Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice attack detection method, device and network equipment

A technology of voice detection and network equipment, which is applied in the field of Internet of Things security, can solve the problems that home equipment is vulnerable to attacks, and cannot detect whether the voice signal is a specific user, etc., so as to improve the use security, avoid attacks, and improve operation security.

Active Publication Date: 2021-07-13
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a voice recognition attack detection method, device and network equipment, which solves the problem in the prior art that it is impossible to detect whether the collected voice signal is a voice signal sent by a specific user, which makes the home equipment vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice attack detection method, device and network equipment
  • Voice attack detection method, device and network equipment
  • Voice attack detection method, device and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]Next, the technical scheme in the present application embodiment will be described in the present application embodiment, and it is clear that the described embodiments are intended to be described herein, not all of the embodiments of the present application. Based on the embodiment of the present application, one of ordinary skill in the art does not have all other embodiments obtained by creative labor, which are the scope of the present application.

[0048] The detection method of the speech recognition attack provided by the embodiment of the present invention can be applied figure 1 In the system architecture, the system can include at least one home device, network device, and cloud server.

[0049] At least one home device can establish a communication connection with the network device through wired or wireless mode, and network devices can also establish a communication connection with the cloud server via wired or wirelessly. The network device can include one or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a voice attack detection method, device and network equipment. The method adopts a preset voice detection algorithm for the collected voice signal to be recognized, and after obtaining the signal strength of the voice signal to be recognized; if the signal strength is greater than the preset strength threshold, and the user terminal corresponding to the stored terminal identifier is disconnected from the network device state, it is determined that the voice signal to be recognized is an offensive voice signal, and the device ID currently in the wake-up state is matched with the stored device ID to be protected; if there is a successfully matched device ID, the corresponding The current network bandwidth of the home device is reduced by a preset bandwidth value to obtain a reduced network bandwidth; within the first preset time period, the reduced network bandwidth is maintained. The method improves the operation safety of the home equipment, and protects the home equipment by reducing the current network bandwidth, thereby further improving the use safety of the home equipment.

Description

Technical field [0001] The present application relates to the field of Internet security technology, in particular, to a method, apparatus, and network device of a voice attack. Background technique [0002] Voice identification technology has been widely used in a variety of home appliances, such as home appliances, smart speakers, etc., people interact through voice to control home equipment, such as home appliance power switch, parameter adjustment, etc. [0003] The speech recognition process for home devices contains device wake-up and command identification. The device wakes up, generally identifies the wake-up word of the voice signal in the voice signal, command identification, and the command word of the voice signal in the voice signal is used to identify the word word for the voice signal in the voice signal. the way. The online command identifies that the voice signal is sent to the cloud server, and the cloud server sends the identification result to the local proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G10L25/18G10L25/21G10L15/22H04L12/28
CPCG10L15/22G10L25/18G10L25/21H04L12/2834H04L63/1416H04L67/10
Inventor 李开
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products