Method and apparatus for remotely processing speech-to-text for entry onto a destination computing system

ABSTRACT

A device and method for using a remote computing system, such as a smartphone or tablet, to convert speech to text through software residing on the system, transmitting the processed text wirelessly and privately to a peripheral, and having the peripheral interface with a destination computing system and appear as a generic human interface device, such as a keyboard, in order to transmit keyboard character codes through the interface to be entered into text boxes or fields on the destination computing system. By appearing to be a keyboard, the peripheral would not be locked out of the destination computing systems, even if the destination computing system is secured against software and hardware installations, restrictions by which other peripheral devices would be limited.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The present invention relates to using speech-to-text processingtransmitted to a peripheral device to enter text into forms or pages ona computing device, and, more particularly, but not by way oflimitation, to entering data such as medical information dictated into adevice such as a smartphone, having the spoken word processed to text,and having a peripheral device presenting as a keyboard interface toenter text into the computing device without the need to installproprietary driver software, such as in computing devices that, forsecurity purposes, do not allow installation of additional software.

2. Description of the Related Art

Many occupations and industries require extensive record keeping for avariety of reasons. In many cases, the data for these records areentered into devices such as personal computers by individuals who mustmanually input these data using keyboards, a method that is still in usein the many decades that office automation has existed. Over the years,the volume and type of data that is required to be stored has increasedas technology advancements allow for greater analysis and use of thedata.

In no industry is this more apparent than health care. Physicians,Nurses, EMTs, and other medical care providers are tasked with keepingvoluminous records for several reasons. Most importantly, these recordsprovide a history of patient care and are used to track illness/injury,treatment, and progress. Other reasons include supporting reimbursementfor health services provided from insurance companies, workers'compensation or government assistance, providing evidence of disabilityfor disability claims, identifying adverse reactions to drugs andtreatments by patients, studying disease trends, and establishingbaselines for treatments.

An Electronic Health Record (EHR) is the health record of an individualstored in and accessed with a computer. The EHR contains current andhistorical medical information that can be used by health care providersin a variety of settings such as a primary care physician's office, along-term care facility, or a local public health department. Hospitalsand clinics routinely use EHR systems to increase efficiency and tomaintain centralized storage of records.

Physicians and other health care providers, as stated before, mustrecord and log large quantities of information on patients within theseEHR systems. This record-keeping is a time-consuming task and reducesthe providers' availability for direct patient care. One way thatphysicians try to make this task less onerous and time-consuming is torecord audio information onto handheld devices, such as smartphones.These recordings are later transcribed for entry by medicaltranscriptionists. Alternatively, handheld devices interface directlywith EHR software employing speech-to-text processing. The handhelddevices deliver spoken medical information to the EHR software, which,in turn, records and stores the medical information, often in acentralized location.

In all industries, the storage of data in centralized locations presentssecurity concerns. This is particularly true in the health care industrywhere a violation of federal and state data privacy requirements imposedupon EHR system hosts can result in extremely large civil penalties.Cybercriminals attack many industries, including health care systems,breaching data storage systems and stealing personal identifiableinformation, with the numbers increasing yearly. In addition to finesfor the improper handling of private health data, these breaches canhave additional consequences, particularly for breaches of medical data.Breaches of medical EHR data can result in not just fines, but the lossof critical information, jeopardizing health care operations. Not onlydo health care operations expend time and funds for fixing the resultsof a breach, but the operations are often forced to close for a periodof time to all but the most critical of new patients, placing lives atrisk.

Accordingly, computer systems storing highly confidential informationmust take such threats even more seriously and implement even higherlevels of security than other industries. Common methods of preventingdata leaks or cyberattacks involve such techniques as limiting access tocertain websites, virus-checking incoming emails, and locking interfaceson computers such as peripheral ports so that potential carriers ofransomware or viruses, including USB flash memory drives, cannot beconnected to computers. These ports can be configured so that onlycertain peripherals (such as a keyboard or mouse) are able to interfacewith the computer.

In light of computers being locked-down for security purposes, users aretypically unable to install their own software. Any attempts to do so bydownloading software from a website, installing from a disk, orinstalling through a USB memory drive, would be thwarted by securitysoftware or hardware lockouts. With these security measures in place inhealth care settings, physicians and other health care workers typicallycannot employ speech-to-text processing and are limited to data entry byusing only generic Human Interface Devices (HID) interfaces, such as aUSB keyboard or USB mouse, which security software and hardware limitingprotocols typically allow to be connected.

With limitations placed on users of computer systems in regards toinstalling personal software on devices due to strict securityprotocols, the ability to enter text by speech recognition through adevice that processes the speech-to text-externally to the computersystem but interfaces and appears as a generic HID device would behighly advantageous.

SUMMARY OF THE INVENTION

In accordance with the present invention, in a first embodiment, anaudio input device, which includes a microphone, memory, processors,transmitters, and antennas capable of sending and receiving wirelesssignals, receives a voice input comprised of speech and system commandsthrough a microphone. The audio input device processes the voice inputinformation into a text signal containing the text in electronic machineusable format, embeds the electronic machine usable format text datafrom the text signal into a wireless signal, and transmits the wirelesssignal to a peripheral. The peripheral, which includes non-transitorystorage memory, processors, transmitters, and antennas, receives thewireless signal, extracts and processes the wireless signal into anintermediate signal containing the text data in electronic machineusable format, converts the intermediate signal into keyboard charactercodes, and transfers the keyboard character codes to the destinationcomputing system through a wired interface by a wired signal.

In another embodiment, the audio input device receives a voice inputcomprised of speech and system commands through a microphone. The audioinput device processes the voice input information into an electronicmachine usable format and embeds this voice data into a wireless signal.The audio input device transmits the wireless signal to a peripheral,which includes non-transitory storage memory and instructions,processors, transmitters and antennas. The wireless signal containingvoice data is received by the peripheral which extracts said voice datafrom the wireless signal to convert into an intermediate signalcontaining the voice data in an electronic machine usable format. Theperipheral performs speech-to text conversion to create text data inelectronic machine usable format. The text data is further processed byparsing the text data into individual characters by performing a lookupof the keyboard character codes in tables stored in memory anddetermining individual or multiple keyboard character codes. Theintermediate signal data containing the keyboard character codes isextracted and embedded into a wired signal for transfer to a destinationcomputing device through a wired interface by the wired signal.

A computer-peripheral device configured to present as an HID keyboard toa destination computing system includes a transceiver, a non-transitorymemory storage, one or more hardware processors, and an interface port.The transceiver is configured to receive a wireless signal embedded withtext data developed from a voice input. The non-transitory memorystorage includes instructions and a lookup table stored therein. Thelookup table includes each keyboard character code associated with eachindividual character available on an HID keyboard.

The one or more hardware processors, which communicate with thenon-transitory memory storage and the transceiver, are configured toexecute the instructions stored in the non-transitory memory storage. Inaccordance therewith, the one or more hardware processors extract thetext data from the wireless signal, embed the text data in an internalperipheral signal, and store the text data embedded within the internalperipheral signal in the non-transitory memory storage. The one or morehardware processors further determine a keyboard character code for eachcharacter in the text data to develop keyboard character codescorresponding with the text data, store the keyboard character codes inthe non-transitory memory storage, and generate a wired signal embeddedwith the keyboard character codes.

The interface port, which communicates with the one or more hardwareprocessors, interfaces with the destination computing system in orderfor the computer-peripheral device to communicate with the destinationcomputing system. As such, the one or more hardware processors,following connection to the destination computing system via theinterface port, transmit the keyboard character codes embedded withinthe wired signal to the destination computing system through theinterface port.

