Disclosure of Invention
The invention aims to provide a method and a system for rapidly distributing a network based on voice masking, aiming at the defects of the prior art, so that the network can be rapidly distributed for intelligent hardware, and the network distribution process is rapid and safe.
In order to achieve the purpose, the invention adopts the following technical scheme:
a rapid network distribution method based on voice masking comprises the following steps:
sending first voice broadcast information to wake up intelligent hardware;
sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
and sending the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and generating and returning voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password.
Preferably, the method further comprises the following steps:
searching and displaying SSID in a preset range;
and acquiring the SSID input by the user and the password of the SSID.
Preferably, the second voice broadcast information for voice masking includes:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
Preferably, synchronizing the encryption public key and the hash algorithm to the second voice broadcast message comprises:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the step of sending the SSID and the SSID password through the third voice broadcast message for voice masking includes:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
Correspondingly, a rapid network distribution system based on voice masking is also provided, which comprises:
the sending and awakening module is used for sending first voice broadcast information to awaken the intelligent hardware;
the sending prompting module is used for sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information and enters the distribution network mode;
and the sending distribution network module is used for sending the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware generates and returns voice broadcast information of successful/failed SSID connection for voice masking after receiving the SSID password.
Preferably, the method further comprises the following steps:
the searching and displaying module is used for searching and displaying the SSID within the preset range;
and the acquisition module is used for acquiring the SSID input by the user and the password of the SSID.
Preferably, the sending prompting module includes:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
Preferably, the synchronous synthesizing unit includes:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the distribution network sending module includes:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
Compared with the prior art, the method has the advantages that the voice information of the distribution network is coded and masked and then transmitted to the intelligent hardware, the network name and the password of the distribution network are encrypted, the distribution network information is prevented from being directly heard by a third party, and the safety is high; through voice coding transmission, a fault-tolerant mechanism is provided, voice recognition is not relied on, and the accuracy is better; and the distribution network speed is faster, and the experience is better.
Detailed Description
The following are specific embodiments of the present invention and are further described with reference to the drawings, but the present invention is not limited to these embodiments.
Example one
The embodiment provides a fast network distribution method based on voice masking, as shown in fig. 1, including the steps of:
s11, sending first voice broadcast information to wake up intelligent hardware;
s12, sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
and S13, sending the SSID and the SSID password to the intelligent hardware through the third voice broadcast information for voice masking, and generating and returning the voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password.
With the continuous popularization of smart homes, the concept of smart homes developed so far in the household appliance industry is rapidly rolling up the whole industry, the existing smart hardware products all depend on network services, the equipment distribution network also becomes one of the most core functions of the smart hardware, and most of the distribution networks of the smart hardware in the prior art have the defects of too complex distribution network process or low safety and the like.
The fast network distribution method based on voice masking provided by the embodiment completes network distribution by utilizing the intelligent APP to perform voice interaction with intelligent hardware.
Step S11, the intelligent device plays the awakening words to awaken the intelligent hardware, the intelligent hardware replies the device ready after receiving the voice broadcast information, and the round of interaction does not contain the voice information of the masking codes. For example: the mobile phone broadcasts a wake-up word 'magic rabbit' from tts (text To speech), and the intelligent hardware replies 'magic rabbit serving you'. In the preferred mode of this embodiment, the smart machine reports voice prompt user near intelligent hardware automatically to play the frame and confirm, the user reports voice message near intelligent hardware in order to improve intelligent hardware's the rate of clearness of listening to.
Step S12 the intelligent device (such as mobile phone) plays tts ' please enter distribution network mode ' with masking code voice information to prompt the intelligent hardware to enter distribution network mode, and the intelligent hardware replies tts ' magic rabbit ' with masking code voice information has already entered distribution network mode ' after receiving the prompt. The call is mainly used for exchanging keys between the intelligent equipment and the equipment to be networked. Preferably, the second voice broadcast information for voice masking includes:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
The specific key information is as follows:
and the key and hash algorithm code of the sha security algorithm generated by the intelligent app is coded in the 'please enter the distribution network mode'.
The 'magic rabbit is already in a distribution network mode' and a sha public key generated by intelligent hardware and a selected hash algorithm are coded. The key and algorithm have been encrypted using the app's key.
Preferably, synchronizing the encryption public key and the hash algorithm to the second voice broadcast message comprises:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
Step S13, the intelligent device (such as a mobile phone) plays tts with the masking code voice information, such as 'please start networking now', the intelligent hardware to be networked (such as a sound box) starts to connect with the corresponding AP, and generates tts 'success/failure of connection route ssid' with the masking code voice information according to the result and broadcasts. The process mainly transmits the ssid and the password and feeds back the distribution network result, and the specific coding information is as follows:
the ssid and password are encoded in "please start networking now", and encrypted using the speaker public key.
The "success/failure of connection routing ssid" encodes the distribution network result and uses the public key encryption of the app side.
