VOICE ACTIVATION OF AN ALARM VIA A COMMUNICATION NETWORK
20220130224 · 2022-04-28
Inventors
Cpc classification
G10L15/22
PHYSICS
G08B25/12
PHYSICS
G08B25/005
PHYSICS
G08B21/0469
PHYSICS
International classification
G08B25/00
PHYSICS
G10L15/22
PHYSICS
Abstract
A method for activating an alarm is described. The method is performed by an alarm device connected to a communication network and arranged in the vicinity of a user. The method includes receiving voice data generated by the user, comparing the received voice data with voice data recorded in the alarm device, and, when the received voice data matches recorded voice data, transmitting to a server, via the communication network, textual information known to the server, in order to request assistance for the user, the textual information being non-representative of the voice data generated by the user.
Claims
1. An alarm activation method, the method performed by an alarm device connected to a communication network and arranged close to a user, the method comprising: receiving voice data generated by the user, comparing the received voice data with voice data recorded in the alarm device, and upon a determination that the received voice data corresponds to recorded voice data, transmitting, to a server, via the communication network, textual information known to the server in order to request assistance for the user, the textual information being associated with the voice data generated by the user without revealing the voice data.
2. The method of claim 1, wherein the communication network is a low-speed network.
3. The method of claim 1, wherein the voice data that are compared are audio data.
4. The method of claim 1, wherein the voice data that are compared are textual data.
5. The method of claim 1, wherein the voice data correspond to a keyword.
6. The method of claim 1, wherein the textual information is an identifier of the alarm device.
7. The method of claim 1, wherein the textual information is an identifier of the alarm device that is coupled to a textual transcription of the keyword implemented by the alarm device.
8. The method of claim 1, wherein the textual information has been recorded on the server in association with a plurality of contacts from which assistance for the user may be requested.
9. The method of claim 8, wherein the contacts are classified in a given order.
10. The method of claim 9, wherein the contact classified in first place is a communication identifier of the user.
11. An alarm device configured to be arranged close to a user and connected to a communication network, the alarm device comprising a processor, the alarm device configured to: receive voice data generated by a user, compare the received voice data with voice data recorded in the alarm device, and upon a determination that the received voice data corresponds to recorded voice data, transmit, to a server, via the communication network, textual information known to the server in order to request assistance for the user, the textual information being associated with the voice data generated by the user without revealing the voice data.
12. A computer program stored on a non-transitory, computer readable medium, the computer program comprising instructions which, when executed on a processor, cause the processor to implement the method of claim 1.
13. A non-transitory, computer-readable storage medium having stored thereon instructions which, when executed by a processor, cause the processor to perform the method of claim 1.
Description
4. BRIEF DESCRIPTION OF THE DRAWINGS
[0042] Other features and advantages will become apparent on reading particular embodiments of the invention, which are given by way of illustrative and non-limiting example, and the appended drawings, in which:
[0043]
[0044]
[0045]
5. DETAILED DESCRIPTION OF ONE EMBODIMENT OF THE INVENTION
5.1 Architectural Environment
[0046]
[0047]
[0059] According to one exemplary embodiment, the alarm device AL is installed in the home of the user UT, preferably in a room where the user UT is often located. The alarm device AL is operational when the user UT is a few meters away from it.
[0060] According to the invention, the alarm device AL and the server SER communicate with one another via a data communication network, for example a low-speed network RCBD, for example dedicated to the Internet of Things (IoT). Such a communication network is for example the LoRa®, Sigfox®, Qowisio®, etc. network.
[0061] As a variant, the data communication network may be an x-DSL, fiber or even cellular network (for example in accordance with the 2G (GSM, GPRS, EDGE), 3G (UMTS), 4G (LTE), LTE-A, LTE-M, WCDMA, CDMA2000, HSPA or 5G standards or their variants or evolutions), another type of radio network (for example Wi-Fi® or Bluetooth®), an IP (Internet Protocol) network, a combination of several of these networks, etc. The server SER and the communication server SC communicate with one another via any type of communication network (not shown). This may be for example an IP network or an x-DSL, fiber or even 3G, 4G, 5G, etc. network. If the servers SER and SC are close to one another, they may also communicate via a wireless local area network, in particular a Wi-Fi or PLC (abbreviation for “power line communication”) network.
