CN115085988B - Intelligent voice equipment privacy violation detection method, system, equipment and storage medium - Google Patents

Intelligent voice equipment privacy violation detection method, system, equipment and storage medium Download PDF

Info

Publication number
CN115085988B
CN115085988B CN202210639710.3A CN202210639710A CN115085988B CN 115085988 B CN115085988 B CN 115085988B CN 202210639710 A CN202210639710 A CN 202210639710A CN 115085988 B CN115085988 B CN 115085988B
Authority
CN
China
Prior art keywords
intelligent voice
voice equipment
flow
equipment
detecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210639710.3A
Other languages
Chinese (zh)
Other versions
CN115085988A (en
Inventor
孙杰英
孔睿迅
张明珠
黄伟彬
庄伟玮
许蕴盈
余松明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vkan Certification And Testing Co ltd
Guangdong Zhongchuangzhijia Scientific Research Co ltd
Original Assignee
Vkan Certification And Testing Co ltd
Guangdong Zhongchuangzhijia Scientific Research Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vkan Certification And Testing Co ltd, Guangdong Zhongchuangzhijia Scientific Research Co ltd filed Critical Vkan Certification And Testing Co ltd
Priority to CN202210639710.3A priority Critical patent/CN115085988B/en
Publication of CN115085988A publication Critical patent/CN115085988A/en
Application granted granted Critical
Publication of CN115085988B publication Critical patent/CN115085988B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

The application discloses a method, a system, equipment and a storage medium for detecting privacy violation of intelligent voice equipment, and detecting whether the intelligent voice equipment needs online use or not; when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting flow data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of flow detection results; comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value; and determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results. According to the method, whether the intelligent voice equipment has privacy violation behaviors or not can be detected through the flow data, the accuracy and the effectiveness of detection can be greatly improved, and the use experience of a user can be improved. The method and the device can be widely applied to the technical field of privacy protection.

Description

Intelligent voice equipment privacy violation detection method, system, equipment and storage medium
Technical Field
The application relates to the technical field of privacy protection, in particular to a method, a system, equipment and a storage medium for detecting privacy violation of intelligent voice equipment.
Background
The intelligent voice equipment is a hardware product which has a voice recording function and can be used in a networking way. The intelligent voice equipment can liberate hands, and brings comfort and convenience for users. At the same time, however, consumers are increasingly concerned about the behavior of smart voice devices that may be privacy-violating, such as listening.
In the related art, detection of privacy violation is basically directed to software APP. Moreover, the protection is mainly to protect voice data from leakage of a third party or from leakage of sensitive information in voice information, not from the personal's own need for privacy protection. Therefore, the detection protection mode often has risks, and the worry of consumers cannot be eliminated, so that the use experience of users is affected.
In view of the above, there is a need to solve the problems of the related art.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the related art to a certain extent.
Therefore, an object of the embodiments of the present application is to provide a method, a system, a device and a storage medium for detecting privacy violation of an intelligent voice device.
In order to achieve the technical purpose, the technical scheme adopted by the embodiment of the application comprises the following steps:
on one hand, the embodiment of the application provides a method for detecting privacy violation of intelligent voice equipment, which comprises the following steps:
detecting whether the intelligent voice equipment needs online use or not;
when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting flow data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of flow detection results;
comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value;
and determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results.
In addition, the method for detecting privacy invasiveness of the intelligent voice device according to the embodiment of the application may further have the following additional technical features:
further, in one embodiment of the present application, the method further comprises:
when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting the change condition of storage capacity data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of storage capacity change values;
and when the storage capacity change value is larger than a second preset threshold value, determining the storage capacity change value as an abnormality detection result.
Further, in one embodiment of the present application, the detecting whether the intelligent voice device needs online use includes:
detecting whether the intelligent voice equipment needs to be subjected to network allocation;
when the intelligent voice equipment needs to be distributed with a network, determining that the voice product needs to be used online; or alternatively, the process may be performed,
when the intelligent voice equipment does not need to be distributed with a network, the voice product is determined not to be used online.
Further, in one embodiment of the present application, the method further comprises:
detecting flow data of the intelligent voice equipment when the intelligent voice equipment is determined to be not required to be used online;
and when the flow data of the intelligent voice equipment is larger than 0, determining that the intelligent voice equipment has privacy violation problems.
