CN106571134A - Hidden recording preventing method and terminal - Google Patents
Hidden recording preventing method and terminal Download PDFInfo
- Publication number
- CN106571134A CN106571134A CN201610882036.6A CN201610882036A CN106571134A CN 106571134 A CN106571134 A CN 106571134A CN 201610882036 A CN201610882036 A CN 201610882036A CN 106571134 A CN106571134 A CN 106571134A
- Authority
- CN
- China
- Prior art keywords
- user
- recording
- starting
- function
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000002265 prevention Effects 0.000 claims description 12
- 230000000977 initiatory effect Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 83
- 238000004891 communication Methods 0.000 description 8
- 230000004913 activation Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 230000009471 action Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/02—Feature extraction for speech recognition; Selection of recognition unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a hidden recording preventing method and a terminal. The hidden recording preventing method comprises the steps of acquiring a triggering condition set by a user for starting a hidden recording preventing function; if call request information is detected, responding to the call request information and performing voice recognition on the call content so as to start the hidden recording preventing function when the call content conforms to the triggering condition and prevent the user from being recorded in a hidden manner; or if current location information of the user is detected to meet the triggering condition, starting the hidden recording preventing function so as to prevent the user from being recorded in a hidden manner. The terminal disclosed by the embodiment of the invention realizes starting of the hidden recording preventing function when the triggering condition is met through providing opportunities for the user to set the condition for triggering the hidden recording preventing function, thereby protecting the privacy of the user.
Description
Technical Field
The invention relates to the technical field of electronics, in particular to an anti-surreptitious recording method and a terminal.
Background
Nowadays, the popularity of the intelligent terminal is higher and higher, and people almost can not leave the intelligent terminal in life or work. However, the popularization of the smart terminal also causes troubles in information security and the like for the user. For example, when a user uses an intelligent terminal to perform a voice call, the call content is easily recorded by surrounding recording devices. For another example, in some social occasions, the user records the conversation content by other users by using the intelligent terminal.
Although it is possible to prevent a hacker from monitoring and other actions by software such as a security guard in the prior art, it is not possible to prevent the recording devices around the user from recording the call content or conversation content of the user.
Disclosure of Invention
The embodiment of the invention provides an anti-skimming method and a terminal, which can be used for a user to formulate a condition for triggering an anti-skimming function, so that the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
In a first aspect, an embodiment of the present invention provides an anti-surreptitious recording method, where the anti-surreptitious recording method includes:
acquiring a trigger condition for starting an anti-skimming function set by a user;
if the call request information is detected, responding to the call request information and carrying out voice recognition on call contents so as to start an anti-recording function when the call contents meet the trigger condition to prevent a user from being recorded illegally; or,
and if the current position information of the user is detected to meet the trigger condition, starting an anti-recording stealing function to prevent the user from being recorded illegally.
In another aspect, an embodiment of the present invention provides a terminal, where the terminal includes:
the acquisition unit is used for acquiring a trigger condition for starting the anti-recording function set by a user;
the first starting unit is used for responding to the call request information and carrying out voice recognition on the call content if the call request information is detected, so that when the call content meets the trigger condition, a record stealing prevention function is started to prevent a user from being recorded in a stolen way; or,
and the second starting unit is used for starting the record stealing prevention function if the current position information of the user is detected to meet the trigger condition so as to prevent the user from being recorded in a stealing manner.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an anti-skimming method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of an anti-skimming method according to another embodiment of the present invention;
fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a terminal according to another embodiment of the present invention;
fig. 5 is a schematic block diagram of a terminal according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the terminals described in embodiments of the invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
Referring to fig. 1, fig. 1 is a schematic flow chart of an anti-skimming method according to an embodiment of the present invention. In this embodiment, an execution main body of the anti-surreptitious recording method is a terminal, and the terminal may be a mobile terminal such as a smart phone or a tablet computer, or may be an intelligent wearable device such as a bracelet and a smart watch. As shown in fig. 1, the anti-skimming method includes the following steps:
s110: and acquiring a trigger condition for starting the anti-recording function set by a user.
In step S110, when the trigger condition needs to be set, the user presets the terminal, or sends a start instruction for setting the start of the anti-skimming function, so as to set the trigger condition for starting the anti-skimming function.
Wherein the trigger condition may include: the method comprises the steps of presetting keywords, presetting key sentence patterns, contact numbers, voice call requests sent by target contacts, presetting common places or presetting common places.
The preset common locations may include: home, first longitude, first latitude, or work unit. The preset non-use points may include: a second longitude, a second latitude, a bank, a hotel, or a road name. Wherein the bank further comprises a self-service terminal of the bank, and the road name is related to at least one of the second longitude, the second latitude, the bank and the hotel. For example, there is a bank self-service terminal on the "east ring road", and the trigger condition set by the user to start the anti-theft recording function may include the bank self-service terminal or the "east ring road" where the bank self-service terminal is located.
It can be understood that when the preset unusual place included in the trigger condition for starting the anti-skimming function set by the user is the second longitude, the second latitude, the bank, the hotel or the road name, the effective range threshold may be set at the same time, that is, the trigger condition is satisfied within the effective range threshold of the preset unusual place.
S120: and if the call request information is detected, responding to the call request information and carrying out voice recognition on the call content, so that when the call content meets the trigger condition, an anti-recording function is started to prevent the user from being recorded by the record.
In step S120, the call request information includes: voice call request information, video call request information, voice segment request information, video segment request information, incoming call request information, or outgoing call request information.
It should be noted that the voice call request information is a request sent by a user through a terminal to perform a real-time voice call, the video call request information is a request sent by the user through the terminal to perform a real-time video call, the voice segment request information is request information sent by the user through the terminal to record a voice segment with a certain duration, and the video segment request information is request information sent by the user through the terminal to record a video segment with a certain duration.
It is understood that the call request information may be incoming call request information or outgoing call request information sent by the user through the terminal, and may also be call request information sent through an Application program (APP) in the terminal. The application program can be an application program with social function, such as QQ, WeChat, microblog, blog, QQ space or Michat.
Step S130 is also described in this embodiment as a parallel solution to step S120. It should be noted that there is no precedence relationship between step S120 and step S130, and in practical applications, after step S120 is executed, step S130 is not executed again until the anti-skimming function is turned off. Or when step S130 is executed, step S120 is not executed again until the anti-skimming function is turned off.
S130: and if the current position information of the user is detected to meet the trigger condition, starting an anti-recording stealing function to prevent the user from being recorded illegally.
In step S130, the current location information is that the terminal of the user can accurately obtain the current location of the user through an internal Positioning module, where the Positioning module may be a Global Positioning System (GPS) or a beidou Positioning System.
It should be noted that the current location information may include: longitude, latitude, or landmark name. The landmark name may be composed of "country (region)", "province (city in direct prefecture)", "district", "county (town)", and "village", or may be directly a road name.
It is understood that the current location information includes a preset common location and a preset non-common location. As an embodiment of the present invention, the triggering condition is a preset common place, and the step S130 specifically includes: judging whether the current position information is matched with a preset common place or not; and if the current position information is not matched with the preset common place, starting an anti-theft recording function.
The starting anti-theft recording function specifically comprises the following steps: high-frequency interference signals are radiated to the surroundings to form recording interference for recording equipment in the area of the user.
That is, the high-frequency interference signal is radiated to the surroundings from the terminal of the user, specifically, the high-frequency interference signal may be radiated to the surroundings through the antenna of the terminal.
The high-frequency interference signal is a radio-frequency interference signal containing white noise, the continuous white noise is superposed on the radio-frequency interference signal, and the radio-frequency interference signal is covered by the continuous white noise or is mixed into other sound sources, so that the anti-skimming function is realized.
It should be noted that, since the power of the frequency components in a segment of sound is uniform in the whole audible range (0-20 KHZ), the sound is very noisy due to the sensitivity of the human ear to high frequencies, and the noise is so-called white noise.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
Referring to fig. 2, fig. 2 is a schematic flow chart of an anti-skimming method according to another embodiment of the present invention. In this embodiment, an execution main body of the anti-surreptitious recording method is a terminal, and the terminal may be a mobile terminal such as a smart phone or a tablet computer, or may be an intelligent wearable device such as a bracelet and a smart watch. As shown in fig. 2, the anti-skimming method includes the following steps:
s210: and acquiring a trigger condition for starting the anti-recording function set by a user.
In step S210, when the trigger condition needs to be set, the user presets the terminal, or sends a start instruction for setting the start of the anti-skimming function, so as to set the trigger condition for starting the anti-skimming function.
Wherein the trigger condition may include: the method comprises the steps of presetting keywords, presetting key sentence patterns, contact numbers, voice call requests sent by target contacts, presetting common places or presetting common places.
The preset common locations may include: home, first longitude, first latitude, or work unit. The preset non-use points may include: a second longitude, a second latitude, a bank, a hotel, or a road name. Wherein the bank further comprises a self-service terminal of the bank, and the road name is related to at least one of the second longitude, the second latitude, the bank and the hotel. For example, there is a bank self-service terminal on the "east ring road", and the trigger condition set by the user to start the anti-theft recording function may include the bank self-service terminal or the "east ring road" where the bank self-service terminal is located.
It can be understood that when the preset unusual place included in the trigger condition for starting the anti-skimming function set by the user is the second longitude, the second latitude, the bank, the hotel or the road name, the effective range threshold may be set at the same time, that is, the trigger condition is satisfied within the effective range threshold of the preset unusual place.
S220: and if the call request information is detected, responding to the call request information, and judging whether the call content contains preset voice keywords or preset voice key sentence patterns or not through voice recognition.
In step S220, the call request information includes: voice call request information, video call request information, voice segment request information, video segment request information, incoming call request information, or outgoing call request information.
It should be noted that the voice call request information is a request sent by a user through a terminal to perform a real-time voice call, the video call request information is a request sent by the user through the terminal to perform a real-time video call, the voice segment request information is request information sent by the user through the terminal to record a voice segment with a certain duration, and the video segment request information is request information sent by the user through the terminal to record a video segment with a certain duration.
The speech recognition of the call content may be recognition of a speech keyword or a speech key sentence pattern. The voice keywords can be options of a plurality of tone words, single words or words preset by the terminal, and can also be keywords edited by a user in a user-defined manner. The speech key sentence pattern can be a phrase formed by a plurality of single characters or words preset by the terminal, and can also be a phrase customized and edited by the user.
S230: and if the conversation content contains preset voice keywords or accords with a preset voice key sentence pattern, starting an anti-stealing recording function.
In step S230, the preset speech keyword may include: "password", "secret", "not to say", or "not to say", etc. The preset phonetic key sentence pattern may include: "target person … action …", "target person … time …", "time … action …", "target person … action … time …", or "target person … time … action", etc. For example, "i want to go to li home today in the afternoon".
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
By setting the voice keywords or the voice key sentence patterns, the user can realize the anti-stealing recording function by speaking the voice keywords or the voice key sentence patterns in the process of carrying out voice communication by using the terminal.
Please refer to fig. 3, and fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention, in which each unit included in the terminal 100 in the embodiment is used to execute each step in the embodiment corresponding to fig. 1, and specifically refer to fig. 1 and the related description in the embodiment corresponding to fig. 1, which are not repeated herein. Specifically, the method comprises the following steps:
the terminal 100 includes: an acquisition unit 10, a first activation unit 20 and/or a second activation unit 30. As an embodiment of the present invention, the second starting unit 30 may include a third judging unit 31 and a third executing unit 32. Specifically, the method comprises the following steps:
the obtaining unit 10 is configured to obtain a trigger condition for starting the anti-skimming function set by a user.
For example, the obtaining unit 10 is configured to obtain a trigger condition for starting an anti-skimming function set by a user.
The acquisition unit 10 sends the trigger condition to the first activation unit 20 or the second activation unit 30.
The first starting unit 20 is configured to, if the call request information is detected, respond to the call request information and perform voice recognition on the call content, so as to start the record stealing prevention function when the call content meets the trigger condition, so as to prevent the user from being recorded by the record stealing prevention function.
For example, the first starting unit 20 receives the trigger condition sent by the obtaining unit 10, and if the call request information is detected, responds to the call request information and performs voice recognition on the call content, so as to start the anti-skimming function when the call content meets the trigger condition, so as to prevent the user from being skimming.
And the second starting unit 30 is configured to start the record stealing prevention function if it is detected that the current location information of the user meets the trigger condition, so as to prevent the user from being recorded illegally.
For example, the second starting unit 30 receives the trigger condition sent by the obtaining unit 10, and starts the record stealing prevention function to prevent the user from being recorded secretly if it is detected that the current location information of the user meets the trigger condition.
Further, the second starting unit 30 includes a third judging unit 31 and a third executing unit 32.
A third determining unit 31, configured to determine whether the current location information matches a preset common location.
And a third executing unit 32, configured to start an anti-skimming function if the current location information does not match the preset common location.
For example, the third determining unit 31 is configured to determine whether the current location information matches a preset common location; and a third executing unit 32, configured to start an anti-skimming function if the current location information does not match the preset common location.
Further, the first starting unit 20 is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
For example, the first enabling unit 20 radiates a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
Further, the second starting unit 30 is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
For example, the second starting unit 30 radiates a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
Referring to fig. 4, fig. 4 is a schematic block diagram of a terminal according to another embodiment of the present invention, in which each unit included in the terminal 200 in this embodiment is used to execute each step in the embodiment corresponding to fig. 2, and specifically, refer to fig. 2 and the related description in the embodiment corresponding to fig. 2, which are not repeated herein. Specifically, the method comprises the following steps:
the terminal 200 includes: an acquisition unit 110 and a first activation unit 120. The first starting unit 120 may include a first judging unit 121 and a first executing unit 122, or the first starting unit 120 may include a second judging unit 123 and a second executing unit 124. Specifically, the method comprises the following steps:
the obtaining unit 110 is configured to obtain a trigger condition for starting the anti-skimming function set by a user.
For example, the obtaining unit 110 is configured to obtain a trigger condition for starting an anti-skimming function set by a user.
The acquisition unit 110 sends the trigger condition to the first activation unit 120 or the second activation unit 130.
The first starting unit 120 is configured to, if the call request information is detected, respond to the call request information and perform voice recognition on the call content, so as to start the record stealing prevention function when the call content meets the trigger condition, so as to prevent the user from being recorded by the record stealing prevention function.
For example, the first starting unit 120 receives the trigger condition sent by the obtaining unit 110, responds to the call request information if the call request information is detected, and determines whether the call content includes a preset voice keyword or a preset voice key sentence pattern through voice recognition.
Further, the first starting unit 120 includes a first judging unit 121 and a first executing unit 122.
The first determining unit 121 is configured to determine whether the call content includes a preset voice keyword through voice recognition.
The first executing unit 122 is configured to start an anti-skimming function if the call content includes a preset voice keyword.
For example, the first determining unit 121 is configured to determine whether the call content includes a preset voice keyword through voice recognition. The first executing unit 122 is configured to start an anti-skimming function if the call content includes a preset voice keyword.
Further, the first starting unit 120 includes a second judging unit 123 and a second executing unit 124.
The second judging unit 123 is configured to judge whether the call content conforms to a preset key speech sentence pattern through speech recognition.
The second executing unit 124 is configured to start the anti-skimming function if the call content matches a preset key speech sentence pattern.
For example, the second determining unit 123 is configured to determine whether the call content conforms to a preset key speech sentence pattern through speech recognition; the second executing unit 124 is configured to start the anti-skimming function if the call content matches a preset key speech sentence pattern.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
By setting the voice keywords or the voice key sentence patterns, the user can realize the anti-stealing recording function by speaking the voice keywords or the voice key sentence patterns in the process of carrying out voice communication by using the terminal.
Referring to fig. 5, fig. 5 is a schematic block diagram of a terminal according to another embodiment of the present invention. The terminal 400 in the present embodiment as shown in the figure may include: one or more processors 401; one or more input devices 402, one or more output devices 403, and memory 404. The processor 401, the input device 402, the output device 403 and the memory 404 are all in communication with each other via a communication bus 405.
The memory 404 is used to store program instructions.
The processor 401 is configured to obtain a trigger condition for starting the anti-skimming function, which is set by the user:
the processor 401 is configured to, if the call request information is detected, respond to the call request information and perform voice recognition on the call content, so as to start an anti-skimming function when the call content meets the trigger condition, so as to prevent a user from being skimming.
The processor 401 is further configured to start an anti-skimming function if it is detected that the current location information of the user meets the trigger condition, so as to prevent the user from being skimming.
Wherein the trigger condition may include: the method comprises the steps of presetting keywords, presetting key sentence patterns, contact numbers, voice call requests sent by target contacts, presetting common places or presetting common places.
Further, the processor 401 is configured to determine whether the call content includes a preset voice keyword through voice recognition; and if the conversation content contains preset voice keywords, starting an anti-recording function.
Further, the processor 401 is specifically configured to determine whether the call content conforms to a preset key speech sentence pattern through speech recognition; and if the conversation content conforms to a preset key speech sentence pattern, starting an anti-stealing recording function.
Further, the processor 401 is specifically configured to determine whether the current location information matches a preset common location; and if the current position information is not matched with the preset common place, starting an anti-theft recording function.
Further, the processor 401 is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference for the recording device in the area where the user is located.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be set by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
It should be understood that, in the embodiments of the present invention, the Processor 401 may be a Central Processing Unit (CPU), and the Processor may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 402 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a camera, a microphone, etc., and the output device 403 may include a display (LCD, etc.), a speaker, etc.
The memory 404 may include a read-only memory and a random access memory, and provides instructions and data to the processor 401. A portion of the memory 404 may also include non-volatile random access memory. For example, the memory 404 may also store device type information.
In a specific implementation, the processor 401, the input device 402, and the output device 403 described in this embodiment of the present invention may execute the implementation manners described in the first embodiment and the second embodiment of the backup method for communication records provided in this embodiment of the present invention, and may also execute the implementation manner of the terminal described in this embodiment of the present invention, which is not described herein again.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the terminal and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. An anti-skimming method, comprising:
acquiring a trigger condition for starting an anti-skimming function set by a user;
if the call request information is detected, responding to the call request information and carrying out voice recognition on call contents so as to start an anti-recording function when the call contents meet the trigger condition to prevent a user from being recorded illegally; or,
and if the current position information of the user is detected to meet the trigger condition, starting an anti-recording stealing function to prevent the user from being recorded illegally.
2. The method for preventing the surreptitious recording according to claim 1, wherein the performing voice recognition on the call content to start an surreptitious recording prevention function to prevent the surreptitious recording of the user when the call content meets the trigger condition comprises:
judging whether the conversation content contains preset voice keywords or not through voice recognition;
and if the conversation content contains preset voice keywords, starting an anti-recording function.
3. The method for preventing the surreptitious recording according to claim 1, wherein the performing voice recognition on the call content to start an surreptitious recording prevention function to prevent the surreptitious recording of the user when the call content meets the trigger condition comprises:
judging whether the conversation content conforms to a preset voice key sentence pattern or not through voice recognition;
and if the conversation content conforms to a preset key speech sentence pattern, starting an anti-stealing recording function.
4. The method for preventing the surreptitious recording of the claim 1, wherein the starting the surreptitious recording function to prevent the surreptitious recording of the user when detecting that the current position information of the user meets the trigger condition comprises:
judging whether the current position information is matched with a preset common place or not;
and if the current position information is not matched with the preset common place, starting an anti-theft recording function.
5. The method of claim 1, wherein the initiating an anti-skimming function comprises:
high-frequency interference signals are radiated to the surroundings to form recording interference for recording equipment in the area of the user.
6. A terminal, characterized in that the terminal comprises:
the acquisition unit is used for acquiring a trigger condition for starting the anti-recording function set by a user;
the first starting unit is used for responding to the call request information and carrying out voice recognition on the call content if the call request information is detected, so that when the call content meets the trigger condition, a record stealing prevention function is started to prevent a user from being recorded in a stolen way; or,
and the second starting unit is used for starting the record stealing prevention function if the current position information of the user is detected to meet the trigger condition so as to prevent the user from being recorded in a stealing manner.
7. The terminal of claim 6, wherein the first enabling unit comprises:
the first judging unit is used for judging whether the conversation content contains preset voice keywords or not through voice recognition;
and the first execution unit is used for starting the anti-skimming function if the call content contains preset voice keywords.
8. The terminal of claim 6, wherein the first enabling unit comprises:
the second judging unit is used for judging whether the conversation content conforms to a preset voice key sentence pattern or not through voice recognition;
and the second execution unit is used for starting the anti-stealing recording function if the conversation content conforms to a preset voice key sentence pattern.
9. The terminal of claim 6, wherein the second enabling unit comprises:
the third judging unit is used for judging whether the current position information is matched with a preset common place or not;
and the third execution unit is used for starting the anti-skimming function if the current position information is not matched with the preset common place.
10. The terminal according to claim 6, wherein the first enabling unit is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference to a recording device in an area where a user is located;
the second starting unit is specifically used for radiating a high-frequency interference signal to the periphery so as to form recording interference on the recording equipment in the area where the user is located.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610882036.6A CN106571134B (en) | 2016-10-08 | 2016-10-08 | Anti-stealing recording method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610882036.6A CN106571134B (en) | 2016-10-08 | 2016-10-08 | Anti-stealing recording method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106571134A true CN106571134A (en) | 2017-04-19 |
CN106571134B CN106571134B (en) | 2021-02-12 |
Family
ID=58531661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610882036.6A Active CN106571134B (en) | 2016-10-08 | 2016-10-08 | Anti-stealing recording method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106571134B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021227820A1 (en) * | 2020-05-15 | 2021-11-18 | 华为技术有限公司 | Method and device for negotiating permission during communication process, and electronic apparatus |
CN114885059A (en) * | 2022-06-15 | 2022-08-09 | 中国电信股份有限公司 | Method and device for acquiring opposite-end recording state in mobile network and electronic equipment |
CN116567150A (en) * | 2023-07-11 | 2023-08-08 | 山东凌晓通信科技有限公司 | Method and system for preventing eavesdropping and recording in conference room |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1968080A (en) * | 2006-09-06 | 2007-05-23 | 四川长虹电器股份有限公司 | Method for privacy protection in digital media application |
CN102045712A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Anti-monitoring method and system for mobile terminal |
CN102186166A (en) * | 2011-03-11 | 2011-09-14 | 深圳市易联盛世科技有限公司 | Method for preventing environmental monitoring and environmental sound-recording based on Bluetooth technology |
CN103416045A (en) * | 2012-09-20 | 2013-11-27 | 华为终端有限公司 | Eavesdropping detection method and terminal apparatus |
CN103581422A (en) * | 2012-08-09 | 2014-02-12 | 富泰华工业(深圳)有限公司 | Communication terminal and anti-eavesdrop communication method thereof |
CN103929551A (en) * | 2013-01-11 | 2014-07-16 | 上海掌门科技有限公司 | Assisting method and system based on call |
CN104065836A (en) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | Method and device for monitoring calls |
CN104144601A (en) * | 2014-07-22 | 2014-11-12 | 北京利云技术开发公司 | Device for preventing hacking through mobile phone |
CN204119249U (en) * | 2014-09-22 | 2015-01-21 | 石家庄于栋电子科技有限公司 | Ultrasonic wave recording shielding device |
CN104601784A (en) * | 2015-01-26 | 2015-05-06 | 电子科技大学 | Anti-eavesdropping device |
CN104615937A (en) * | 2015-02-13 | 2015-05-13 | 联想(北京)有限公司 | Information processing method and mobile terminal |
WO2015131559A1 (en) * | 2014-09-17 | 2015-09-11 | 中兴通讯股份有限公司 | Terminal, method and device for controlling functions thereof, and communication system |
CN105047191A (en) * | 2015-03-03 | 2015-11-11 | 西北工业大学 | Ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device, and anti-eavesdrop and anti-wiretapping method using the device |
CN105306162A (en) * | 2015-10-29 | 2016-02-03 | 天津光电安辰信息技术有限公司 | Mixing-based recording shielding device and realizing method thereof |
CN105827357A (en) * | 2016-05-24 | 2016-08-03 | 广东电网有限责任公司信息中心 | Voice recording shielding device and voice recording shielding method |
-
2016
- 2016-10-08 CN CN201610882036.6A patent/CN106571134B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1968080A (en) * | 2006-09-06 | 2007-05-23 | 四川长虹电器股份有限公司 | Method for privacy protection in digital media application |
CN102045712A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Anti-monitoring method and system for mobile terminal |
CN102186166A (en) * | 2011-03-11 | 2011-09-14 | 深圳市易联盛世科技有限公司 | Method for preventing environmental monitoring and environmental sound-recording based on Bluetooth technology |
CN103581422A (en) * | 2012-08-09 | 2014-02-12 | 富泰华工业(深圳)有限公司 | Communication terminal and anti-eavesdrop communication method thereof |
CN103416045A (en) * | 2012-09-20 | 2013-11-27 | 华为终端有限公司 | Eavesdropping detection method and terminal apparatus |
CN103929551A (en) * | 2013-01-11 | 2014-07-16 | 上海掌门科技有限公司 | Assisting method and system based on call |
CN104065836A (en) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | Method and device for monitoring calls |
CN104144601A (en) * | 2014-07-22 | 2014-11-12 | 北京利云技术开发公司 | Device for preventing hacking through mobile phone |
WO2015131559A1 (en) * | 2014-09-17 | 2015-09-11 | 中兴通讯股份有限公司 | Terminal, method and device for controlling functions thereof, and communication system |
CN204119249U (en) * | 2014-09-22 | 2015-01-21 | 石家庄于栋电子科技有限公司 | Ultrasonic wave recording shielding device |
CN104601784A (en) * | 2015-01-26 | 2015-05-06 | 电子科技大学 | Anti-eavesdropping device |
CN104615937A (en) * | 2015-02-13 | 2015-05-13 | 联想(北京)有限公司 | Information processing method and mobile terminal |
CN105047191A (en) * | 2015-03-03 | 2015-11-11 | 西北工业大学 | Ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device, and anti-eavesdrop and anti-wiretapping method using the device |
CN105306162A (en) * | 2015-10-29 | 2016-02-03 | 天津光电安辰信息技术有限公司 | Mixing-based recording shielding device and realizing method thereof |
CN105827357A (en) * | 2016-05-24 | 2016-08-03 | 广东电网有限责任公司信息中心 | Voice recording shielding device and voice recording shielding method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021227820A1 (en) * | 2020-05-15 | 2021-11-18 | 华为技术有限公司 | Method and device for negotiating permission during communication process, and electronic apparatus |
EP4138357A4 (en) * | 2020-05-15 | 2023-10-18 | Huawei Technologies Co., Ltd. | Method and device for negotiating permission during communication process, and electronic apparatus |
CN114885059A (en) * | 2022-06-15 | 2022-08-09 | 中国电信股份有限公司 | Method and device for acquiring opposite-end recording state in mobile network and electronic equipment |
CN116567150A (en) * | 2023-07-11 | 2023-08-08 | 山东凌晓通信科技有限公司 | Method and system for preventing eavesdropping and recording in conference room |
CN116567150B (en) * | 2023-07-11 | 2023-09-08 | 山东凌晓通信科技有限公司 | Method and system for preventing eavesdropping and recording in conference room |
Also Published As
Publication number | Publication date |
---|---|
CN106571134B (en) | 2021-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10623963B2 (en) | Proactive security for mobile devices | |
US11093659B2 (en) | Controlling content visibility on a computing device based on wearable device proximity | |
JP6246854B2 (en) | Smart audio playback when connected to an audio output system | |
CN107690620B (en) | Application suggestion based on detected trigger events | |
US11012807B2 (en) | Location service management | |
EP3493056B1 (en) | Information displaying method for terminal device, and terminal device | |
CN107291962B (en) | Searching method, searching device, storage medium and electronic equipment | |
US9076020B2 (en) | Protected mode for mobile communication and other devices | |
CN104700010B (en) | Personal information protection method and protection device | |
US11562051B2 (en) | Varying computing device behavior for different authenticators | |
CN107193598B (en) | Application starting method, mobile terminal and computer readable storage medium | |
KR20130133629A (en) | Method and apparatus for executing voice command in electronic device | |
CN107729781B (en) | Method for preventing loss of mobile terminal, mobile terminal and computer readable storage medium | |
WO2018082189A1 (en) | Isolation method and device for payment application, and terminal | |
CN106571134B (en) | Anti-stealing recording method and terminal | |
US11455411B2 (en) | Controlling content visibility on a computing device based on computing device location | |
CN109219003B (en) | Information encryption method and device, storage medium and electronic equipment | |
CN111079438A (en) | Identity authentication method and device, electronic equipment and storage medium | |
US9672337B2 (en) | Dynamic authentication | |
EP4254225A1 (en) | Terminal information display control method, apparatus, terminal, and storage medium | |
US9721454B2 (en) | Method for protecting terminal devices and the terminal device thereof | |
CN107707721B (en) | Recording method and device of mobile terminal, storage medium and mobile terminal | |
CN109257731A (en) | Emergency call realization method, electronic device and computer readable storage medium | |
CN107888480A (en) | Prompting message processing method, device, storage medium and mobile terminal | |
CN107835312A (en) | Indicating mode switching method, device, computer installation and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210121 Address after: No. 1702-1703, 17 / F (natural floor, 15 / F), Desai technology building, 9789 Shennan Avenue, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Shenzhen Microphone Holdings Co.,Ltd. Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong. Applicant before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |