain voice frequency and compare it with the pre-built voice sample information to determine whether the adder is a child: if yes, give an alarm and refuse to execute; Otherwise, compare the direction of the identified sound source with the direction of the sound source sample at the door to determine whether the applicator is in the direction of the door: if it is judged to be in a direction other than the door, execute the command, otherwise execute whether it is in the direction of the door Second confirmation: according to again The identified direction of the sound source is compared with the direction of the sound source sample. When it is judged to be at the door again, it is judged to be outside the door; otherwise, it is judged to be inside the door and the command is executed. The invention realizes the effective security control on the intelligent equipment.

Description

technical field [0001] The invention relates to a secondary authentication method suitable for voice command responses of intelligent equipment, and belongs to the technical field of security control. Background technique [0002] Compared with traditional speakers, smart speakers are an upgraded product of speakers in smart devices. The latter, as the terminal of the entire audio system, only converts audio power into corresponding sound energy and radiates it to the space; while smart speakers are considered to be the entrance of the Internet of Things era. In the Internet age, what users face is no longer a scattered combination of various home appliances and mobile devices, but an organic whole, and the audio system is no exception. Speakers with increasingly intelligent functions not only inherit the functions of traditional audio systems, but also serve as an important part of smart homes. You can also control smart home devices, such as opening smart door / window loc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G10L15/22G10L17/02G10L17/22H04L12/28
CPCG06F21/32G06F2221/2133G10L15/22G10L17/02G10L17/22G10L2015/223H04L12/282
Inventor 陈翰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products