Further, in an embodiment of the present application, the adjusting the intelligent voice device to a preset state, detecting flow data of the intelligent voice device in a plurality of time periods, to obtain a plurality of flow detection results, includes:
and adjusting the intelligent voice equipment to a standby state, and detecting the change condition of the storage capacity data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of storage capacity change values.
Further, in an embodiment of the present application, the adjusting the intelligent voice device to a preset state, detecting flow data of the intelligent voice device in a plurality of time periods, to obtain a plurality of flow detection results, includes:
and adjusting the intelligent voice equipment to a working state, and detecting uploading flow data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of flow detection results.
Further, in an embodiment of the present application, the determining, according to the number of the anomaly detection results, whether the intelligent voice device has a privacy violation problem includes:
when the number of the abnormal detection results is larger than a third preset threshold value, determining that privacy violation problems exist in the intelligent voice equipment; or alternatively, the process may be performed,
and when the number of the abnormal detection results is smaller than or equal to a third preset threshold value, determining that the intelligent voice equipment has no privacy violation problem.
In another aspect, an embodiment of the present application provides an intelligent voice device privacy violation detection system, including:
the online detection unit is used for detecting whether the intelligent voice equipment needs online use or not;
the intelligent voice equipment is used for acquiring a plurality of flow detection results, wherein the flow detection unit is used for detecting flow data of the intelligent voice equipment in a plurality of time periods when the intelligent voice equipment is determined to be required to be used on line and is adjusted to a preset state;
the comparison unit is used for comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value;
and the processing unit is used for determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results.
In another aspect, an embodiment of the present application provides an intelligent voice device, including:
at least one processor;
at least one memory for storing at least one program;
the at least one program, when executed by the at least one processor, causes the at least one processor to implement the intelligent voice device privacy violation detection method described above.
In another aspect, an embodiment of the present application further provides a computer readable storage medium, in which a program executable by a processor is stored, where the program executable by the processor is configured to implement the above-described intelligent voice device privacy violation detection method when executed by the processor.
The advantages and benefits of the present application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the present application.
The intelligent voice equipment privacy violation detection method, system, equipment and storage medium disclosed by the embodiment of the application detect whether the intelligent voice equipment needs online use or not; when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting flow data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of flow detection results; comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value; and determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results. According to the method, whether the intelligent voice equipment has privacy violation behaviors or not can be detected through the flow data, the accuracy and the effectiveness of detection can be greatly improved, and the use experience of a user can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description is made with reference to the accompanying drawings of the embodiments of the present application or the related technical solutions in the prior art, it should be understood that, in the following description, the drawings are only for convenience and clarity to describe some embodiments in the technical solutions of the present application, and other drawings may be obtained according to these drawings without any inventive effort for those skilled in the art.
Fig. 1 is a flow chart of a method for detecting privacy violation of an intelligent voice device according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an intelligent voice device according to an embodiment of the present application.
Detailed Description
The present application is further described below with reference to the drawings and specific examples. The described embodiments should not be construed as limitations on the present application, and all other embodiments, which may be made by those of ordinary skill in the art without the exercise of inventive faculty, are intended to be within the scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the present application.
The intelligent voice equipment is a hardware product which has a voice recording function and can be used in a networking way. The intelligent voice equipment can liberate hands, and brings comfort and convenience for users. At the same time, however, consumers are increasingly concerned about the behavior of smart voice devices that may be privacy-violating, such as listening.
In the related art, detection of privacy violation is basically directed to software APP. Moreover, the protection is mainly to protect voice data from leakage of a third party or from leakage of sensitive information in voice information, not from the personal's own need for privacy protection. Therefore, the detection protection mode often has risks, and the worry of consumers cannot be eliminated, so that the use experience of users is affected.
In view of this, the embodiment of the application provides a method for detecting privacy violation of an intelligent voice device, which can detect whether the intelligent voice device has privacy violation behaviors through flow data, can greatly improve the accuracy and the effectiveness of detection, and is beneficial to improving the use experience of users.
Specifically, the method in the embodiment of the application may be performed in the intelligent voice device, for example, the method may be implemented based on a related processor in the intelligent voice device, that is, the method may be implemented by executing a related program in a processor of the intelligent voice device.
