Performing an action based on secondary user authorization
摘要:
Techniques for implementing a “sticky” user ID are described. A system receives first input audio data and determines first speech processing results therefrom. The system also determines a first user ID of a user that spoke an utterance represented in the first input audio data and associates the first user ID with a device, which originated the first input audio data, for a predetermined length of time. The system determines first output data responsive to the first speech processing data and causes the device to present first output content corresponding thereto. The system then receives second input audio data and determines second speech processing results therefrom. The system also determines a time of receipt of the second input audio data is within the predetermined length of time. Based at least in part thereon, the system determined second output data responsive to the second speech processing data using the first user ID. The system then causes the device to present second output content corresponding to the second output data.
信息查询
0/0