DOCUMENTATION

What is EchoLock?

1. Introduction: The Vision Behind EchoLock
EchoLock is a specialized, privacy-centric Windows security utility designed to bridge the gap between convenience and workstation protection. In an era where digital privacy is paramount, EchoLock provides a hands-free solution for securing your computer using only the power of your

Core Privacy First:
Unlike traditional voice assistants, EchoLock is built to be a "Zero-Cloud" application. It processes audio locally on your device, ensuring your voice never leaves your machine.

Speed & Efficiency:
Guided by the slogan "lock at the speed of sound," the app is optimized for near-instant execution.

User-Centric Security:
By allowing users to define their own unique lock phrases, the app adds a personalized layer of security that is difficult for others to guess or trigger accidentally.

Why EchoLock?
For developers, students, and professionals—like those studying CSE in Bhopal—maintaining security when stepping away from a desk is vital. EchoLock replaces the need for manual keystrokes (Win + L) with a seamless, voice-activated system that remains vigilant in the background.

Supported Systems

  • • Windows 10 (64-bit)
  • • Windows 11 (64-bit)
  • • Microphone (Built-in or External)
  • • Minimum 4GB RAM
  • • Works completely offline

Current Version

  • • Version: v1.0.0
  • • Release Type: Stable
  • • Architecture: Desktop (Offline)
  • • Last Update: 2025

Core Features

EchoLock is built to deliver high-speed, voice-activated desktop security while maintaining complete user privacy. Below are the core features that define how the application works and what makes it secure, efficient, and fully offline.

Voice Lock / Unlock

Secure Voice-Activated Locking

Hands-free security that allows users to instantly lock their Windows workstation using custom-defined voice phrases without touching the keyboard.

Hardware Interop: Communicates directly with the Windows system through native locking mechanisms, ensuring the same level of security as a manual Win + L operation.

Offline Processing

Privacy-First “Zero-Cloud” Model

EchoLock performs all speech recognition and command processing locally on your system without any internet dependency.

No Data Transmission: Audio input and voice commands are never uploaded to external servers, ensuring complete user privacy.

Custom Commands & Recognition Logic

Dynamic Synchronization: Custom voice commands are recognized instantly without requiring application restart.

Grammar Isolation: The engine listens only for whitelisted phrases, reducing false triggers from background noise.

Security Threshold: Enforces a strict confidence score to prevent unauthorized or accidental unlock attempts.

How EchoLock Works: The Workflow

EchoLock operates through a four-stage process that prioritizes speed, accuracy, and user privacy.

1. Audio Capture & Pre-processing Active Listening: The application uses the System.Speech.Recognition library to monitor the default system microphone in the background.
Local Processing: Audio signals are processed entirely on the local CPU. No data is recorded, cached, or transmitted to any external servers, fulfilling the Zero-Cloud privacy model.

2. Recognition & Confidence Analysis Grammar Isolation: The engine does not perform general dictation. It uses Choices and GrammarBuilder to create a strict "whitelist" of allowed phrases defined in your commands.json file.
Scoring: For every detected sound, the Speech API (SAPI) generates a confidence score between 0.0 and 1.0.
Threshold Filtering: EchoLock enforces a strict 0.80 (80%) confidence threshold. If the recognized sound scores 0.79 or lower, the engine rejects the input to prevent accidental locks from background noise.

3. Synchronization & Persistence Instant Sync: When you add a new command on the Dashboard, the ReloadGrammar() method instantly updates the engine's active vocabulary without requiring an application restart.
Registry Integration: To ensure the PC is protected as soon as you log in, EchoLock adds its executable path to the Windows Registry (HKCU\...\Run) for automated startup.

4. System Action (The Lock) Kernel Call: Once a command is validated, the application uses P/Invoke to communicate with the Windows kernel.
LockWorkStation: It executes the LockWorkStation() function from the user32.dll library, which instantly locks the PC just like the Win + L keyboard shortcut.

Privacy & Security

Privacy & Security: The EchoLock Commitment EchoLock is designed with a Privacy-First architecture, ensuring that your voice and system remain protected without compromising personal data.

1. Zero-Cloud Privacy Model 100% Offline Processing: Unlike standard voice assistants, EchoLock requires no internet connection.
No Data Transmission: All audio-to-text conversion is performed locally on your CPU; no voice data is ever transmitted to external servers.
Transient Audio Handling: The application processes audio in real-time within the system's RAM. It does not record, save, or cache your voice recordings to any storage medium.

2. Advanced Recognition Security Strict Confidence Filtering: To prevent "false positives" (accidental locks), the engine enforces a high 0.80 (80%) confidence threshold.
Grammar Isolation: The engine utilizes Choices and GrammarBuilder to create a strict whitelist. It exclusively listens for your defined commands and ignores unrelated background conversations.
Noise Rejection: Any sound scoring 0.79 or lower is automatically discarded by the engine logic.

3. System-Level Protection Native Windows Locking: EchoLock communicates directly with the Windows kernel via the user32.dll library.
Kernel Call Execution: It triggers the LockWorkStation() function, providing the same level of cryptographic security as the manual Win + L shortcut.
Startup Integrity: The app integrates with the Windows Registry (HKCU\...\Run) to ensure protection is active from the moment the user logs in.

4. Local Data Integrity Encapsulated Storage: Your personalized command phrases are stored locally in a commands.json file within the application's root directory.
JSON Serialization: Data is handled using the JavaScriptSerializer class, ensuring it remains structured and only accessible by the EchoLock service.
Clean Uninstallation: The integrated uninstaller clears all registry entries and performs a recursive deletion of the app folder, leaving no trace on the host system.