Referring to fig. 1, fig. 1 is a flowchart of a method for detecting privacy violation of an intelligent voice device according to an embodiment of the present application. Referring to fig. 1, the intelligent voice device privacy violation detection method includes, but is not limited to:
step 110, detecting whether the intelligent voice equipment needs online use;
in this step, for different types of intelligent voice devices, different detection modes can be adopted to detect the intelligent voice devices. Therefore, here, it is first necessary to distinguish between different types of intelligent voice devices. In the embodiment of the application, the intelligent voice equipment is mainly divided into an offline use type and an online use type. When the type of the intelligent voice equipment is detected, the intelligent voice equipment can be identified in a distribution network mode, namely whether the intelligent voice equipment belongs to an offline voice type or an online voice type product is detected in the distribution network mode. Wherein the network is required to be allocated and can be considered as an online voice product, otherwise, the network is considered as an offline voice product. Here, the network distribution manner may include any one of a bluetooth network distribution, a WIFI network distribution, a 4G network distribution, a 5G network distribution, and the like. The present application is not limited in this regard.
Step 120, when it is determined that the intelligent voice device needs to be used online, adjusting the intelligent voice device to a preset state, and detecting flow data of the intelligent voice device in a plurality of time periods to obtain a plurality of flow detection results;
in this step, when it is determined that the intelligent voice device needs to be used online, the risk of voice data leakage is high, so that further detection and judgment can be performed on the intelligent voice device. Specifically, in the embodiment of the application, the intelligent voice device can be adjusted to a preset state, and flow data of the intelligent voice device in a plurality of time periods can be detected to obtain a plurality of flow detection results. Here, detecting the traffic data of the product in several time periods may include transmitting address and size of data packet. In this embodiment, the preset state may be a state in which non-voice and other network related functions of the intelligent voice device are turned off. Therefore, the correlation between the flow data and the voice function is stronger, and the detection accuracy can be improved. In the embodiment of the present application, the size of each time period is not limited. For example, in some cases, the flow rate data for a plurality of days may be continuously detected with each day as a time period, and a plurality of flow rate detection results may be obtained.
It should be noted that, in the embodiment of the application, when the intelligent voice device does not need to be used online, that is, when the product is an offline product, because there is no communication interaction, if the user keeps using the product all the time, the probability that the intelligent voice device is infringed by privacy can be considered to be very small, and the security is high. Considering the after-sales and recycling problems, in the embodiment of the present application, the storage capacity of the relevant chip can be detected to confirm, if no storage capacity changes or the change frequency is low and the size of each update is small in a long detection period, the probability of privacy violation of the intelligent voice device is considered to be very small, the problem of privacy violation does not exist, and otherwise, the problem of privacy violation of the intelligent voice device is considered to exist.
In some embodiments, the traffic data of the intelligent voice device may also be detected when it is determined that the intelligent voice device does not need to be used online. As described above, when the intelligent voice device does not need to be used online, that is, when the product is an offline product, there is no need for communication interaction, so that under normal conditions, the intelligent voice device will not generate data transmission flow under the voice function. On the contrary, if the flow data of the product is detected to be larger than 0, the collected user voice data is likely to be transmitted to the background without informing the user, so that the intelligent voice equipment can be determined to have privacy violation problem.
And 130, comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value.
In this step, for each time period, a corresponding standard flow value may be preset. The standard flow value may be a flow value normally required to process voice data during the period, and the value may be determined experimentally or the like. And then, the magnitude relation between the flow detection result and the standard flow value can be compared to judge whether the flow of the current intelligent voice equipment is in a normal range, so as to judge whether the privacy leakage problem exists. Specifically, in the embodiment of the present application, a difference value between a flow detection result and a standard flow value may be calculated, then the difference value is compared with a first preset threshold value, and when the difference value is greater than the first preset threshold value, it is indicated that the flow has a suspected privacy violation problem, so that the flow detection result obtained at this time may be determined as an abnormal detection result. It should be noted that, the magnitude of the first preset threshold may be flexibly adjusted according to the need, which is not limited in the present application.
And 140, determining whether the intelligent voice equipment has a privacy violation problem according to the number of the abnormal detection results.
