发明名称 Dialogue-driven user security levels
摘要 Natural language controlled devices may be implemented in an environment where the devices are configured to operate with multiple different users. The techniques described herein implement security requirements for a device configured to operate in an environment where the multiple different users may request functionality. The security requirements may be implemented based on the whether the functionality requested is personal and/or secured.
申请公布号 US9147054(B1) 申请公布日期 2015.09.29
申请号 US201213720713 申请日期 2012.12.19
申请人 Amazon Technolgies, Inc. 发明人 Beal Jeff Bradley;Owen Robert David;Thimsen John Daniel;Kshirsagar Sumedha Arvind
分类号 G06F21/31;G06F21/32 主分类号 G06F21/31
代理机构 Lee & Hayes, PLLC 代理人 Lee & Hayes, PLLC
主权项 1. A computing system comprising: one or more processors; at least one microphone to receive a plurality of audio inputs from a user, the plurality of audio inputs comprising a first audio input, a second audio input, and a third audio input; one or more computer-readable storage media storing computer-executable instructions; a speech processing module maintained in the one or more computer-readable storage media and executed by the one or more processors to: obtain first speech recognition results from a first signal representing the first audio input;obtain second speech recognition results from a second signal representing the second audio input;obtain third speech recognition results from a third signal representing the third audio input;determine a first requested functionality associated with the first speech recognition results;determine a second requested functionality associated with the second speech recognition results; anddetermine a third requested functionality associated with the third speech recognition results; a security requirements module maintained in the one or more computer-readable storage media and executed by the one or more processors to: determine that there are no security requirements for the first requested functionality;determine an identification security requirement for the second requested functionality;determine an authentication security requirement for the third requested functionality;determine that the identification security requirement is satisfied using identification information received from the user; anddetermine that the authentication security requirement is satisfied using authentication information received from the user; and an application module maintained in the one or more computer-readable storage media and executed by the one or more processors to execute the first requested functionality, the second requested functionality, and the third requested functionality.
地址 Seattle WA US