Voice-based BLE networking internal control system and method
A control method and control system technology, which is applied in the field of voice-based BLE network control system, can solve the problems of limited instruction set, high equipment requirements, and functional realization limitations, so as to avoid strangers from using, easy to use, cost-saving effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] according to figure 1 , 2 As shown, the present embodiment proposes a voice-based control system in the BLE network, including a small program module, a semantic cloud service module, a BLE module and various devices, the small program module is provided with an audio collection module, the described The semantic cloud service module includes an audio interpretation module and an audio recognition module;
[0037] The BLE module has a communication function, and the BLE module is responsible for the communication between the applet module and each device, and the communication between each device, and each device has the function of executing instructions and forwarding instructions.
[0038] The applet module is connected to the semantic cloud service module, the audio recognition is realized through the audio interpretation module and the audio recognition module, the voice input is realized through the audio collection module, and each device is connected to the net...
Embodiment 2
[0041] according to figure 1 , 2 As shown, this embodiment proposes a voice-based BLE network control method, including the following steps:
[0042] Step 1: Audio Collection
[0043]Set the audio collection module in the applet module, responsible for audio collection, and forward the collected audio to the semantic cloud service module. The applet module is based on the mobile phone client, and the applet module is equipped with fingerprint and face recognition modules. After the face recognition module determines the identity of the user, it starts the applet module to run, which is more secure and avoids strangers from using it. The communication between the applet module and the semantic cloud service module adopts encryption function, and the two parties in the communication use the same key. Use the command [ 0xC6+16Byte password] Turn on the AES encryption function, select the AS62-T30 wireless module for encrypted communication, and use the hexadecimal password conf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