In the embodiment of the application, there may be uncertainty due to a single flow detection. The accuracy of the detection result is easily affected. Therefore, in the embodiment of the application, whether the intelligent voice equipment has the privacy violation problem can be comprehensively analyzed by combining whether the flow detection results in a plurality of time periods are judged to be abnormal detection results. For example, in some embodiments, 5 time periods are selected for detection during a day, and if only one of the time periods is determined to be an abnormal detection result, it is also possible that there is a fluctuation in the time period, so the smart voice device may be considered to have a small probability of privacy violation. Otherwise, if the flow detection results of a plurality of time periods are determined to be abnormal detection results, the intelligent voice equipment is indicated to have privacy violation with high probability. Therefore, in the embodiment of the present application, a third preset threshold may be set, for example, may be 3, and when the number of abnormal detection results is greater than the third preset threshold, it is determined that the intelligent voice device has a privacy violation problem; and when the number of the abnormal detection results is smaller than or equal to a third preset threshold value, determining that the intelligent voice equipment has no privacy violation problem. Similarly, the magnitude of the third preset threshold may be adjusted as desired.
In some embodiments, the method further comprises the steps of:
when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting the change condition of storage capacity data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of storage capacity change values;
and when the storage capacity change value is larger than a second preset threshold value, determining the storage capacity change value as an abnormality detection result.
In this embodiment of the present application, the change condition of the storage capacity data of the intelligent voice device in a plurality of time periods may also be detected, similarly, when the change of the storage space of the intelligent voice device is not in the normal value range, the detected condition may be determined as the privacy violation behavior to be confirmed, that is, a corresponding second preset threshold may be set, and when the change value of the storage capacity is greater than the second preset threshold, the change value of the storage capacity may be determined as the abnormal detection result. Here, the change in the storage capacity data may be obtained by file management, USB management, memory reading, or the like.
Specifically, in some embodiments, the adjusting the intelligent voice device to a preset state, detecting flow data of the intelligent voice device in a plurality of time periods, to obtain a plurality of flow detection results, includes:
and adjusting the intelligent voice equipment to a standby state, and detecting the change condition of the storage capacity data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of storage capacity change values.
In some embodiments, the adjusting the intelligent voice device to a preset state, detecting flow data of the intelligent voice device in a plurality of time periods to obtain a plurality of flow detection results includes:
and adjusting the intelligent voice equipment to a working state, and detecting uploading flow data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of flow detection results.
In this embodiment of the application, when detecting the flow, can expand from 2 aspects, first, detect whether intelligent voice equipment "steals recording," steal recording "indicates recording when the non-function must, appear that storage capacity increases according to certain rule. Specifically, to detect data in such a case, the intelligent voice device may be adjusted to a standby state, that is, a state when the voice function is not used, and if there is an abnormality in the detected storage capacity change value in this state, it may be interpreted that the device has privacy violation of "sound-stealing". Secondly, detecting whether the intelligent voice equipment has the 'steal uploading' action, wherein the 'steal uploading' action refers to the existence of certain uploading flow when no function is necessary, at this time, the intelligent voice equipment can be adjusted to be in a working state, and can be detected under the environment noise or under the human interaction sound, and then uploading flow data of the intelligent voice equipment in a plurality of time periods is obtained, so that a plurality of flow detection results are obtained, and whether the intelligent voice equipment has the 'steal uploading' action can be judged.
The implementation of the intelligent voice device privacy violation detection method provided in the application is described below with reference to a specific embodiment.
Taking a certain range hood product supporting voice control as an example, the intelligent voice equipment privacy violation detection method based on flow and storage statistics provided in the application is further described in detail:
step (1), by acquiring the information of the product specification, whether the intelligent voice equipment to be detected belongs to an offline product or an online product can be confirmed; in this embodiment, the range hood product is used by a WIFI distribution network, and can be confirmed to be an intelligent voice device that needs to be used online.
And (2) closing all functions or settings of the range hood product irrelevant to voice and network, configuring an independent WIFI network, accessing the range hood product to the WIFI network, monitoring the flow of the WIFI network through software such as Wireshark, performing wake-up and voice command execution for a plurality of times, inquiring weather, day-to-day and month-to-month operation, obtaining the address and the transmission packet size of normal communication data such as a heartbeat packet, a voice data uploading packet, an inquiry result downlink packet and the like which are normally transmitted, and if the voice data which are 'stolen uploading' exists or not aiming at, mainly checking the uploading flow.
And (3) closing all functions or settings of the equipment which are irrelevant to voice and network, checking the storage capacity of the equipment through an interface of the equipment, waking up for a plurality of times, executing voice commands, inquiring weather, crossing days, crossing months and the like, and obtaining the storage capacity change under a normal working state, as shown in the following table 1.