[0062] Although the servers SER and SC are separate in
[0063] The communication server SC is suitable for establishing communication with the contacts from the list LC via any type of network corresponding to the identifiers of these contacts. If for example contact 1 is associated with a landline telephone number, the server SC is configured so as to contain a communication interface with a switched network. If for example contact 1 is also associated with a mobile telephone number, the server SC is configured so as to contain a communication interface with a mobile telephone network. If for example contact 2 is associated with an instant messaging or e-mail identifier, the server SC is configured so as to contain a communication interface with a computer network, such as an Internet network.
5.2 Description of One Embodiment of the Alarm Device
[0064]
[0065] Such an alarm device AL comprises: [0066] one or more microphones MIC, for example multidirectional microphones, configured so as to listen to the voice data DV generated by the user UT, [0067] a reception module REC for receiving the detected voice data DV, [0068] a memory MEM1 designed to store voice data recorded beforehand by the user UT, [0069] a voice analyzer AV, [0070] an optional voice recognition module RV that, because of its optional nature, is shown in dashed lines in
[0072] The alarm device AL is preferably battery-operated.
[0073] As a variant, the alarm device AL is supplied with electric power and contains a battery, which, in the event of disconnection of the electric power supply, is designed to have an autonomy of approximately 1 hour, for example.
[0074] Such an alarm device thus has a very simple structure. As a result, the alarm device is inexpensive to manufacture and therefore to market.
[0075] According to one particular embodiment of the invention, the actions carried out by the alarm activation method are implemented by instructions of a computer program PG. To this end, the alarm device AL has the conventional architecture of a computer and comprises in particular a memory MEM2, a processing unit UT, equipped for example with a processor PROC, and driven by the computer program PG stored in memory MEM2. The computer program PG comprises instructions for implementing the actions of the alarm activation method that will be described below, when the program is executed by the processor PROC, according to any one of the particular embodiments of the invention.
[0076] On initialization, the code instructions of the computer program PG are for example loaded into a RAM memory (not shown), before being executed by the processor PROC. The processor PROC of the processing unit UT implements in particular the actions of the alarm activation method according to the instructions of the computer program PG.
5.3 Description of One Embodiment of the Alarm Activation Method
[0077] With reference to
[0078] Such an alarm activation method requires performing a preliminary configuration S1 of the alarm device AL.
[0079] To this end, with reference to
[0080] The communication terminal TC is for example a mobile telephone, a smartphone, a tablet, a laptop computer, a personal computer (PC), etc.
[0081] The communication terminal TC connects to the server SER via any type of suitable communication network. According to one exemplary embodiment, the user UT connects to the server SER via an access link, said link having been communicated when the alarm device AL was purchased. The connection to the server SER may also be established via a dedicated application downloaded beforehand to the terminal TC.
[0082] In S11, the server SER sends an online registration form FI.
[0083] In S12, the user UT fills in the registration form and enters the following information: [0084] Last name and first name of the user UT, [0085] Communication identifier ID.sub.ut of the user UT: for example telephone number(s) and/or e-mail address(es) of the user UT, [0086] Textual information IT: for example a word in everyday language, a series of numbers and/or letters chosen by the user UT, or even the identifier ID.sub.al of the alarm device AL, such an identifier being for example affixed to the alarm device AL, [0087] the list LC of contacts of the user UT.
[0088] Such a list LC contains N contacts well known to the user UT and that are preferably close enough to said user to intervene rapidly at his home in the event of alarm activation of the alarm device AL. These may be for example close neighbors, a family member of the user UT, or even a support center, the doctor who treats the user UT, etc.
[0089] For each of the N contacts “contact 1”, “contact 2”, . . . , “contact N”, the user associates a name, an address, a preferred communication identifier (mobile telephone number, landline telephone number, e-mail address, instant messaging address, etc.), as well as a schedule of their availability.
[0090] According to one particular embodiment, the N contacts are classified in order of priority to be contacted, the first contact “contact 1” from the list LC being the one who will be contacted first, the second contact “contact 2” from the list LC being the one who will be contacted second if it is impossible to reach the contact “contact 1” or else if said contact 1 declines/is not able to assist the user UT, etc.
[0091] According to one particular embodiment, the first “contact 1” is the user UT, and is therefore associated with one or more communication identifier(s) of the user UT. Thus, in the event of activation of the alarm device AL, the user UT will be contacted first so as to check whether the alarm device AL has been activated by mistake by the user UT, so as to avoid sending for help unnecessarily, and, in any event, to quickly establish contact with the user UT after activation of the alarm device AL.
[0092] In S13, the communication terminal TC transmits the filled-in registration form FI to the server SER.