The one or more hardware processors when developing keyboard charactercodes determine whether the text data correspond to characters or adefined user command. If the text data correspond to characters, the oneor more hardware processors determine a keyboard character code for eachcharacter in the text data to develop keyboard character codescorresponding with the text data. Alternatively, if the text datacorrespond to a defined user command, the one or more hardwareprocessors determine each keyboard character code required by thedefined user command in the text data to develop keyboard charactercodes corresponding with the defined user command.

The one or more hardware processors when determining a keyboardcharacter code for each character in the text data parses the text datainto each individual character comprising the text data. The one or morehardware processors then compare each individual character in the textdata with each keyboard character code in the lookup table until thekeyboard character code associated with the individual character in thetext data is determined, thereby developing keyboard character codescorresponding with the text data. The one or more hardware processorsnext store the keyboard character codes in the non-transitory memorystorage. The one or more hardware processors finally generate the wiredsignal embedded with the keyboard character codes.

The one or more hardware processors when determining each keyboardcharacter code required by the defined user command compare the defineduser command in the text data with each keyboard character code in thelookup table until keyboard character codes associated with the defineduser command in the text data are determined, thereby developing thekeyboard character codes corresponding with the text data. The one ormore hardware processors then store the keyboard character codes in thenon-transitory memory storage. The one or more hardware processorsfinally generate the wired signal embedded with the keyboard charactercodes.

The one or more hardware processors include a CPU and a wirelessprocessing unit configured to execute the instructions stored in thenon-transitory memory storage. The CPU determines the keyboard charactercode for each text character in the text data to develop keyboardcharacter codes corresponding with the text data and stores the keyboardcharacter codes in the non-transitory memory storage. The CPU furthergenerates a wired signal embedded with the keyboard character codes andtransmits to the destination computing system through the interface portthe keyboard character codes embedded within the wired signal. Thewireless processing unit extracts the text data from the wireless signaland embeds the text data in an internal peripheral signal. The wirelessprocessing unit further stores the text data embedded within theinternal peripheral signal in the non-transitory memory storageindependent of the CPU.

A speech-to-text conversion system includes an audio input device andthe previously described computer-peripheral device configured topresent as an HID keyboard to a destination computing system. The audioinput device is configured to receive a voice input and performspeech-to-text processing on the voice input thereby producing text datarepresenting the voice input. The audio input device further isconfigured to embed the text data in a wireless signal and transmit thewireless signal embedded with the text data representing the voice inputto the transceiver of the computer-peripheral device.

A speech-to-text conversion system alternatively includes an audio inputdevice and a computer-peripheral device configured to present as an HIDkeyboard to a destination computing system. The audio input device isconfigured to receive a voice input, embed the voice input in a wirelesssignal, and transmit the wireless signal embedded with the voice input.

The computer-peripheral device includes a transceiver, a non-transitorymemory storage, one or more hardware processors, and an interface port.The transceiver is configured to receive the wireless signal embeddedwith the voice input from the audio input device. The non-transitorymemory storage stores instructions including instructions forspeech-to-text conversion and a lookup table stored. The lookup tableincludes each keyboard character code associated with each individualcharacter available on an HID keyboard.

The one or more hardware processors, which communicate with thenon-transitory memory storage and the transceiver, are configured toexecute the instructions stored in the non-transitory memory storage. Inaccordance therewith, the one or more hardware processors extract thevoice input from the wireless signal, convert the voice input into textdata representing the voice input, embed the text data in an internalperipheral signal, and store the text data embedded within the internalperipheral signal in the non-transitory memory storage. The one or morehardware processors further determine a keyboard character code for eachcharacter in the text data to develop keyboard character codescorresponding with the text data, store the keyboard character codes inthe non-transitory memory storage, and generate a wired signal embeddedwith the keyboard character codes.

The interface port, which communicates with the one or more hardwareprocessors, interfaces with the destination computing system in orderfor the computer-peripheral device to communicate with the destinationcomputing system. As such, the one or more hardware processors,following connection to the destination computing system via theinterface port, transmit the keyboard character codes embedded withinthe wired signal to the destination computing system through theinterface port.

The one or more hardware processors when developing keyboard charactercodes determine whether the text data correspond to characters or adefined user command. If the text data correspond to characters, the oneor more hardware processors determine a keyboard character code for eachcharacter in the text data to develop keyboard character codescorresponding with the text data. Alternatively, if the text datacorrespond to a defined user command, the one or more hardwareprocessors determine each keyboard character code required by thedefined user command in the text data to develop keyboard charactercodes corresponding with the defined user command.

The one or more hardware processors when determining a keyboardcharacter code for each character in the text data parses the text datainto each individual character comprising the text data. The one or morehardware processors then compare each individual character in the textdata with each keyboard character code in the lookup table until thekeyboard character code associated with the individual character in thetext data is determined, thereby developing keyboard character codescorresponding with the text data. The one or more hardware processorsnext store the keyboard character codes in the non-transitory memorystorage. The one or more hardware processors finally generate the wiredsignal embedded with the keyboard character codes.

The one or more hardware processors when determining each keyboardcharacter code required by the defined user command compare the defineduser command in the text data with each keyboard character code in thelookup table until keyboard character codes associated with the defineduser command in the text data are determined, thereby developing thekeyboard character codes corresponding with the text data. The one ormore hardware processors then store the keyboard character codes in thenon-transitory memory storage. The one or more hardware processorsfinally generate the wired signal embedded with the keyboard charactercodes.

The one or more hardware processors include a CPU and a wirelessprocessing unit configured to execute the instructions stored in thenon-transitory memory storage. The CPU converts the voice input intotext data representing the voice input, embeds the text data in aninternal peripheral signal, and stores the text data embedded within theinternal peripheral signal in the non-transitory memory storage. The CPUfurther determines the keyboard character code for each text characterin the text data to develop keyboard character codes corresponding withthe text data and stores the keyboard character codes in thenon-transitory memory storage. The CPU still further generates a wiredsignal embedded with the keyboard character codes and transmits to thedestination computing system through the interface port the keyboardcharacter codes embedded within the wired signal. The wirelessprocessing unit extracts the voice input from the wireless signal andstores the voice input in the non-transitory memory storage independentof the CPU.

The one or more hardware processors alternatively include a CPU and awireless processing unit configured to execute the instructions storedin the non-transitory memory storage. The CPU determines the keyboardcharacter code for each text character in the text data to developkeyboard character codes corresponding with the text data and stores thekeyboard character codes in the non-transitory memory storage. The CPUfurther generates a wired signal embedded with the keyboard charactercodes and transmits to the destination computing system through theinterface port the keyboard character codes embedded within the wiredsignal. The wireless processing unit extracts the voice input from thewireless signal and stores the voice input in the non-transitory memorystorage independent of the CPU. The wireless processing unit furtherconverts the voice input into text data representing the voice input,embeds the text data in an internal peripheral signal, and stores thetext data embedded within the internal peripheral signal in thenon-transitory memory storage independent of the CPU.

A method of presenting a computer-peripheral device to a destinationcomputing system as an HID keyboard includes coupling an interface portof the computer-peripheral device with a wired interface port of thedestination computing system. The method then includes receiving awireless signal embedded with text data developed from a voice input,extracting the text data from the wireless signal, embedding the textdata in an internal peripheral signal, and storing the text dataembedded within the internal peripheral signal in a non-transitorymemory storage. The method next includes determining a keyboardcharacter code for each character in the text data to develop keyboardcharacter codes corresponding with the text data and storing thekeyboard character codes in the non-transitory memory storage. Themethod finally includes generating a wired signal embedded with thekeyboard character codes and transmitting the keyboard character codesembedded within the wired signal from the computer-peripheral device tothe destination computing system via the interface port of thecomputer-peripheral device and the wired interface port of thedestination computing system.