TABLE 1
Figure BDA0003683319990000071
Figure BDA0003683319990000081
And (4) analyzing the steps (2) and (3) to obtain normal flow ranges and storage space change ranges in various different states, and regarding other flow and storage space changes as privacy infringement states to be confirmed.
Step (5), closing non-voice and network related functions of voice products, firstly setting equipment standby state to detect for n days in a quiet environment, and observing whether the flow and storage capacity change of the equipment is in a normal range shown in table 1; then, in the standby state of the device, detecting the same for n days in the sound environment, and observing whether the flow and storage capacity change of the device is in the normal range shown in table 1; thirdly, respectively playing wake-up words at certain time intervals in a quiet environment and a sound environment, continuously testing for n days, and observing whether the flow and storage capacity change of the equipment is in a normal range shown in table 1; finally, the equipment is set to be in an awakened state, a weather inquiry command is played at certain time intervals in a quiet environment and a sound environment respectively, the continuous test is carried out for n days, and whether the flow and the storage capacity change of the equipment are in a normal range shown in table 1 or not is observed.
Aiming at the detection result of the step (5), if no abnormal flow and storage capacity are found, the range hood product is considered to have very small probability of user privacy violation; otherwise, repeating the tests (2) - (5) for a plurality of times, averaging the results, analyzing and confirming the privacy invading behaviors to be confirmed detected in the step (5) to obtain the frequency of the privacy invading detection behaviors and specific abnormal flow, and if the frequency of the privacy invading behaviors to be confirmed is found to be higher than 1 time/day or the abnormal flow with the size of the overflow packet exceeding the size of the normal flow packet by more than 10 times, considering that the voice product has the privacy invading behaviors of the user; otherwise, the speech product is considered not to exist for privacy violation.
It can be appreciated that in the embodiment of the application, when privacy infringement of the intelligent voice device is detected, the voice data does not need to be processed, and the risk of further revealing the privacy of the voice data does not exist, so that the privacy security of the voice data can be improved, and the use experience of a user is improved.
In this embodiment of the present application, there is also provided an intelligent voice device privacy violation detection system, including:
the online detection unit is used for detecting whether the intelligent voice equipment needs online use or not;
the intelligent voice equipment is used for acquiring a plurality of flow detection results, wherein the flow detection unit is used for detecting flow data of the intelligent voice equipment in a plurality of time periods when the intelligent voice equipment is determined to be required to be used on line and is adjusted to a preset state;
the comparison unit is used for comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value;
and the processing unit is used for determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results.
It can be understood that the content in the embodiment of the method for detecting privacy infringement of an intelligent voice device shown in fig. 1 is suitable for the embodiment of the system for detecting privacy infringement of an intelligent voice device, and the functions specifically realized by the embodiment of the system for detecting privacy infringement of an intelligent voice device are the same as those of the embodiment of the method for detecting privacy infringement of an intelligent voice device shown in fig. 1, and the beneficial effects achieved by the embodiment of the method for detecting privacy infringement of an intelligent voice device shown in fig. 1 are the same as those achieved by the embodiment of the method for detecting privacy infringement of an intelligent voice device shown in fig. 1.
Referring to fig. 2, the embodiment of the application further discloses an intelligent voice device, including:
at least one processor 201;
at least one memory 202 for storing at least one program;
the at least one program, when executed by the at least one processor 201, causes the at least one processor 201 to implement the intelligent voice device privacy violation detection method embodiment as shown in fig. 1.
It can be understood that the content in the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1 is applicable to the embodiment of the intelligent voice device, and the functions specifically implemented by the embodiment of the intelligent voice device are the same as those in the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1, and the beneficial effects achieved by the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1 are the same as those achieved by the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1.
The embodiment of the application also discloses a computer readable storage medium, in which a processor executable program is stored, which when executed by a processor is used to implement the intelligent voice device privacy violation detection method embodiment as shown in fig. 1.
It can be understood that the content in the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1 is applicable to the embodiment of the computer-readable storage medium, and the functions of the embodiment of the computer-readable storage medium are the same as those of the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1, and the beneficial effects achieved by the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1 are the same as those achieved by the embodiment of the method for detecting privacy violation of an intelligent voice device shown in fig. 1.
