-
公开(公告)号:US11551699B2
公开(公告)日:2023-01-10
申请号:US17052736
申请日:2019-04-30
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Junho Huh , Hyoungshik Kim , Muhammad Ejaz Ahmed , Ilyoup Kwak , Iljoo Kim , Sangjoon Je
Abstract: Provided are a method of authenticating a voice input provided from a user and a method of detecting a voice input having a strong attack tendency. The voice input authentication method includes: receiving the voice input; obtaining, from the voice input, signal characteristic data representing signal characteristics of the voice input; and authenticating the voice input by applying the obtained signal characteristic data to a first learning model configured to determine an attribute of the voice input, wherein the first learning model is trained to determine the attribute of the voice input based on a voice uttered by a person and a voice output by an apparatus.
-
公开(公告)号:US20190182271A1
公开(公告)日:2019-06-13
申请号:US16212083
申请日:2018-12-06
Applicant: Samsung Electronics Co., Ltd.
Inventor: Jungil Cho , Iljoo Kim , Hyunwoo Kim , Daesung Choi
Abstract: A server is provided. The server includes a communication interface configured to communicate with an electronic apparatus connected to an Internet of things (IoT) device, a storage configured to store a scenario about an attack received by the IoT device from an external apparatus by stages and information relating to a malicious code corresponding to the scenario, and a processor configured to, based on the IoT device being attacked by the external apparatus over at least one step through the electronic apparatus, receive, from the electronic apparatus, an alert for an attack received by stages, and to identify information relating to a malicious code corresponding to at least one alert received from the electronic apparatus based on the pre-stored scenario.
-
公开(公告)号:US11038901B2
公开(公告)日:2021-06-15
申请号:US16212083
申请日:2018-12-06
Applicant: Samsung Electronics Co., Ltd.
Inventor: Jungil Cho , Iljoo Kim , Hyunwoo Kim , Daesung Choi
Abstract: A server is provided. The server includes a communication interface configured to communicate with an electronic apparatus connected to an Internet of things (IoT) device, a storage configured to store a scenario about an attack received by the IoT device from an external apparatus by stages and information relating to a malicious code corresponding to the scenario, and a processor configured to, based on the IoT device being attacked by the external apparatus over at least one step through the electronic apparatus, receive, from the electronic apparatus, an alert for an attack received by stages, and to identify information relating to a malicious code corresponding to at least one alert received from the electronic apparatus based on the pre-stored scenario.
-
-