The method also includes determining whether the text data correspond tocharacters or a defined user command. The method when the text datacorrespond to characters includes determining a keyboard character codefor each character in the text data to develop keyboard character codescorresponding with the text data. The method when the text datacorrespond to a defined user command includes determining each keyboardcharacter code required by the defined user command in the text data todevelop keyboard character codes corresponding with the defined usercommand.

The method in developing keyboard character codes includes storing inthe non-transitory memory storage a lookup table, comprising eachkeyboard character code associated with each individual characteravailable on an HID keyboard. The method when the text data correspondto characters includes parsing the text data into each individualcharacter comprising the text data. The method further includescomparing each individual character in the text data with each keyboardcharacter code in the lookup table until the keyboard character codeassociated with the individual character in the text data is determined,thereby developing keyboard character codes corresponding with the textdata. The method still further includes storing the keyboard charactercodes in the non-transitory memory storage and generating the wiredsignal embedded with the keyboard character codes. The method when thetext data correspond to a defined user command includes comparing thedefined user command in the text data with each keyboard character codein the lookup table until keyboard character codes associated with thedefined user command in the text data are determined, thereby developingthe keyboard character codes corresponding with the text data. Themethod further includes storing the keyboard character codes in thenon-transitory memory storage and generating the wired signal embeddedwith the keyboard character codes.

An alternative method of presenting a computer-peripheral device to adestination computing system as an HID keyboard includes coupling aninterface port of the computer-peripheral device with a wired interfaceport of the destination computing system. The method then includesreceiving a wireless signal embedded with a voice input, extracting thevoice input from the wireless signal, converting the voice input intotext data representing the voice input, embedding the text data in aninternal peripheral signal, and storing the text data embedded withinthe internal peripheral signal in a non-transitory memory storage. Themethod further includes determining a keyboard character code for eachcharacter in the text data to develop keyboard character codescorresponding with the text data and storing the keyboard charactercodes in the non-transitory memory storage. The method finally includesgenerating a wired signal embedded with the keyboard character codes andtransmitting the keyboard character codes embedded within the wiredsignal from the computer-peripheral device to the destination computingsystem via the interface port of the computer-peripheral device and thewired interface port of the destination computing system.

The method also includes determining whether the text data correspond tocharacters or a defined user command. The method when the text datacorrespond to characters includes determining a keyboard character codefor each character in the text data to develop keyboard character codescorresponding with the text data. The method when the text datacorrespond to a defined user command includes determining each keyboardcharacter code required by the defined user command in the text data todevelop keyboard character codes corresponding with the defined usercommand.

The method in developing keyboard character codes includes storing inthe non-transitory memory storage a lookup table, comprising eachkeyboard character code associated with each individual characteravailable on an HID keyboard. The method when the text data correspondto characters includes parsing the text data into each individualcharacter comprising the text data. The method further includescomparing each individual character in the text data with each keyboardcharacter code in the lookup table until the keyboard character codeassociated with the individual character in the text data is determined,thereby developing keyboard character codes corresponding with the textdata. The method still further includes storing the keyboard charactercodes in the non-transitory memory storage and generating the wiredsignal embedded with the keyboard character codes. The method when thetext data correspond to a defined user command includes comparing thedefined user command in the text data with each keyboard character codein the lookup table until keyboard character codes associated with thedefined user command in the text data are determined, thereby developingthe keyboard character codes corresponding with the text data. Themethod further includes storing the keyboard character codes in thenon-transitory memory storage and generating the wired signal embeddedwith the keyboard character codes.

It is therefore an object of the present invention to provide a deviceand method for a user to dictate speech remotely and have it convertedinto text entered on to a speech-to-text computing system, where thespeech to text conversion takes place on an application within thespeech-to-text computing system (such as a smartphone), allowing theuser to utilize software that is personalized for the user for betterfamiliarity with the software's method of use and for increased accuracywith user voice customization.

It is a further object of the present invention to provide a device andmethod for a user to dictate speech remotely and have it converted intotext to be entered on to a destination computing system, with the textdata transmitted wirelessly and securely, such as by the wirelesstechnology of Bluetooth™, from the speech-to-text computing system to aperipheral that pairs with the speech-to-text computing system for asecure and reliable limited-range transfer of the data.

It is yet a further object of the present invention to provide a deviceand method for a user to dictate speech remotely and have it convertedinto text entered on to a destination computing system, where theperipheral connects to the destination computing system (through aninterface method such as a USB plug) and appears as a generic HumanInterface Device (such as a keyboard) which only transmits text datathat appear as keystrokes in the form of keyboard character codes as tonot be prevented from interfacing by security software on thedestination computing system.

It is still a further object of the present invention to provide adevice and method for a user to dictate speech remotely and have itconverted into text entered on to a destination computing system, wherethe peripheral performs the speech-to-text conversion.

Still other objects, features, and advantages of the present inventionwill become evident to those of ordinary skill in the art in light ofthe following. Also, it should be understood that the scope of thisinvention is intended to be broad, and any combination of any subset ofthe features, elements, or steps described herein is part of theintended scope of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating a speech-to-text conversionsystem including a peripheral that interfaces with an audio input deviceand a destination computing system in order to convert speech-to-textfor entry onto the destination computing system.

FIG. 2 is an isometric view illustrating a circuit board for theperipheral of the speech-to-text conversion system.

FIG. 3 is a block diagram illustrating one embodiment of thespeech-to-text conversion system.

FIG. 4 is a flow diagram illustrating operation of the speech-to-textconversion system in remote speech-to-text conversion for entry into adestination computing system.

FIG. 5 is a flow diagram illustrating an example remote speech-to-textconversion and character/command generation.

FIG. 6 is a flow diagram illustrating operation of the speech-to-textconversion system in converting text and commands to keyboard charactercodes for entry into a destination computing system.

FIG. 7 is a table illustrating an example textual display of USBkeyboard character code lookup data for the speech-to-text conversionsystem.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

A detailed embodiment of the present invention is disclosed herein;however, it is to be understood that the disclosed embodiments aremerely exemplary of the invention, which may be embodied in variousforms. It is further to be understood that the figures are notnecessarily to scale, and some features may be exaggerated to showdetails of particular components or steps.

Speech-to-text software (also known as voice-recognition software) is aclass of software that takes audio content and transcribes it intowritten words in an electronic machine useable format, typically forfurther processing such as use in a word processor, on a displaydestination, or as executable commands by other software. Speech-to-textsoftware is commonly sold as a stand-alone application; however, manydevices, such as smartphones, incorporate speech-to-text software intotheir operating systems. While speech-to-text software programs includevaried uses, many speech-to-text software programs focus on assistingwith transcription and thus concentrate on recognizing a wide range ofvocabulary from a single user or a limited set of users by training thesoftware to learn the user's distinct voice patterns for greateraccuracy.

Speech-to-text software programs break spoken-word audio down into short“samples” and associate those samples with simple phonemes or units ofpronunciation. Algorithms are used by the speech-to-text software tosort the results and try to predict the word or phrase that was spokenand convert that word or phrase into written words or interpretedcommands which can be executed by that software or sent to othersoftware for further processing. Speech-to-text is well-known to one ofordinary skill in the art and can be seen in operation on many computingdevices (such as Apple's Siri in iPhones and Mac computers, as well asAmazon's Alexa in its Echo devices).

Features of the various embodiments may be implemented in software,hardware, firmware, and combinations of these. The processes describedare not limited to any particular embodiment and may take place in anoperating system, application programs within a computing system, in aforeground or background process, a driver, an extension, a supportingapplication or combination of these. These processes may be executed ona single processor or set of processors.

Processors may be any central processing unit (CPU), microprocessor,microcontroller, device or circuit configured for executing computerprogram instructions. Various processors may be embodied in computingsystems and may include all the usual ancillary components necessary toform a functional data processing device including without limitation abus, non-transitory storage such as RAM or ROM containing instructions,input/output devices, graphical user interfaces (GUIs), removable datastorage, and wired communication interfaces such as Universal Serial Bus(USB) and/or wireless communication interfaces such as Bluetooth orWi-Fi. While the embodiments described herein show USB and Bluetooth™protocols, any communication standards for wired or wirelesscommunication interfaces could be utilized.

