Preventing of audio attacks
First Claim
Patent Images
1. A method comprising:
- receiving, over a network by a server and from a first device, a first message, where the first message includes encrypted audio data that indicates that the first device detected that an improper voice command was audibly output by the first device;
in response to receiving the first message that indicates that the first device detected that the improper voice command was audibly output by the first device;
identifying, by the server, a user account associated with the first device based on the first message;
identifying, by the server, a second device associated with the user account; and
sending, over the network by the server to the second device, a second message, where the second message indicates that a voice command corresponding to the improper voice command that is captured by a microphone of the second device should not be performed.
2 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method is performed by computing devices, and includes receiving a first message indicating that an improper voice command has been detected by a first device, identifying a user account associated with the first device based on the first message, identifying a second device associated with the user account, and, in response to receiving the first message indicating that the voice command detected by the first device is improper, sending a second message to the second device, the second message indicating that the voice command should not be performed.
27 Citations
19 Claims
-
1. A method comprising:
-
receiving, over a network by a server and from a first device, a first message, where the first message includes encrypted audio data that indicates that the first device detected that an improper voice command was audibly output by the first device; in response to receiving the first message that indicates that the first device detected that the improper voice command was audibly output by the first device; identifying, by the server, a user account associated with the first device based on the first message; identifying, by the server, a second device associated with the user account; and sending, over the network by the server to the second device, a second message, where the second message indicates that a voice command corresponding to the improper voice command that is captured by a microphone of the second device should not be performed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving, over a network by a server and from a first device, a first message, where the first message includes encrypted audio data that indicates that the first device detected that an improper voice command was audibly output by the first device; in response to receiving the first message that indicates that the first device detected that the improper voice command was audibly output by the first device; identifying, by the server, a user account associated with the first device based on the first message; identifying, by the server, a second device associated with the user account; and sending, over the network by the server to the second device, a second message, where the second message indicates that a voice command corresponding to the improper voice command that is captured by a microphone of the second device should not be performed.
-
-
19. A computer-readable storage device storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, over a network by a server and from a first device, a first message, where the first message includes encrypted audio data that indicates that the first device detected that an improper voice command was audibly output by the first device; in response to receiving the first message that indicates that the first device detected that the improper voice command was audibly output by the first device; identifying, by the server, a user account associated with the first device based on the first message; identifying, by the server, a second device associated with the user account; and sending, over the network by the server to the second device, a second message, where the second message indicates that a voice command corresponding to the improper voice command that is captured by a microphone of the second device should not be performed.
-
Specification