Preferably, the step of sending the SSID and the SSID password through the third voice broadcast message for voice masking includes:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
The voice masking of the embodiment is based on controlling frequency bands of tts voice and coding signals, coding information such as ssid and password through voice signals, and masking the coding signals by noise, so that the aim of synchronously and safely transmitting information is fulfilled when a voice command is sent. The specific process is as follows:
after the tts voice command is generated, the tts voice frequency spectrum is limited within a certain range such as 20-1000hz through a band-pass filter. The highest cut-off frequency is denoted f0, the normalized amplitude of the control tts is a0 (range 0-1), and the commands and notes are encoded in advance, for example, with a length of 2bytes to encode all commands and results. If entering a distribution network: 0x 4755; and (3) network distribution success: 0x 4565. ssid fixes maximum length 32bytes ascii, password maximum 32bytes ascii, and complement 0 if insufficient.
Using a frequency signal of N times f0 (for simplicity of explanation, a sine wave of 4khz, for example, is selected here) as the carrier wave, the coded command is modulated, and if the carrier wave with no 16 cycles represents 1bit, 0 represents a carrier signal amplitude (e.g., 0), and 1 represents a carrier signal amplitude (e.g., 1). Meanwhile, in order to improve the anti-interference capability, the binary system of the data to be modulated is inverted, another frequency such as (Nf0+ f0) is used for modulation, finally the amplitude of the modulated signal is attenuated to A0-3DB, the adjustment method is not limited, higher frequency division multiple access and code division multiple access technologies can be used, and the selection is preferably limited according to the processing capability of the project cpu and the project factors.
Synthesizing the tts voice signal of the command language and the coded voice signal, adding a certain amount of white noise, and synthesizing the tts voice as seed code.
After the intelligent hardware speech recognition awakens the word and enters the distribution network instruction, the decoding module starts to work, and the principle of the decoding module is as follows:
the decoding module obtains the wake-up and command speech and passes through a band-pass filter, the frequency range is determined based on the encoded frequency range, such as N4, f 01 khz, the frequency range is changed to a lower limit frequency f 1-4.1-4 khz 3600hz, and an upper line frequency f 1-5 khz + 0.1-5 khz 5500hz.
Extracting two coded signals of 4k and 5k by using a plurality of narrow-band filters, decoding the signals according to a coding rule, restoring coded information, and correcting errors based on the two paths of information.
Correspondingly, the present embodiment further provides a fast network distribution system based on voice masking, as shown in fig. 2, including:
the sending and awakening module 11 is used for sending first voice broadcast information to awaken the intelligent hardware;
the sending prompting module 12 is configured to send second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information and enters the distribution network mode;
and the sending distribution network module 13 is configured to send the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware receives the SSID password and then generates and returns voice broadcast information of successful/failed SSID connection for voice masking.
Preferably, the sending prompting module includes:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
Preferably, the synchronous synthesizing unit includes:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the distribution network sending module includes:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
In the embodiment, the voice information of the distribution network of the intelligent hardware is coded and masked and then transmitted, and the network name and the password of the distribution network are encrypted, so that the distribution network information is prevented from being directly heard by a third party, and the safety is high; through voice coding transmission, a fault-tolerant mechanism is provided, voice recognition is not relied on, and the accuracy is better; and the distribution network speed is faster, and the experience is better.
Example two
The embodiment provides a fast network distribution method based on voice masking, which is different from the first embodiment in that the first embodiment further includes step S21 and step S22, and the method is implemented by autonomously searching and displaying a nearby network list through an intelligent APP, so that a user can select a network name of an intelligent hardware distribution network, and the method is favorable for orderly management of the intelligent hardware distribution network by the user, and as shown in fig. 3, the method includes the steps of:
s21, searching and displaying SSID in a preset range;
s22, acquiring an SSID (service set identifier) input by a user and a password of the SSID;
s23, sending first voice broadcast information to wake up intelligent hardware;
s24, sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
and S25, sending the SSID and the SSID password to the intelligent hardware through the third voice broadcast information for voice masking, and generating and returning the voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password.
Preferably, the second voice broadcast information for voice masking includes:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
Preferably, synchronizing the encryption public key and the hash algorithm to the second voice broadcast message comprises:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the step of sending the SSID and the SSID password through the third voice broadcast message for voice masking includes:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
Correspondingly, this embodiment further provides a fast network distribution system based on voice masking, as shown in fig. 4, including:
a search display module 21, configured to search and display SSIDs within a preset range;
the obtaining module 22 is configured to obtain an SSID input by a user and a password of the SSID.
The sending and awakening module 23 is configured to send first voice broadcast information to awaken the intelligent hardware;
the sending prompting module 24 is configured to send second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information to enter the distribution network mode;
and the sending distribution network module 25 is configured to send the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware receives the SSID password and then generates and returns voice broadcast information on success/failure of SSID connection for voice masking.
The difference from the first embodiment. The embodiment further comprises a search display module 21 and an acquisition module 22.
Preferably, the sending prompting module includes:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
Preferably, the synchronous synthesizing unit includes:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the distribution network sending module includes:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
According to the embodiment, the user can select the network name of the intelligent hardware distribution network by independently searching and displaying the nearby network list through the intelligent APP, and the ordered management of the user on the intelligent hardware distribution network is facilitated.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.