A “signal” is defined herein as a detectable physical quantity orimpulse such as a voltage, current, or magnetic field strength by whichmessages or information can be transmitted, and hereafter is defined toinclude an object used to transmit or convey information beyond therange of human voice, or the sound or image conveyed in telegraphy,telephony, or radio. Signals will contain information or data embeddedwithin them in whichever form they appear in this description. Thisinformation or data will be in the form of an electronic machine usableformat (data in a format that can be easily processed by a computerwithout human intervention while ensuring no semantic meaning is lost)that may be transmitted between components by radio waves or betweeninterconnected circuitry through buses or bridges as may be found on acomputer motherboard.

It is understood that the processing of the signal that occurs is donethrough the interaction of various components such as microcontrollers,transceivers, circuits, and antennas. The programming and configurationof microcontrollers, transceivers, circuits, and antennas to processsignals is well-known to someone skilled in the art of circuit design,and the use and programing of these components can be accomplished indifferent ways. The description herein mainly describes the functionalsteps to be accomplished by these microcontrollers, transceivers,circuits, and antennas and is not intended to describe a specificconfiguration of these components or specific programming.

Software and data described may be programmed into non-transitorystorage memory as instructions that are accessible to and retrievable bya processor as described herein which configures and directs theprocessor to perform the desired functions and processes by executingthe instructions in the medium.

Terms such as “attached,” “connected,” “coupled,” “interconnected,” andsimilar refer to a relationship wherein structures are secured orattached to one another either directly or indirectly throughintervening structures, as well as both movable or rigid attachments orrelationships, unless expressly described otherwise.

As illustrated in FIG. 1, an embodiment of the invention is showngenerally with principal components of an audio input device 103 and aperipheral 106 for communicating with a destination computing system108.

Generally, as an overview, and to be discussed in greater detail below,a user 101 in the example shown in FIGS. 1 and 3 is a health careprofessional who may have just completed an examination of a patient ina hospital setting. The user 101 must now enter notes regarding thepatient into a destination computing system 108 for record-keepingpurposes, shown in the example as a personal computer terminal as wouldtypically be seen in the hallway of a hospital wing outside of patient'srooms. The user 101 using prior systems might manually type their notesinto the destination computing system 108 or dictate their notes into arecording device for a medical data transcriber to enter into thedestination computing system 108. In the first embodiment, the user 101instead would speak the desired phrase into the audio input device 103(shown as a smartphone in the example), through a voice input 102signal. Third party or system speech-to-text software on the audio inputdevice 103 will have been activated and would take the entered spokenphrase in the voice input 102 and convert the phrase into an electronicmachine usable format of speech data that the user 101 had spoken. Thespeech-to-text software would then process the speech data and createtext data in electronic machine usable format through the previouslydescribed speech-to-text process, and embed the resulting text data intoa text signal 113. The text data from the text signal 113 in machineusable format would be extracted from the text signal 113, embedded intoa wireless signal 104 (such as a signal described by the Bluetooth™technology standard) for transmission to the peripheral 106, which isprogrammed and configured to act and appear as a generic USB keyboard tothe destination computing system 108. The peripheral 106 would receivethe Bluetooth™ wireless signal 104 containing the text data inelectronic machine usable format, extract the text data from thewireless signal 104 and embed it into an intermediate peripheral signal232 and using software and hardware on board would convert the wordsinto individual keystrokes (also referred to as keystroke “scan codes”or “keyboard character codes”). The keyboard character codes would beembedded into a wired signal 208 to be inputted into the destinationcomputing system 108 through a wired interface port 225, shown here as aUSB port. The keyboard characters codes generated by the peripheral 106will appear to be received from a generic USB keyboard as to not beprohibited by security software when interfacing with the destinationcomputing system 108. The keyboard character codes would populate textboxes and fields on software displayed by the destination computingsystem 108. This process will be further explained in greater detailbelow.

For the purposes of disclosure and to aid in the understanding of thepresent invention, a movement of information or data will be describedherein through a tracing of a signal, as previously defined, in itsvarious forms through conversion stages whereby speech is translatedinto a format recognizable by the destination computing system 108. Moreparticularly, as shown generally in FIGS. 1, 2, and 3, the signal willbe shown in the forms of spoken audio waves as in the voice input 102,as a radio transmitted signal as in a wireless signal 104 or a wirelessstatus signal 115, a signal passing through a device wire or circuit asin the text signal 113 or the intermediate peripheral signal 232, and asa signal between devices as in the wired signal 208.

The destination computing system 108 may be any computing system in atypical configuration consisting of a computing device 112; a displaydevice 110, such as a monitor or screen; a keyboard 111; and a mouse109. The keyboard 111 and the mouse 109 connect to the computing device112 as Generic HID through a wired interface 224, such as USBinput/output ports, an example of which is shown on the computing device112 as the USB port 225. The computing device 112 typically includesmultiple ports 225 built-in and situated in different locations on thecomputing device 112 so that multiple peripherals may be connected. Theinput/output ports, such as the port 225, can receive electrical signalsfrom the keyboard 111 and the mouse 109 that are interpreted by thecomputing device 112 as keyboard character codes and cursor placements,respectively. The computing device, 112 via its input/output ports, suchas the port 225, also supplies power to the keyboard 111 and the mouse109 to carry out their functions, as well as other peripheral devicesconnected through port 225.

The destination computing system 108 in many configurations will havesecurity software in place to prevent the introduction of malware suchas viruses, worms, Trojan horses, ransomware, spyware, adware, roguesoftware, and scareware. This is of even greater importance in areaswhere data are highly confidential, such as when the destinationcomputing system 108 is located in a hospital where highly confidentialpatient data are entered and stored. The destination computing system108 software in these situations can be configured to limit interfacingand a transfer of information through each of the ports 225 to onlygeneric HID devices, such as the keyboard 111 and the mouse 109. Assuch, the user 101 typically would physically type on the keyboard 111and input cursor movements using the mouse 109, with the signal inputtedinto the computing device 112 through the ports 225 into text boxes orfields that would visually appear on the display device 110.

Referring to FIGS. 1 and 3, the audio input device 103 in the firstembodiment is a handheld smart device, such as a smartphone or tablet,including a microphone 205, a speech-to-text conversion software 206,and a host wireless transceiver 207. While the first embodimentdiscloses a handheld smart device, one of ordinary skill in the art willrecognize that any computing system capable of receiving audio signalsas input, executing speech-to-text software, and transmitting a wirelesssignal may be utilized as the audio input device 103.

The user 101 initiates remote speech-to-text conversion for entry ontothe destination computing system 108 through activation of thespeech-to-text conversion software 206 resident in the audio inputdevice 103, which, in the first embodiment, is a speech-to-textconversion software currently used in smart devices and well-known toone of ordinary skill in the art. After activating the speech-to-textconversion software 206 of the audio input device 103, the user 101speaks words, phrases, punctuation, sentences, or commands, whichtypically are available on an HID keyboard, as a voice input 102 intothe audio input device 103. The voice input 102 enters the audio inputdevice 103 through the microphone 205 (a common device found in smartdevices that causes sound waves to generate or modulate an electriccurrent for the purpose of transmitting sound in signal form in a mannerknown to one of ordinary skill in the art). Within the audio inputdevice 103, the voice input 102 is converted into a signal containingthe speech data in electronic machine usable format, here shown as textsignal 113. The speech-to-text conversion software 206 (which aspreviously described, may be present in the operating system of theaudio input device 103 or may be loaded into the memory/storage of theaudio input device 103 as a stand-alone application) receives the signal113 containing the speech data and processes the speech data containedtherein into an electronic machine usable format containing datarepresenting the text of the spoken words through speech-to-textprocessing, which, as previously described, is a computing processwell-known to one of ordinary skill in the art. The text signal 113 isprocessed to now contain the embedded text.

