Abstract

The work is devoted to the study of commercially oriented software systems for organizing people's communication and the formation of proposals for expanding their functional capabilities, including by expanding the methods of communication and increasing the level of safety of using the tool. Voice assistants or assistants are software that can perform tasks or services for the user based on given voice commands, that is, by processing and interpreting human speech. Possibilities of expanding the standard functionality of applications, which provide for communication between users and with the system, by introducing a voice assistant into the key functions of the application, are considered. To increase the level of application data security, an analysis of existing encryption tools was performed and a proprietary algorithm based on cryptographic encryption was proposed. Ensuring confidentiality and preserving the reliability of access to the program is proposed to be implemented on the basis of user identification technologies, in particular, the use of a human identification algorithm based on characteristic points on the face. To determine the effectiveness and competitiveness of the future system, an analysis of key indicators, the achievement of which must be ensured during the development process (indicators of functional completeness, portability, expansion, productivity, competitiveness in comparison with analogues) was carried out. Factors related to requirements management, change management, and documentation processes were taken into account when analyzing the commercial development and use of a product on a startup basis. The stages of the formation of the technical task for the system with the involvement of expert groups are described in detail. Ways of improvement that will ensure a high level of success of the future application are given. The architecture of the system based on the client-server approach is designed in such a way that it allows changes to be made both at the external (connection of third-party modules) and at the internal levels (modification of existing system components and addition of new ones).

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call