Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice attack detection method and device and network equipment

A technology for voice detection and network equipment, applied in the field of Internet of Things security, can solve the problems of not being able to detect whether the voice signal is a specific user, and home equipment being vulnerable to attacks.

Active Publication Date: 2019-07-05
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a voice recognition attack detection method, device and network equipment, which solves the problem in the prior art that it is impossible to detect whether the collected voice signal is a voice signal sent by a specific user, which makes the home equipment vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice attack detection method and device and network equipment
  • Voice attack detection method and device and network equipment
  • Voice attack detection method and device and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present application in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, not all of the embodiments. Based on the embodiments of the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present application.

[0048] The voice recognition attack detection method provided by the embodiment of the present invention can be applied to figure 1 In the system architecture described, the system may include at least one home device, network device, and cloud server.

[0049] At least one home device may establish a communication connection with the network device in a wired or wireless manner, and the network device may also establish a communication connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voice attack detection method, a voice attack detection device and network equipment. The method comprises the following steps: acquiring the signal intensity of a to-be-identified voice signal by adopting a preset voice detection algorithm on the acquired to-be-identified voice signal; if the signal strength is greater than a preset strength threshold value and the userterminal corresponding to the stored terminal identifier and the network equipment are in an off state, determining that the voice signal to be identified is an aggressive voice signal, and matching the equipment identifier which is in a wake-up state at present with the stored equipment identifier to be protected; if the successfully matched equipment identifier exists, reducing the current network bandwidth of the household equipment corresponding to the successfully matched equipment identifier by a preset bandwidth value to obtain a reduced network bandwidth; and maintaining the reduced network bandwidth within the first preset time period. According to the method, the operation safety of the household equipment is improved, the household equipment is protected by reducing the currentnetwork bandwidth, and the use safety of the household equipment is further improved.

Description

Technical field [0001] This application relates to the field of Internet of Things security technologies, and in particular to a detection method, device and network equipment for voice attacks. Background technique [0002] Voice recognition technology has been widely used in various home devices, such as home appliances, smart speakers, etc. Humans interact with home devices through voice to control the behavior of home devices, such as power switches and parameter adjustments of home appliances. [0003] The voice recognition process for home devices includes device wake-up and command recognition. Device wake-up is generally local recognition of the wake-up words of the voice signal in the voice signal, command recognition, there are two types of local recognition of the command word of the voice signal in the voice signal and the cloud server recognition of the command word of the voice signal in the voice signal the way. Among them, online command recognition is a process i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G10L25/18G10L25/21G10L15/22H04L12/28
CPCG10L15/22G10L25/18G10L25/21H04L12/2834H04L63/1416H04L67/10
Inventor 李开
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products