The electronic machine usable format containing data representing thetext of the spoken words is extracted from text signal 113 and embeddedinto the wireless signal 104, which, in the first embodiment, is in theform of a Bluetooth™ signal. Bluetooth™, which may be encrypted, is awireless technology standard designed for short-range, low-power, andmultiple-channel communication and data exchange between fixed andmobile devices over short distances using short-wavelength UHF radiowaves in the industrial, scientific and medical radio bands. Bluetooth™is a well-known communication method known to anyone with ordinaryskills in the art. While the first embodiment employs Bluetooth™wireless connectivity standards for the wireless signal 104, one ofordinary skill in the art will understand that any wireless transmissiontype capable of being encoded or encrypted and uses a standard set ofprotocols and instructions for sending information wirelessly may beused.

The wireless signal 104, which is a transmittable wireless signalcarrying the text data and other operational information, is wirelesslytransmitted to the peripheral 106 through the host wireless transceiver207. The host wireless transceiver 207 in the first embodiment is atransceiver well-known to one of ordinary skill in the art commonly usedin smart devices and capable of sending and receiving wireless signals,such as the illustrated Bluetooth™ signal. In addition, for security,wireless signal 104 may be encrypted to prevent electronic“eavesdropping” on the content of wireless signal 104. In addition,operational and status information may be sent wirelessly back to audioinput device 103 from peripheral 106 through a wireless status signal115.

Referring to FIGS. 1-3, the peripheral 106 includes an electricalcircuit 201 disposed on an electrical circuit board 202 enclosed in ahousing 203. The peripheral 106 through the electrical circuit 201includes a peripheral wireless transceiver 210, a wireless processingunit 212, a central processing unit 214 (hereinafter referred to as CPU214), a status output 216, a memory unit 218, and a peripheral wiredinterface 220. The electrical circuit board 202 interconnects thevarious components for communication with each other by electronicpathways (such as circuit traces, vias, soldering points, or traces),herein shown as a pathway 230, through which the intermediate peripheralsignal 232 containing the electronic machine usable format data travels.Updates to software of firmware on peripheral 106 may be made by theperipheral 106 receiving programming information through peripheralwireless transceiver 210 or peripheral wired interface 220 in a mannerknown to one skilled in the arts.

The peripheral wireless transceiver 210 in the first embodiment is atransceiver well-known to one of ordinary skill in the art commonly usedin sending and receiving wireless signals, such as the illustratedBluetooth™ signal. The peripheral wireless transceiver 210 receives thewireless signal 104 from the audio input device 103 and in conjunctionwith the wireless processing unit 212 to which it is coupled performssuch tasks as decoding encryption imparted to the wireless signal 104,extracting operating commands for the peripheral wireless transceiver210, and conversion of the text data embedded in the wireless signal 104into the intermediate peripheral signal 232, suitable for processing bythe CPU 214. The operating commands and text data are transferred to thememory unit 218 for storage and transfer to other circuitry throughpathway 230. Although the CPU 214 may convert the wireless signal 104into the intermediate peripheral signal 232, the peripheral 106 includesthe wireless processing unit 212 to convert the wireless signal 104independent of the CPU 214 such that the wireless signal 104 may betransferred from the audio input device 103 without interruptingoperations of the CPU 214.

The CPU 214 performs basic arithmetic, logic, controlling, andinput/output operations specified by the instructions in a programstored within the CPU 214 and the memory unit 218. The memory unit 218,which may be volatile memory, such as random access memory (RAM), ornon-volatile memory, such as flash memory, or another device thatemploys other suitable data storage technology, is interconnected to theCPU 214 and stores, sends and receives instructional commands andprocessed text data in the intermediate peripheral signal 232 to andfrom memory unit 218.

The CPU 214 interacts with a visual and/or audio status output module216 to visually display or audibly alert the user 101 to the systemstatus; examples include the unit power status, the unit transmissionstatus, transmission or connection errors, or the availability offirmware updates. This can be shown visually through such methods aslight-emitting diodes (LED) by the LED blinking and/or changing color torepresent unit state or status. It can also be accomplished throughaudio tones or beeps. The CPU 214 also may send commands back to thewireless processing unit 212 and the transceiver 210 to update status orconvey information on the audio input device 103 through the wirelessstatus signal 115.

The intermediate peripheral signal 232, after processing in CPU 214, isconverted from its previous signal form of electronic machine usableformat containing data representing the text of the spoken words throughspeech-to-text processing into a wired signal 208 embedded withelectronic machine usable format data containing keyboard charactercodes (the specific and detailed steps to be described below). Thissignal is communicated from the CPU 214 to the wired interface 220 towhich it is interconnected. The wired interface 220 in the presentembodiment is a male USB port which physically attaches and disposeswithin a female USB port to enable the transfer of electronic machineusable format data in the wired signal 208 to the destination computingsystem 108.

The wired signal 208 is communicated from the peripheral 106 to thedestination computing system 108 through the port 225, disposed withinthe computing device 112, a female USB port. By embedding keyboardcharacter codes into the wired signal 208, the peripheral 106 will mimica keyboard, such as the keyboard 111, to the destination computingsystem 108, which would not be locked out by security software as itwould be configured to appear as a generic HID keyboard (or virtualkeyboard) only capable of entering information in the form of keyboardkeystrokes. Using a device such as the mouse 109, the user 101 candirect on the display device 110 of the destination computing system 108where the text should be entered into a destination software 226, whichcould be any software where text can be entered into fields or textboxes.

FIG. 4 illustrates a flow chart for the detailed processes of the methodand device, as performed by the audio input device 103 and theperipheral 106 in their communication with the destination computingsystem 108 as shown in FIG. 1. The method 300 begins at a block 302where the user 101 initiates a recording interface on a speech-to-textrecording system on the audio input device 103, which in one embodimentwould be on a smartphone, where the user would open the speech-to-textsoftware 206 on the audio input device 103, authenticate theapplication, and initiate recording. With the software 206 active, ablock 304 shows the step of the voice sample being received through themicrophone 205 on the audio input device 103 and communicated to thespeech-to-text software 206 through the voice input 102 signal, where,in a block 306, it is processed from the spoken word into the textsignal 113, which is an electronic machine usable format containing thetext. A block 308 displays the functional step of the audio input device103 converting the electronic machine usable format containing the textfrom the audio input device 103 to the peripheral 106 by way of awireless signal such as Bluetooth™, wherein electronic machine usableformat data containing the text is embedded into the Bluetooth™ signal.Simultaneous to the steps in the blocks 304, 306, and 308 occurring, theaudio input device 103 and the peripheral 106 would exchange informationas shown in the blocks 310, 312 and 314. As shown in a block 310, thepresent status state is communicated to the peripheral 106 by thewireless signal 104 as determined by the software 206 on the audio inputdevice 103. Such status changes could include whether the audio inputdevice 103 is in standby mode or initiating a data transfer. A block 312shows the functional step of the peripheral 106 receiving a statuschange such as the impending transfer of speech-to-text data andpreparation to receive these data. A block 314 shows the peripheral 106updating the status change to the user, which is shown in a block 316 asvisually or audibly indicating the status change of having received thetext data to the user, in different embodiments this could be by an LEDlight located on the board 107 of the peripheral 106 as describedearlier.