In some alternative embodiments, the functions/acts noted in the block diagrams may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Furthermore, the embodiments presented and described in the flowcharts of this application are provided by way of example in order to provide a more thorough understanding of the technology. The disclosed methods are not limited to the operations and logic flows presented herein. Alternative embodiments are contemplated in which the order of various operations is changed, and in which sub-operations described as part of a larger operation are performed independently.
Furthermore, while the present application is described in the context of functional modules, it should be appreciated that, unless otherwise indicated, one or more of the functions and/or features may be integrated in a single physical device and/or software module or one or more of the functions and/or features may be implemented in separate physical devices or software modules. It will also be appreciated that a detailed discussion of the actual implementation of each module is not necessary to an understanding of the present application. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be apparent to those skilled in the art from consideration of their attributes, functions and internal relationships. Thus, those of ordinary skill in the art will be able to implement the present application as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative and are not intended to be limiting upon the scope of the application, which is to be defined by the appended claims and their full scope of equivalents.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
In the foregoing description of the present specification, descriptions of the terms "one embodiment/example", "another embodiment/example", "certain embodiments/examples", and the like, are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the principles and spirit of the application, the scope of which is defined by the claims and their equivalents.
While the preferred embodiment of the present invention has been described in detail, the present invention is not limited to the embodiments, and one skilled in the art can make various equivalent modifications or substitutions without departing from the spirit of the present invention, and these equivalent modifications or substitutions are intended to be included in the scope of the present invention as defined by the appended claims
In the description of the present specification, reference to the terms "one embodiment," "another embodiment," or "certain embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the principles and spirit of the application, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. The intelligent voice equipment privacy violation detection method is characterized by comprising the following steps:
detecting whether the intelligent voice equipment needs online use or not;
when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting flow data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of flow detection results;
comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value;
and determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results.
2. The intelligent voice device privacy violation detection method of claim 1, further comprising:
when the intelligent voice equipment is determined to be required to be used online, adjusting the intelligent voice equipment to a preset state, detecting the change condition of storage capacity data of the intelligent voice equipment in a plurality of time periods, and obtaining a plurality of storage capacity change values;
and when the storage capacity change value is larger than a second preset threshold value, determining the storage capacity change value as an abnormality detection result.
3. The intelligent voice device privacy violation detection method of claim 1, wherein the detecting whether the intelligent voice device requires online use comprises:
detecting whether the intelligent voice equipment needs to be subjected to network allocation;
when the intelligent voice equipment needs to be distributed with a network, determining that the intelligent voice equipment needs to be used online; or alternatively, the process may be performed,
when the intelligent voice equipment does not need to be distributed with a network, it is determined that the intelligent voice equipment does not need to be used online.
4. The intelligent voice device privacy violation detection method of claim 1, further comprising:
detecting flow data of the intelligent voice equipment when the intelligent voice equipment is determined to be not required to be used online;
and when the flow data of the intelligent voice equipment is larger than 0, determining that the intelligent voice equipment has privacy violation problems.
5. The method for detecting privacy violation of intelligent voice equipment according to claim 2, wherein the step of adjusting the intelligent voice equipment to a preset state, detecting the change condition of storage capacity data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of storage capacity change values includes:
and adjusting the intelligent voice equipment to a standby state, and detecting the change condition of the storage capacity data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of storage capacity change values.
6. The method for detecting privacy violation of an intelligent voice device according to any one of claims 1-4, wherein the adjusting the intelligent voice device to a preset state detects flow data of the intelligent voice device in a plurality of time periods to obtain a plurality of flow detection results, including:
and adjusting the intelligent voice equipment to a working state, and detecting uploading flow data of the intelligent voice equipment in a plurality of time periods to obtain a plurality of flow detection results.
7. The method for detecting privacy violation of intelligent voice device according to claim 1, wherein the determining whether the intelligent voice device has a privacy violation problem according to the number of the abnormal detection results includes:
when the number of the abnormal detection results is larger than a third preset threshold value, determining that privacy violation problems exist in the intelligent voice equipment; or alternatively, the process may be performed,
and when the number of the abnormal detection results is smaller than or equal to a third preset threshold value, determining that the intelligent voice equipment has no privacy violation problem.
