Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A non-intrusive smart speaker security forensics system and method thereof

A smart speaker, non-invasive technology, applied in transmission systems, digital transmission systems, security communication devices, etc.

Active Publication Date: 2022-06-21
NANJING UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing smart speaker forensics methods are usually intrusive, either by changing the internal devices of the smart speaker, or requiring the support of cloud servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A non-intrusive smart speaker security forensics system and method thereof
  • A non-intrusive smart speaker security forensics system and method thereof
  • A non-intrusive smart speaker security forensics system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Embodiment 1: see figure 1 , a non-intrusive security forensics system for smart speakers, including a network traffic analysis module, a user intent acquisition module, and a forensic analysis module; the network traffic analysis module and the user intent acquisition module jointly provide convenience for the forensic analysis module.

[0047] The network traffic analysis module is used to monitor the network traffic between the smart speaker and the cloud server and analyze the network mode;

[0048] The user intention acquisition module is used to determine the intention of the user, that is, the operation that the user wants the smart speaker to perform;

[0049] The forensic analysis module is combined with the network traffic analysis module and the user intention acquisition module to monitor smart speaker events and collect relevant forensic relationships.

[0050] The forensic analysis module includes a comparison module between instructions and user intentio...

Embodiment 2

[0053] Example 2: see Figure 1-Figure 3 , a non-intrusive evidence collection method for a smart speaker security forensics system, the method includes the following steps:

[0054] Step 1. In the stage of analyzing network traffic, a man-in-the-middle method is used to use a device with ARP spoofing software to act as a middleman to capture all network packets between the smart speaker and the cloud server. According to the captured network data packets, the network mode is extracted, and the current events of the smart speaker are deduced. Then, use the inferred events to determine whether the network traffic is consistent with the user's command and whether the smart speaker is recording the user's voice in real time;

[0055] Step 2, user intent extraction stage, using a recording device with a microphone to record the conversation between the smart speaker and the user. The user's voice is converted into text in real time, and the user's intention is extracted from the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A non-intrusive smart speaker security forensics system and method thereof, including: a network traffic analysis module, a user intent acquisition module, and a forensic analysis module; the method verifies the one-to-one mapping relationship between network traffic patterns and smart speaker behaviors , using an effective method that combines network traffic analysis with user intent extraction and abnormal network traffic alarms to support smart speaker security monitoring. This method can well monitor security risks, protect user privacy and enhance the security of smart speakers, and can send relevant risks or abnormal conditions to users through the APP.

Description

technical field [0001] The invention relates to a non-invasive smart speaker security evidence collection system and a method thereof, belonging to the technical field of computer evidence collection. Background technique [0002] The past few years have seen a rapid increase in the penetration of IoT consumer devices, especially smart speakers. There are many smart speakers on the market, including Xiaomi Smart Speaker, Tmall Genie, Amazon Echo, Google Home and Huawei AI Speaker. Smart speakers can provide real convenience to users, but they can also pose security concerns. Smart speakers can often connect to a cloud server, during which time, even if the user is not activating their speaker, the speaker can eavesdrop on their daily conversations and upload them to the cloud server, violating user privacy. Sensitive information such as passwords, credit card numbers, and home addresses can easily be compromised. [0003] Of the several approaches that have been made to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L61/103G10L15/26G10L15/02G10L15/18G10L15/22
CPCH04L63/1416H04L63/1441H04L61/103G10L15/02G10L15/1822G10L15/22G10L2015/025G10L2015/223
Inventor 伏晓林丽骆斌刘轩宇
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products