The process of the peripheral 106 receiving the wireless signal 104,extracting the electronic machine usable format containing the text andprocessing it into the intermediate peripheral signal 232 is shown inthe blocks 318 and 319. The block 318 shows the storage of theelectronic machine usable format into memory 218. The block 319represents the processing of the electronic machine usable format in theCPU 214 into its next format, which will be described below. While theblocks 318 and 319 are shown in sequence, either could take placeinitially before the other and the communication by way of intermediateperipheral signal 232 between the memory 218 and the CPU 214 throughpathway 230 could occur several times in both directions in the sameoperation. The block 319 shows the general step of parsing the textwords contained in the electronic machine usable format of theintermediate peripheral signal 232 into individual letters, and in turn,into individual or multiple keyboard character codes for processes suchas editing or formatting. This process will be explained in greaterdetail below with reference to FIGS. 6 and 7 are described.

The block 320 represents the process of the intermediate peripheralsignal 232 embedded with electronic machine usable format datacontaining text being converted from an intermediate peripheral signalinto a wired signal 208, with the CPU 214 on the peripheral 106transmitting the electronic machine usable format data containing theindividual keyboard character codes to the destination computing system108 through the wired interface 220 by wired signal 208. In oneembodiment, wired interface 220 would be a USB-A plug on peripheral 106to a USB-A port on the destination computing system 108. The block 320also represents the functional step of the destination computing device108 receiving the wired signal 208 containing electronic machine usableformat data embedded with the individual keyboard character codesthrough the USB-A interface as keyboard character codes to be enteredinto the destination computing system 108.

FIGS. 1, 4, 5, 6, and 7 show the detailed steps and lookup tables of theblock 319 to convert the user's 101 spoken voice input 102 enteredthough the microphone 205 on the audio input device 103 and theperipheral 106 to the instructions 406.

In FIG. 5, a general overview of speech-to-text conversion andsubsequent conversion to keyboard character codes or commands 400 isshown in overview where the voice input 102 is converted to the signal402, which is converted to either commands or individual text words 404and further processed into keyboard character codes or commandinstructions 406. The entirety of the process 400 in one embodimentcould take place within the audio input device 103 with the peripheral106 only receiving the wireless signal 104 containing the electronicmachine usable format data containing the individual keyboard charactercodes and communicating the signal to the destination computing system108 through the wired interface 220. In the displayed embodiment, thegeneration of the voice input 102, the signal 401, and thecommands/words 404 would take place on the audio input device 103, withthe instructions 406 taking place on peripheral 106.

In FIGS. 1, 6, and 7, the block 602 represents the speech-to-textconversion, where the voice input 102 is converted to individual wordsthrough the software of the audio input device 103, a computing processwhich as stated earlier is widely used in various embodiments of theaudio input device 103 and other applications and is known to anyoneskilled in the arts. In the block 604, an initial determination is madein the software 206 on the audio input device 103 as to whether the wordor set of words converted correspond to a defined user command stored ina table located in memory. In the displayed embodiment, the block 602would take place in software located on the audio input device 103 andthe block 604 and subsequent functions defined in blocks of FIG. 6 wouldoccur on the peripheral 106. In other embodiments, these functions couldtake place on either the audio input device 103 or the peripheral 106.

If the word or set of words does not correspond to a defined usercommand stored in a table located in memory, the block 610 representsthe function of parsing the word into its individual letters by thesoftware located in the memory 218 through its communication with CPU214 through pathway 230 by intermediate peripheral signal 232 on theboard 202 of the peripheral 106. In the block 612, the individual letteris analyzed by the CPU 214 and compared to a lookup table 500 stored inthe memory 218 of the peripheral 106, an example of which is shown inFIG. 7. From this table 500, a keyboard character code is generatedbased on the keyboard character code associated with that letter in thetable. For the phrase shown as an example of voice input 102 “3 timesdaily,” the software would take the first character “3” and perform alookup in table 500. The entry 502 for “3” would correspond to Hex usageID “20” in the keystroke 504. The software would then take the secondcharacter “spacebar” and perform a lookup in the table 500. The entry506 for “spacebar” would correspond to Hex usage ID “2C” in thekeystroke 508. For the third character of “t,” the entry 510 wouldcorrespond to Hex usage ID “17” in the keystroke 512. The software wouldthen take each remaining character in “imes daily” and perform a lookupin the table 500 to generate a corresponding Hex usage ID. Thekeystrokes 504, 508, and 512 represented by the Usage ID codes of“20-2C-17” as well as the usage ID codes corresponding to “imes daily”would be generated by the CPU 214 as shown in a block 614 and stored inthe memory 218 of the peripheral 106 as shown in a block 616, untilready to be transmitted in a block 618 to the destination computingsystem 108, and would appear as keyboard character codes generated by ageneric HID for purposes of entering text into the destination computingsystem 108 without invoking security lockouts as it would appear to bean ordinary keyboard. These keyboard character codes would then populatetext boxes or fields on the destination computing system 108.

Referring back to block 604, if the word or set of words does correspondto a defined user command stored in a table located in memory, the block606 shows the lookup of the command in a stored table within memory 218by CPU 214. Because commands may require multiple keystrokes, multiplekeyboard character codes in the block 608 would be generated by CPU 214.For example, if the command “select all” for a PC were invoked, thekeyboard character codes for the character keys “Control” and “A” wouldneed to be generated together in the same way as the individual lettersof a word were as previously described. These keyboard character codeswould be generated as shown in the block 608 by the CPU 214, stored inthe memory of the peripheral 106 in the block 616 until the CPU 214 wasready to transmit as shown the block 618 to the destination computingsystem 108.

While the first embodiment of the speech-to-text conversion system 100operates in accordance with the speech-to-text conversion software 206resident in the audio input device 103, one of ordinary skill in the artwill recognize that the speech-to-text conversion system 100 in a secondembodiment may be configured whereby speech-to-text conversion softwareis resident in the peripheral 106. More particularly, speech-to-textconversion software, which, in the second embodiment, is aspeech-to-text conversion software well-known to one of ordinary skillin the art, is installed in the memory unit 218 of the peripheral 106such that the CPU 214 of the peripheral 106 or the wireless processingunit 212 performs speech-to-text conversion of the voice input 102signal received from the audio input device 103, which has beentransmitted wirelessly using known wireless technology and transmissiontechniques, such as Bluetooth™. In the second embodiment, the audioinput device 103, accordingly, is any device, such as a microphone,headphone set, earbuds, or tablet, capable of receiving speech as thevoice input 102, causing sound waves to generate or modulate an electriccurrent for the purpose of transmitting sound in signal form in a mannerknown to one of ordinary skill in the art, and wirelessly transmittingthe sound in signal form.

In a second embodiment, in FIGS. 1, 3 and 4, the blocks 302, 304, and308 would take place within the audio input device 103 in the same wayas shown and described in the first embodiment, except without thesoftware 206 performing the speech-to-text conversion in the block 306,the wirelessly transmitted signal would be speech converted to signalform. The block 306 function of speech-to-text conversion would takeplace through additional programming within CPU 214 or the wirelessprocessing unit 212.

Although the present invention has been described in terms of theforegoing preferred embodiments, such description has been for exemplarypurposes only and, as will be apparent to those of ordinary skill in theart, many alternatives, equivalents, and variations of varying degreeswill fall within the scope of the present invention. That scope,accordingly, is not to be limited in any respect by the foregoingdetailed description; rather, it is defined only by the claims thatfollow.

