CPC G06F 3/04817 (2013.01) [G06F 3/03543 (2013.01); G06F 3/0484 (2013.01); G06F 3/0488 (2013.01); G06F 3/167 (2013.01); B61L 27/10 (2022.01); G08B 21/18 (2013.01)] | 5 Claims |
1. A secure operation method for an icon based on a voice-screen-mouse ternary verification, comprising: verifying and comparing a first icon associated with a voice of an operator, a second icon displayed on a screen and used to specify an operation, and a third icon configured to be directed by a mouse when the mouse stops moving, and giving a permission and a warning of the operation by a system; wherein an association between a predetermined voice and the first icon is firstly established, the first icon is activated by a voice input of a voice recognition system, and then the verifying and comparing is performed on the first icon with the third icon, wherein the secure operation method specifically comprises the following steps:
step 1, an association setting of the voice and the first icon: setting a corresponding relationship between the voice and the first icon to build a voice icon;
step 2, associating the voice icon with the voice recognition system: when the voice recognition system receives the predetermined voice, activating the first icon;
step 3, an association setting of the mouse and the third icon: when the mouse stays in an icon area not activated by the voice, performing the association setting of the mouse and the third icon according to a level of a safety production requirement; and
step 4, setting a screen area when the mouse is not operated: setting a staging area on the screen for the mouse when the mouse is not operated,
wherein in step 4, when the mouse is placed in the staging area, the voice recognition system automatically turns off a voice receiving function; when the mouse is not operated and the mouse is not placed in the staging area after a preset time, the staging area displays an alarm.
|