Secure remote voice activation system using a password
First Claim
1. A method of remotely generating a control signal prompted by an audible voice command, said method comprising the steps of:
- receiving an audible voice password in a remote controller;
digitizing the voice password;
transmitting an ID and the digitized password from the remote controller to a base station;
confirming the ID;
performing speech recognition on the password;
confirming the password;
receiving an audible voice command in the controller;
digitizing the command;
transmitting the digitized command from the controller to the base station;
performing speech recognition on the command;
confirming the command to indicate transmission of a desired control signal by the base station; and
transmitting the control signal from the base station in response to the command.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of secure remote control by voice wherein the digitization and speech recognition functions are separated, which involves receiving an audible voice password in a remote controller, digitizing the voice password, and transmitting the digitized voice password and an ID from the controller to a base station. The method also includes confirming the ID and the password in the base station, receiving an audible voice command in the controller, and digitizing the command. The method still further includes transmitting the digitized command from the controller to the base station, confirming the command to indicate transmission of a desired control signal by the base station, and transmitting the control signal from the base station in response to the command.
53 Citations
30 Claims
-
1. A method of remotely generating a control signal prompted by an audible voice command, said method comprising the steps of:
-
receiving an audible voice password in a remote controller;
digitizing the voice password;
transmitting an ID and the digitized password from the remote controller to a base station;
confirming the ID;
performing speech recognition on the password;
confirming the password;
receiving an audible voice command in the controller;
digitizing the command;
transmitting the digitized command from the controller to the base station;
performing speech recognition on the command;
confirming the command to indicate transmission of a desired control signal by the base station; and
transmitting the control signal from the base station in response to the command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
encrypting the voice command; and
transmitting an encrypted digitized voice command from the controller to the base station.
-
-
7. A method according to claim 1 wherein said step of transmitting the digitized voice command further comprises the steps of:
-
encoding the voice command such that the command is Manchester encoded;
andtransmitting the Manchester encoded digitized voice command from the controller to the base station.
-
-
8. A method according to claim 1 further comprising the step of searching for other remote controllers before transmitting an ID.
-
9. A method according to claim 8 wherein said step of searching further comprises the step of searching for a Manchester encoded signal.
-
10. A method according to claim 9 wherein said step of searching for a Manchester encoded signal further comprises the steps of:
-
attempting to receive a Manchester encoded signal;
attempting to derive a Manchester clock; and
disabling transmission of data from the controller if a Manchester clock is derived.
-
-
11. A method according to claim 1 wherein said step of confirming the ID further comprises the steps of:
-
transmitting the ID from the base station to the controller;
transmitting an ID confirmation from the base station to the controller; and
generating an audible signal from the controller.
-
-
12. A method according to claim 1 wherein said step of transmitting the control signal from the base station further comprises the step of generating an audible confirmation from the base station.
-
13. A method according to claim 12 wherein said step of generating an audible confirmation further comprises the step of generating a phonemic audible confirmation.
-
14. A method according to claim 1 wherein said step of transmitting the control signal from the base station further comprises the step of generating an audible signal from the controller.
-
15. A method according to claim 1 wherein said step of transmitting the control signal from the base station further comprises the steps of:
-
generating an audible signal from the base station; and
generating an audible signal from the controller.
-
-
16. A method according to claim 1 wherein said step of confirming the ID further comprises the step of confirming the ID to enable receipt of a digitized voice password by the base station.
-
17. A method according to claim 1 wherein said step of confirming the password further comprises the step of confirming the password to enable receipt of a digitized voice command by the base station.
-
18. A remote voice activation system comprising:
-
a controller configured to receive an audible password from a user, said controller further configured to digitize the password and make a wireless transmission of an encoded digital ID and the digitized password;
a base station in wireless communication with said controller, said base station configured to receive the encoded digital ID for identification of said controller, said base station further configured to receive the digitized password, said base station comprising;
a speech recognition unit with supporting memory to generate at least one control signal in response to receipt of a voice command;
a micro-controller electrically coupled to said speech recognition unit, said micro-controller configured to receive the control signal from said speech recognition unit; and
a data bus interface electrically coupled to said micro-controller, said data bus interface configured to transmit the control signal. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
a micro-controller; and
a power supply circuit comprising;
an N-Channel mosfet electrically connected to a battery and said micro-controller;
a pnp transistor electrically connected to the battery in parallel to said mosfet; and
a switch mode power supply with boost mode topology electrically connected to said transistor and said micro-controller.
-
-
24. A system according to claim 18 wherein said controller further configured to encode the digitized password.
-
25. A system according to claim 18 wherein said controller further configured to search for an encoded signal before transmitting the ID and the password.
-
26. A system according to claim 18 wherein said controller comprises an audio output configured to generate an audible confirmation if the ID is a valid ID.
-
27. A system according to claim 18 wherein said controller further configured to:
-
receive a voice command from the user;
digitize the command; and
transmit the digitized command.
-
-
28. A system according to claim 27, wherein said controller further configured to encrypt the digitized command.
-
29. A system according to claim 28, wherein said controller further configured to encode the encrypted digitized command.
-
30. A system according to claim 18 wherein said base station further configured to:
-
be mounted in an automobile; and
utilize 12 volt electricity.
-
Specification