1. A computer-peripheral device configured to present as an HID keyboardto a destination computing system, comprising: a transceiver configuredto receive a wireless signal embedded with text data developed from avoice input; a non-transitory memory storage including instructionsstored therein; one or more hardware processors in communication withthe non-transitory memory storage and the transceiver, the one or morehardware processors being configured to execute the instructions storedin the non-transitory memory storage, wherein the one or more hardwareprocessors: extract the text data from the wireless signal, embed thetext data in an internal peripheral signal, store the text data embeddedwithin the internal peripheral signal in the non-transitory memorystorage, determine a keyboard character code for each character in thetext data to develop keyboard character codes corresponding with thetext data, store the keyboard character codes in the non-transitorymemory storage, and generate a wired signal embedded with the keyboardcharacter codes; and an interface port in communication with the one ormore hardware processors, the interface port being adapted to interfacewith the destination computing system, whereby the computer-peripheraldevice communicates with the destination computing system through theinterface port such that, following connection to the destinationcomputing system, the one or more hardware processors transmit to thedestination computing system through the interface port the keyboardcharacter codes embedded within the wired signal.
 2. Thecomputer-peripheral device of claim 1, the non-transitory memory storageincluding a lookup table stored therein, comprising each keyboardcharacter code associated with each individual character available on anHID keyboard.
 3. The computer-peripheral device of claim 2, wherein,when determining a keyboard character code for each character in thetext data, the one or more hardware processors: parse the text data intoeach individual character comprising the text data; compare eachindividual character in the text data with each keyboard character codein the lookup table until the keyboard character code associated withthe individual character in the text data is determined, therebydeveloping keyboard character codes corresponding with the text data;store the keyboard character codes in the non-transitory memory storage;and generate the wired signal embedded with the keyboard charactercodes.
 4. The computer-peripheral device of claim 2, wherein the one ormore hardware processors: determine whether the text data correspond tocharacters or a defined user command; determine a keyboard charactercode for each character in the text data to develop keyboard charactercodes corresponding with the text data when the text data correspond tocharacters; and determine each keyboard character code required by thedefined user command in the text data to develop keyboard charactercodes corresponding with the defined user command when the text datacorrespond to a defined user command.
 5. The computer-peripheral deviceof claim 4, wherein, when determining each keyboard character coderequired by the defined user command, the one or more hardwareprocessors: compare the defined user command in the text data with eachkeyboard character code in the lookup table until keyboard charactercodes associated with the defined user command in the text data aredetermined, thereby developing the keyboard character codescorresponding with the text data; store the keyboard character codes inthe non-transitory memory storage; and generate the wired signalembedded with the keyboard character codes.
 6. The computer-peripheraldevice of claim 1, the one or more hardware processors, comprising: aCPU configured to execute the instructions stored in the non-transitorymemory storage, whereby the CPU: determines the keyboard character codefor each text character in the text data to develop keyboard charactercodes corresponding with the text data, stores the keyboard charactercodes in the non-transitory memory storage, generates a wired signalembedded with the keyboard character codes, and transmits to thedestination computing system through the interface port the keyboardcharacter codes embedded within the wired signal; and a wirelessprocessing unit configured to execute the instructions stored in thenon-transitory memory storage, whereby the wireless processing unit:extracts the text data from the wireless signal, embeds the text data inan internal peripheral signal, and stores the text data embedded withinthe internal peripheral signal in the non-transitory memory storageindependent of the CPU.
 7. The computer-peripheral device of claim 1,the transceiver being configured to receive the wireless signal embeddedwith the text data from an audio input device configured to receive avoice input, perform speech-to-text processing on the voice inputthereby producing text data representing the voice input, embed the textdata in the wireless signal, and transmit the wireless signal embeddedwith the text data representing the voice input.
 8. A speech-to-textconversion system, comprising: an audio input device configured toreceive a voice input, perform speech-to-text processing on the voiceinput thereby producing text data representing the voice input, embedthe text data in a wireless signal, and transmit the wireless signalembedded with the text data representing the voice input; and acomputer-peripheral device configured to present as an HID keyboard to adestination computing system, comprising: a transceiver configured toreceive the wireless signal embedded with the text data developed fromthe voice input; a non-transitory memory storage including instructionsstored therein; one or more hardware processors in communication withthe non-transitory memory storage and the transceiver, the one or morehardware processors being configured to execute the instructions storedin the non-transitory memory storage, wherein the one or more hardwareprocessors: extract the text data from the wireless signal, embed thetext data in an internal peripheral signal, store the text data embeddedwithin the internal peripheral signal in the non-transitory memorystorage, determine a keyboard character code for each character in thetext data to develop keyboard character codes corresponding with thetext data, store the keyboard character codes in the non-transitorymemory storage, and generate a wired signal embedded with the keyboardcharacter codes; and an interface port in communication with the one ormore hardware processors, the interface port being adapted to interfacewith the destination computing system, whereby the computer-peripheraldevice communicates with the destination computing system through theinterface port such that, following connection to the destinationcomputing system, the one or more hardware processors transmit to thedestination computing system through the interface port the keyboardcharacter codes embedded within the wired signal.
 9. The speech-to-textconversion system of claim 8, the non-transitory memory storageincluding a lookup table stored therein, comprising each keyboardcharacter code associated with each individual character available on anHID keyboard.
 10. The speech-to-text conversion system of claim 9,wherein, when determining a keyboard character code for each characterin the text data, the one or more hardware processors: parse the textdata into each individual character comprising the text data; compareeach individual character in the text data with each keyboard charactercode in the lookup table until the keyboard character code associatedwith the individual character in the text data is determined, therebydeveloping keyboard character codes corresponding with the text data;store the keyboard character codes in the non-transitory memory storage;and generate the wired signal embedded with the keyboard charactercodes.
 11. The speech-to-text conversion system of claim 9, wherein theone or more hardware processors: determine whether the text datacorrespond to characters or a defined user command; determine a keyboardcharacter code for each character in the text data to develop keyboardcharacter codes corresponding with the text data when the text datacorrespond to characters; and determine each keyboard character coderequired by the defined user command in the text data to developkeyboard character codes corresponding with the defined user commandwhen the text data correspond to a defined user command.
 12. Thespeech-to-text conversion system of claim 11, wherein, when determiningeach keyboard character code required by the defined user command, theone or more hardware processors: compare the defined user command in thetext data with each keyboard character code in the lookup table untilkeyboard character codes associated with the defined user command in thetext data are determined, thereby developing the keyboard charactercodes corresponding with the text data; store the keyboard charactercodes in the non-transitory memory storage; and generate the wiredsignal embedded with the keyboard character codes.
 13. Thespeech-to-text conversion system of claim 8, the one or more hardwareprocessors, comprising: a CPU configured to execute the instructionsstored in the non-transitory memory storage, whereby the CPU: determinesthe keyboard character code for each text character in the text data todevelop keyboard character codes corresponding with the text data,stores the keyboard character codes in the non-transitory memorystorage, generates a wired signal embedded with the keyboard charactercodes, and transmits to the destination computing system through theinterface port the keyboard character codes embedded within the wiredsignal; and a wireless processing unit configured to execute theinstructions stored in the non-transitory memory storage, whereby thewireless processing unit: extracts the text data from the wirelesssignal, embeds the text data in an internal peripheral signal, andstores the text data embedded within the internal peripheral signal inthe non-transitory memory storage independent of the CPU.
 14. Aspeech-to-text conversion system, comprising: an audio input deviceconfigured to receive a voice input, embed the voice input in a wirelesssignal, and transmit the wireless signal embedded with the voice input;and a computer-peripheral device configured to present as an HIDkeyboard to a destination computing system, comprising: a transceiverconfigured to receive the wireless signal embedded with the voice inputfrom the audio input device; a non-transitory memory storage includinginstructions stored therein including instructions for speech-to-textconversion; one or more hardware processors in communication with thenon-transitory memory storage and the transceiver, the one or morehardware processors being configured to execute the instructions storedin the non-transitory memory storage, wherein the one or more hardwareprocessors: extract the voice input from the wireless signal, convertthe voice input into text data representing the voice input, embed thetext data in an internal peripheral signal, store the text data embeddedwithin the internal peripheral signal in the non-transitory memorystorage, determine a keyboard character code for each character in thetext data to develop keyboard character codes corresponding with thetext data, store the keyboard character codes in the non-transitorymemory storage, and generate a wired signal embedded with the keyboardcharacter codes; and an interface port in communication with the one ormore hardware processors, the interface port being adapted to interfacewith the destination computing system, whereby the computer-peripheraldevice communicates with the destination computing system through theinterface port such that, following connection to the destinationcomputing system, the one or more hardware processors transmit to thedestination computing system through the interface port the keyboardcharacter codes embedded within the wired signal.
 15. The speech-to-textconversion system of claim 14, the non-transitory memory storageincluding a lookup table stored therein, comprising each keyboardcharacter code associated with each individual character available on anHID keyboard.
 16. The speech-to-text conversion system of claim 15,wherein, when determining a keyboard character code for each characterin the text data, the one or more hardware processors: parse the textdata into each individual character comprising the text data; compareeach individual character in the text data with each keyboard charactercode in the lookup table until the keyboard character code associatedwith the individual character in the text data is determined, therebydeveloping keyboard character codes corresponding with the text data;store the keyboard character codes in the non-transitory memory storage;and generate the wired signal embedded with the keyboard charactercodes.
 17. The speech-to-text conversion system of claim 15, wherein theone or more hardware processors: determine whether the text datacorrespond to characters or a defined user command; determine a keyboardcharacter code for each character in the text data to develop keyboardcharacter codes corresponding with the text data when the text datacorrespond to characters; and determine each keyboard character coderequired by the defined user command in the text data to developkeyboard character codes corresponding with the defined user commandwhen the text data correspond to a defined user command.
 18. Thespeech-to-text conversion system of claim 17, wherein, when determiningeach keyboard character code required by the defined user command, theone or more hardware processors: compare the defined user command in thetext data with each keyboard character code in the lookup table untilkeyboard character codes associated with the defined user command in thetext data are determined, thereby developing the keyboard charactercodes corresponding with the text data; store the keyboard charactercodes in the non-transitory memory storage; and generate the wiredsignal embedded with the keyboard character codes.
 19. Thespeech-to-text conversion system of claim 14, the one or more hardwareprocessors, comprising: a CPU configured to execute the instructionsstored in the non-transitory memory storage, whereby the CPU: convertsthe voice input into text data representing the voice input, embeds thetext data in an internal peripheral signal, stores the text dataembedded within the internal peripheral signal in the non-transitorymemory storage, determines the keyboard character code for each textcharacter in the text data to develop keyboard character codescorresponding with the text data, stores the keyboard character codes inthe non-transitory memory storage, generates a wired signal embeddedwith the keyboard character codes, and transmits to the destinationcomputing system through the interface port the keyboard character codesembedded within the wired signal; and a wireless processing unitconfigured to execute the instructions stored in the non-transitorymemory storage, whereby the wireless processing unit: extracts the voiceinput from the wireless signal, and stores the voice input in thenon-transitory memory storage independent of the CPU.
 20. Thespeech-to-text conversion system of claim 14, the one or more hardwareprocessors, comprising: a CPU configured to execute the instructionsstored in the non-transitory memory storage, whereby the CPU: determinesthe keyboard character code for each text character in the text data todevelop keyboard character codes corresponding with the text data,stores the keyboard character codes in the non-transitory memorystorage, generates a wired signal embedded with the keyboard charactercodes, and transmits to the destination computing system through theinterface port the keyboard character codes embedded within the wiredsignal; and a wireless processing unit configured to execute theinstructions stored in the non-transitory memory storage, whereby thewireless processing unit: extracts the voice input from the wirelesssignal, stores the voice input in the non-transitory memory storageindependent of the CPU, converts the voice input into text datarepresenting the voice input, embeds the text data in an internalperipheral signal, and stores the text data embedded within the internalperipheral signal in the non-transitory memory storage independent ofthe CPU.
 21. A method of presenting a computer-peripheral device to adestination computing system as an HID keyboard, comprising: coupling aninterface port of the computer-peripheral device with a wired interfaceport of the destination computing system; receiving a wireless signalembedded with text data developed from a voice input; extracting thetext data from the wireless signal; embedding the text data in aninternal peripheral signal; storing the text data embedded within theinternal peripheral signal in a non-transitory memory storage,determining a keyboard character code for each character in the textdata to develop keyboard character codes corresponding with the textdata; storing the keyboard character codes in the non-transitory memorystorage; generating a wired signal embedded with the keyboard charactercodes; and transmitting the keyboard character codes embedded within thewired signal from the computer-peripheral device to the destinationcomputing system via the interface port of the computer-peripheraldevice and the wired interface port of the destination computing system.22. The method of claim 21, comprising storing in the non-transitorymemory storage a lookup table, comprising each keyboard character codeassociated with each individual character available on an HID keyboard.23. The method of claim 22, comprising: parsing the text data into eachindividual character comprising the text data; comparing each individualcharacter in the text data with each keyboard character code in thelookup table until the keyboard character code associated with theindividual character in the text data is determined, thereby developingkeyboard character codes corresponding with the text data; storing thekeyboard character codes in the non-transitory memory storage; andgenerating the wired signal embedded with the keyboard character codes.24. The method of claim 22, comprising: determining whether the textdata correspond to characters or a defined user command; determining akeyboard character code for each character in the text data to developkeyboard character codes corresponding with the text data when the textdata correspond to characters; and determining each keyboard charactercode required by the defined user command in the text data to developkeyboard character codes corresponding with the defined user commandwhen the text data correspond to a defined user command.
 25. The methodof claim 24, comprising: comparing the defined user command in the textdata with each keyboard character code in the lookup table untilkeyboard character codes associated with the defined user command in thetext data are determined, thereby developing the keyboard charactercodes corresponding with the text data; storing the keyboard charactercodes in the non-transitory memory storage; and generating the wiredsignal embedded with the keyboard character codes.
 26. A method ofpresenting a computer-peripheral device to a destination computingsystem as an HID keyboard, comprising: coupling an interface port of thecomputer-peripheral device with a wired interface port of thedestination computing system; receiving a wireless signal embedded witha voice input; extracting the voice input from the wireless signal;converting the voice input into text data representing the voice input;embedding the text data in an internal peripheral signal; storing thetext data embedded within the internal peripheral signal in anon-transitory memory storage, determining a keyboard character code foreach character in the text data to develop keyboard character codescorresponding with the text data; storing the keyboard character codesin the non-transitory memory storage; generating a wired signal embeddedwith the keyboard character codes; and transmitting the keyboardcharacter codes embedded within the wired signal from thecomputer-peripheral device to the destination computing system via theinterface port of the computer-peripheral device and the wired interfaceport of the destination computing system.
 27. The method of claim 26,comprising storing in the non-transitory memory storage a lookup table,comprising each keyboard character code associated with each individualcharacter available on an HID keyboard.
 28. The method of claim 27,comprising: parsing the text data into each individual charactercomprising the text data; comparing each individual character in thetext data with each keyboard character code in the lookup table untilthe keyboard character code associated with the individual character inthe text data is determined, thereby developing keyboard character codescorresponding with the text data; storing the keyboard character codesin the non-transitory memory storage; and generating the wired signalembedded with the keyboard character codes.
 29. The method of claim 27,comprising: determining whether the text data correspond to charactersor a defined user command; determining a keyboard character code foreach character in the text data to develop keyboard character codescorresponding with the text data when the text data correspond tocharacters; and determining each keyboard character code required by thedefined user command in the text data to develop keyboard charactercodes corresponding with the defined user command when the text datacorrespond to a defined user command.
 30. The method of claim 29,comprising: comparing the defined user command in the text data witheach keyboard character code in the lookup table until keyboardcharacter codes associated with the defined user command in the textdata are determined, thereby developing the keyboard character codescorresponding with the text data; storing the keyboard character codesin the non-transitory memory storage; and generating the wired signalembedded with the keyboard character codes.