[0093] In S14, the server SER records, in a correspondence table TAB, the information entered in the registration form FI, thereby ending the procedure of registering the user UT with the alarm activation service offered by the server SER.
[0094] In a second configuration phase S2, the user UT turns on the alarm device AL in S20, for example using a button provided for this purpose.
[0095] In S21, the alarm device AL starts listening following activation of the one or more microphones MIC.
[0096] In S22, the user UT then speaks several keywords DV, around ten for example. Such keywords are words in everyday language that express a state of distress, for example “Emergency”, “Help”, “Fire”, “SOS”, etc.
[0097] In S23, these keywords are detected by the microphone(s) MIC, received by the reception module REC, analyzed by the voice analyzer AV, and then recorded in the memory MEM1.
[0098] If the alarm device AL does not have a voice recognition module, the keywords are recorded in the memory MEM1, directly in an audio format, in S23.
[0099] If the alarm device AL comprises the voice recognition module RV, the keywords that are analyzed by the voice analyzer AV are transcribed in textual form by the voice recognition module RV. The keywords thus transcribed in textual form are then recorded in the memory MEM1 in S23.
[0100] At the end of the configuration phase S2, the alarm device AL is then operational. In order to ensure correct operation thereof, a test may be performed, the user UT speaking one of the recorded keywords.
[0101] A description will now be given, with reference to
[0102] In S30, the user UT is close to the alarm device AL whose microphone(s) are activated and generates voice data DV. If the user UT is in distress, such voice data DV are for example a keyword of the type “Emergency”, “Help”, “Fire”, etc., which are detected by the microphone(s) MIC of the alarm device AL.
[0103] In S31, the receiver REC of the alarm device AL receives the keyword spoken by the user UT.
[0104] In S32, voice analysis is performed on the keyword received by the voice analyzer AV.
[0105] If the alarm device AL does not comprise a voice recognition module, the received keyword is compared directly in S33 with the keywords recorded beforehand in audio format in the memory MEM1 in S23.
[0106] If the alarm device AL comprises a voice recognition module RV, in S320, this transcribes the received keyword in text format.
[0107] If none of the keywords recorded in audio format, respectively in text format, corresponds to the keyword received in audio format, respectively converted into text format, the alarm activation method is ended, the alarm device AL then awaiting the detection of new voice data generated by the user UT.
[0108] If there is a match, the alarm device AL, via its communication interface IC, transmits the textual information IT, recorded in S14 by the server SER, to the server SER in S34 via the communication network RCBD in order to request assistance for the user UT. In the preferred exemplary embodiment, this is the identifier ID.sub.AL of the alarm device AL. In this example, no information openly describing the reasons why the user UT triggered an alarm is transmitted, thereby making the alarm activation method particularly secure since it safeguards against disclosure of the user's “sensitive” personal data to third parties.
[0109] According to another embodiment, if the alarm device AL comprises a voice recognition module RV, the textual information IT transmitted to the server SER in S34 is the identifier ID.sub.AL of the alarm device coupled to the received keyword as transcribed in textual form in S320.
[0110] In S35, the server SER receives the identifier ID.sub.AL, possibly coupled with the keyword transcribed in textual form, and identifies, in its correspondence table TAB, the coordinates of the user UT, as well as the list of contacts LC.
[0111] In S36, the server SER transmits the list LC to the communication server SC from
[0112] If the user UT was mentioned first in the list of contacts LC, the communication server SC establishes communication with the user UT using one of the communication identifiers ID.sub.ut of the user UT that are mentioned in the list LC.
[0113] If the user UT was not mentioned in the list of contacts LC, the communication server SC establishes communication with one of the contacts from the list LC, preferably the first contact “contact 1” from the list LC, using one of the communication identifiers of the contact “contact 1” that are mentioned in the list LC. For example, if such a communication identifier is a telephone number associated with the contact “contact 1”, the server SC telephones the contact “contact 1” and plays to him an audio message of the type: “Mr. UT who lives at the address “15 rue des oiseaux, Boulogne” has activated his alarm device AL. If you agree to respond by visiting his address, press 1, otherwise hang up.”
[0114] If the contact “contact 1” hangs up, the communication server SC establishes a new communication with the contact “contact 2” mentioned in the list LC, and so on, until a contact from the list LC responds that he agrees to assist the user UT.
[0115] It goes without saying that the embodiments described above have been given purely by way of completely non-limiting indication, and that numerous modifications may be easily made by a person skilled in the art without otherwise departing from the scope of the invention.