8. Intelligent voice device privacy violation detecting system, characterized by comprising:
the online detection unit is used for detecting whether the intelligent voice equipment needs online use or not;
the intelligent voice equipment is used for acquiring a plurality of flow detection results, wherein the flow detection unit is used for detecting flow data of the intelligent voice equipment in a plurality of time periods when the intelligent voice equipment is determined to be required to be used on line and is adjusted to a preset state;
the comparison unit is used for comparing each flow detection result with a corresponding standard flow value, and determining the flow detection result as an abnormal detection result when the difference value between the flow detection result and the standard flow value is larger than a first preset threshold value;
and the processing unit is used for determining whether the intelligent voice equipment has privacy violation problems according to the number of the abnormal detection results.
9. An intelligent speech device, comprising:
at least one processor;
at least one memory for storing at least one program;
the at least one program, when executed by the at least one processor, causes the at least one processor to implement the intelligent voice device privacy violation detection method of any of claims 1-7.
10. A computer-readable storage medium having stored therein a program executable by a processor, characterized in that: the processor executable program when executed by a processor is for implementing the intelligent voice device privacy violation detection method of any of claims 1-7.
CN202210639710.3A 2022-06-08 2022-06-08 Intelligent voice equipment privacy violation detection method, system, equipment and storage medium Active CN115085988B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210639710.3A CN115085988B (en) 2022-06-08 2022-06-08 Intelligent voice equipment privacy violation detection method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210639710.3A CN115085988B (en) 2022-06-08 2022-06-08 Intelligent voice equipment privacy violation detection method, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115085988A CN115085988A (en) 2022-09-20
CN115085988B true CN115085988B (en) 2023-05-02

Family

ID=83251141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210639710.3A Active CN115085988B (en) 2022-06-08 2022-06-08 Intelligent voice equipment privacy violation detection method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115085988B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049592B (en) * 2015-05-27 2020-02-14 中国科学院信息工程研究所 Mobile intelligent terminal voice safety protection method and system
US10831923B2 (en) * 2018-06-08 2020-11-10 The Toronto-Dominion Bank System, device and method for enforcing privacy during a communication session with a voice assistant
CN111343344B (en) * 2020-03-13 2022-05-31 Oppo(重庆)智能科技有限公司 Voice abnormity detection method and device, storage medium and electronic equipment
WO2021217527A1 (en) * 2020-04-29 2021-11-04 华为技术有限公司 In-vehicle voice interaction method and device
CN113284516A (en) * 2021-03-29 2021-08-20 威凯检测技术有限公司 Intelligent voice product privacy invasion detection method based on energy consumption

Also Published As

Publication number Publication date
CN115085988A (en) 2022-09-20

Similar Documents

Publication Publication Date Title
CN106507445B (en) Wireless fidelity Wi-Fi scanning method and mobile terminal
CN105049592B (en) Mobile intelligent terminal voice safety protection method and system
US8631492B2 (en) Dynamic management of resource utilization by an antivirus application
KR102534334B1 (en) Detection of software attacks on processes in computing devices
US10356113B2 (en) Apparatus and method for detecting abnormal behavior
EP2979425A1 (en) Method and apparatus for detecting a multi-stage event
CN106125883A (en) Intelligent terminal and control method thereof
CN103634268A (en) A safety control method and an apparatus
US9965626B2 (en) Memory attack detection
CN114065196A (en) Java memory horse detection method and device, electronic equipment and storage medium
CN104503839B (en) Computing device optimization method and device based on audio
CN106325993A (en) Freezing method of application program and terminal
CN104123496A (en) Rogue software interception method, device and terminal
CN115085988B (en) Intelligent voice equipment privacy violation detection method, system, equipment and storage medium
CN104268193A (en) Advertisement webpage intercepting method and device
WO2016197819A1 (en) Reverse power supply line detection processing method and apparatus
CN106502887A (en) A kind of stability test method, test controller and system
CN105245591A (en) Method and system for monitoring desktop cloud performance experience
CN103809955A (en) Method and device for ending process
CN210536678U (en) Intelligent sound box data stream acquisition device
CN105989152A (en) Search engine service quality monitoring methods, apparatus and system
CN104123489A (en) Method and device for monitoring executable program
CN104268231B (en) A kind of file access method, device and Intelligent File System
CN103366115A (en) Safety detecting method and device
CN115085956B (en) Intrusion detection method, intrusion detection device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant