CN106571134B - Anti-stealing recording method and terminal - Google Patents

Anti-stealing recording method and terminal Download PDF

Info

Publication number
CN106571134B
CN106571134B CN201610882036.6A CN201610882036A CN106571134B CN 106571134 B CN106571134 B CN 106571134B CN 201610882036 A CN201610882036 A CN 201610882036A CN 106571134 B CN106571134 B CN 106571134B
Authority
CN
China
Prior art keywords
user
recording
preset
starting
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610882036.6A
Other languages
Chinese (zh)
Other versions
CN106571134A (en
Inventor
冯希彬
韩保君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Original Assignee
Shenzhen Microphone Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Microphone Holdings Co Ltd filed Critical Shenzhen Microphone Holdings Co Ltd
Priority to CN201610882036.6A priority Critical patent/CN106571134B/en
Publication of CN106571134A publication Critical patent/CN106571134A/en
Application granted granted Critical
Publication of CN106571134B publication Critical patent/CN106571134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/02Feature extraction for speech recognition; Selection of recognition unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The embodiment of the invention discloses an anti-record-stealing method and a terminal, wherein the anti-record-stealing method comprises the following steps: acquiring a trigger condition for starting an anti-skimming function set by a user; if the call request information is detected, responding to the call request information and carrying out voice recognition on call contents so as to start an anti-recording function when the call contents meet the trigger condition to prevent a user from being recorded illegally; or if the current position information of the user is detected to meet the trigger condition, starting an anti-recording stealing function to prevent the user from being recorded in a stealing mode. According to the embodiment of the invention, the terminal enables the user to set the condition for triggering the anti-recording-stealing function, so that the anti-recording-stealing function is started when the triggering condition is met, and the privacy of the user is protected.

Description

Anti-stealing recording method and terminal
Technical Field
The invention relates to the technical field of electronics, in particular to an anti-surreptitious recording method and a terminal.
Background
Nowadays, the popularity of the intelligent terminal is higher and higher, and people almost can not leave the intelligent terminal in life or work. However, the popularization of the smart terminal also causes troubles in information security and the like for the user. For example, when a user uses an intelligent terminal to perform a voice call, the call content is easily recorded by surrounding recording devices. For another example, in some social occasions, the user records the conversation content by other users by using the intelligent terminal.
Although it is possible to prevent a hacker from monitoring and other actions by software such as a security guard in the prior art, it is not possible to prevent the recording devices around the user from recording the call content or conversation content of the user.
Disclosure of Invention
The embodiment of the invention provides an anti-skimming method and a terminal, which can be used for a user to formulate a condition for triggering an anti-skimming function, so that the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
In a first aspect, an embodiment of the present invention provides an anti-surreptitious recording method, where the anti-surreptitious recording method includes:
acquiring a trigger condition for starting an anti-skimming function set by a user;
if the call request information is detected, responding to the call request information and carrying out voice recognition on call contents so as to start an anti-recording function when the call contents meet the trigger condition to prevent a user from being recorded illegally; alternatively, the first and second electrodes may be,
and if the current position information of the user is detected to meet the trigger condition, starting an anti-recording stealing function to prevent the user from being recorded illegally.
In another aspect, an embodiment of the present invention provides a terminal, where the terminal includes:
the acquisition unit is used for acquiring a trigger condition for starting the anti-recording function set by a user;
the first starting unit is used for responding to the call request information and carrying out voice recognition on the call content if the call request information is detected, so that when the call content meets the trigger condition, a record stealing prevention function is started to prevent a user from being recorded in a stolen way; alternatively, the first and second electrodes may be,
and the second starting unit is used for starting the record stealing prevention function if the current position information of the user is detected to meet the trigger condition so as to prevent the user from being recorded in a stealing manner.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an anti-skimming method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of an anti-skimming method according to another embodiment of the present invention;
fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a terminal according to another embodiment of the present invention;
fig. 5 is a schematic block diagram of a terminal according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the terminals described in embodiments of the invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
Referring to fig. 1, fig. 1 is a schematic flow chart of an anti-skimming method according to an embodiment of the present invention. In this embodiment, an execution main body of the anti-surreptitious recording method is a terminal, and the terminal may be a mobile terminal such as a smart phone or a tablet computer, or may be an intelligent wearable device such as a bracelet and a smart watch. As shown in fig. 1, the anti-skimming method includes the following steps:
s110: and acquiring a trigger condition for starting the anti-recording function set by a user.
In step S110, when the trigger condition needs to be set, the user presets the terminal, or sends a start instruction for setting the start of the anti-skimming function, so as to set the trigger condition for starting the anti-skimming function.
Wherein the trigger condition may include: the method comprises the steps of presetting keywords, presetting key sentence patterns, contact numbers, voice call requests sent by target contacts, presetting common places or presetting common places.
The preset common locations may include: home, first longitude, first latitude, or work unit. The preset non-use points may include: a second longitude, a second latitude, a bank, a hotel, or a road name. Wherein the bank further comprises a self-service terminal of the bank, and the road name is related to at least one of the second longitude, the second latitude, the bank and the hotel. For example, there is a bank self-service terminal on the "east ring road", and the trigger condition set by the user to start the anti-theft recording function may include the bank self-service terminal or the "east ring road" where the bank self-service terminal is located.
It can be understood that when the preset unusual place included in the trigger condition for starting the anti-skimming function set by the user is the second longitude, the second latitude, the bank, the hotel or the road name, the effective range threshold may be set at the same time, that is, the trigger condition is satisfied within the effective range threshold of the preset unusual place.
S120: and if the call request information is detected, responding to the call request information and carrying out voice recognition on the call content, so that when the call content meets the trigger condition, an anti-recording function is started to prevent the user from being recorded by the record.
In step S120, the call request information includes: voice call request information, video call request information, voice segment request information, video segment request information, incoming call request information, or outgoing call request information.
It should be noted that the voice call request information is a request sent by a user through a terminal to perform a real-time voice call, the video call request information is a request sent by the user through the terminal to perform a real-time video call, the voice segment request information is request information sent by the user through the terminal to record a voice segment with a certain duration, and the video segment request information is request information sent by the user through the terminal to record a video segment with a certain duration.
It is understood that the call request information may be incoming call request information or outgoing call request information sent by the user through the terminal, and may also be call request information sent through an Application program (APP) in the terminal. The application program can be an application program with social function, such as QQ, WeChat, microblog, blog, QQ space or Michat.
Step S130 is also described in this embodiment as a parallel solution to step S120. It should be noted that there is no precedence relationship between step S120 and step S130, and in practical applications, after step S120 is executed, step S130 is not executed again until the anti-skimming function is turned off. Or when step S130 is executed, step S120 is not executed again until the anti-skimming function is turned off.
S130: and if the current position information of the user is detected to meet the trigger condition, starting an anti-recording stealing function to prevent the user from being recorded illegally.
In step S130, the current location information is that the terminal of the user can accurately obtain the current location of the user through an internal Positioning module, where the Positioning module may be a Global Positioning System (GPS) or a beidou Positioning System.
It should be noted that the current location information may include: longitude, latitude, or landmark name. The landmark name may be composed of "country (region)", "province (city in direct prefecture)", "district", "county (town)", and "village", or may be directly a road name.
It is understood that the current location information includes a preset common location and a preset non-common location. As an embodiment of the present invention, the triggering condition is a preset common place, and the step S130 specifically includes: judging whether the current position information is matched with a preset common place or not; and if the current position information is not matched with the preset common place, starting an anti-theft recording function.
The starting anti-theft recording function specifically comprises the following steps: high-frequency interference signals are radiated to the surroundings to form recording interference for recording equipment in the area of the user.
That is, the high-frequency interference signal is radiated to the surroundings from the terminal of the user, specifically, the high-frequency interference signal may be radiated to the surroundings through the antenna of the terminal.
The high-frequency interference signal is a radio-frequency interference signal containing white noise, the continuous white noise is superposed on the radio-frequency interference signal, and the radio-frequency interference signal is covered by the continuous white noise or is mixed into other sound sources, so that the anti-skimming function is realized.
It should be noted that, since the power of the frequency components in a segment of sound is uniform in the whole audible range (0-20 KHZ), the sound is very noisy due to the sensitivity of the human ear to high frequencies, and the noise is so-called white noise.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
Referring to fig. 2, fig. 2 is a schematic flow chart of an anti-skimming method according to another embodiment of the present invention. In this embodiment, an execution main body of the anti-surreptitious recording method is a terminal, and the terminal may be a mobile terminal such as a smart phone or a tablet computer, or may be an intelligent wearable device such as a bracelet and a smart watch. As shown in fig. 2, the anti-skimming method includes the following steps:
s210: and acquiring a trigger condition for starting the anti-recording function set by a user.
In step S210, when the trigger condition needs to be set, the user presets the terminal, or sends a start instruction for setting the start of the anti-skimming function, so as to set the trigger condition for starting the anti-skimming function.
Wherein the trigger condition may include: the method comprises the steps of presetting keywords, presetting key sentence patterns, contact numbers, voice call requests sent by target contacts, presetting common places or presetting common places.
The preset common locations may include: home, first longitude, first latitude, or work unit. The preset non-use points may include: a second longitude, a second latitude, a bank, a hotel, or a road name. Wherein the bank further comprises a self-service terminal of the bank, and the road name is related to at least one of the second longitude, the second latitude, the bank and the hotel. For example, there is a bank self-service terminal on the "east ring road", and the trigger condition set by the user to start the anti-theft recording function may include the bank self-service terminal or the "east ring road" where the bank self-service terminal is located.
It can be understood that when the preset unusual place included in the trigger condition for starting the anti-skimming function set by the user is the second longitude, the second latitude, the bank, the hotel or the road name, the effective range threshold may be set at the same time, that is, the trigger condition is satisfied within the effective range threshold of the preset unusual place.
S220: and if the call request information is detected, responding to the call request information, and judging whether the call content contains preset voice keywords or preset voice key sentence patterns or not through voice recognition.
In step S220, the call request information includes: voice call request information, video call request information, voice segment request information, video segment request information, incoming call request information, or outgoing call request information.
It should be noted that the voice call request information is a request sent by a user through a terminal to perform a real-time voice call, the video call request information is a request sent by the user through the terminal to perform a real-time video call, the voice segment request information is request information sent by the user through the terminal to record a voice segment with a certain duration, and the video segment request information is request information sent by the user through the terminal to record a video segment with a certain duration.
The speech recognition of the call content may be recognition of a speech keyword or a speech key sentence pattern. The voice keywords can be options of a plurality of tone words, single words or words preset by the terminal, and can also be keywords edited by a user in a user-defined manner. The speech key sentence pattern can be a phrase formed by a plurality of single characters or words preset by the terminal, and can also be a phrase customized and edited by the user.
S230: and if the conversation content contains preset voice keywords or accords with a preset voice key sentence pattern, starting an anti-stealing recording function.
In step S230, the preset speech keyword may include: "password", "secret", "not to say", or "not to say", etc. The preset phonetic key sentence pattern may include: "target person … action …", "target person … time …", "time … action …", "target person … action … time …", or "target person … time … action", etc. For example, "i want to go to li home today in the afternoon".
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
By setting the voice keywords or the voice key sentence patterns, the user can realize the anti-stealing recording function by speaking the voice keywords or the voice key sentence patterns in the process of carrying out voice communication by using the terminal.
Please refer to fig. 3, and fig. 3 is a schematic block diagram of a terminal according to an embodiment of the present invention, in which each unit included in the terminal 100 in the embodiment is used to execute each step in the embodiment corresponding to fig. 1, and specifically refer to fig. 1 and the related description in the embodiment corresponding to fig. 1, which are not repeated herein. Specifically, the method comprises the following steps:
the terminal 100 includes: an acquisition unit 10, a first activation unit 20 and/or a second activation unit 30. As an embodiment of the present invention, the second starting unit 30 may include a third judging unit 31 and a third executing unit 32. Specifically, the method comprises the following steps:
the obtaining unit 10 is configured to obtain a trigger condition for starting the anti-skimming function set by a user.
For example, the obtaining unit 10 is configured to obtain a trigger condition for starting an anti-skimming function set by a user.
The acquisition unit 10 sends the trigger condition to the first activation unit 20 or the second activation unit 30.
The first starting unit 20 is configured to, if the call request information is detected, respond to the call request information and perform voice recognition on the call content, so as to start the record stealing prevention function when the call content meets the trigger condition, so as to prevent the user from being recorded by the record stealing prevention function.
For example, the first starting unit 20 receives the trigger condition sent by the obtaining unit 10, and if the call request information is detected, responds to the call request information and performs voice recognition on the call content, so as to start the anti-skimming function when the call content meets the trigger condition, so as to prevent the user from being skimming.
And the second starting unit 30 is configured to start the record stealing prevention function if it is detected that the current location information of the user meets the trigger condition, so as to prevent the user from being recorded illegally.
For example, the second starting unit 30 receives the trigger condition sent by the obtaining unit 10, and starts the record stealing prevention function to prevent the user from being recorded secretly if it is detected that the current location information of the user meets the trigger condition.
Further, the second starting unit 30 includes a third judging unit 31 and a third executing unit 32.
A third determining unit 31, configured to determine whether the current location information matches a preset common location.
And a third executing unit 32, configured to start an anti-skimming function if the current location information does not match the preset common location.
For example, the third determining unit 31 is configured to determine whether the current location information matches a preset common location; and a third executing unit 32, configured to start an anti-skimming function if the current location information does not match the preset common location.
Further, the first starting unit 20 is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
For example, the first enabling unit 20 radiates a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
Further, the second starting unit 30 is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
For example, the second starting unit 30 radiates a high-frequency interference signal to the surroundings to form recording interference to the recording device in the area where the user is located.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
Referring to fig. 4, fig. 4 is a schematic block diagram of a terminal according to another embodiment of the present invention, in which each unit included in the terminal 200 in this embodiment is used to execute each step in the embodiment corresponding to fig. 2, and specifically, refer to fig. 2 and the related description in the embodiment corresponding to fig. 2, which are not repeated herein. Specifically, the method comprises the following steps:
the terminal 200 includes: an acquisition unit 110 and a first activation unit 120. The first starting unit 120 may include a first judging unit 121 and a first executing unit 122, or the first starting unit 120 may include a second judging unit 123 and a second executing unit 124. Specifically, the method comprises the following steps:
the obtaining unit 110 is configured to obtain a trigger condition for starting the anti-skimming function set by a user.
For example, the obtaining unit 110 is configured to obtain a trigger condition for starting an anti-skimming function set by a user.
The acquisition unit 110 sends the trigger condition to the first activation unit 120 or the second activation unit 130.
The first starting unit 120 is configured to, if the call request information is detected, respond to the call request information and perform voice recognition on the call content, so as to start the record stealing prevention function when the call content meets the trigger condition, so as to prevent the user from being recorded by the record stealing prevention function.
For example, the first starting unit 120 receives the trigger condition sent by the obtaining unit 110, responds to the call request information if the call request information is detected, and determines whether the call content includes a preset voice keyword or a preset voice key sentence pattern through voice recognition.
Further, the first starting unit 120 includes a first judging unit 121 and a first executing unit 122.
The first determining unit 121 is configured to determine whether the call content includes a preset voice keyword through voice recognition.
The first executing unit 122 is configured to start an anti-skimming function if the call content includes a preset voice keyword.
For example, the first determining unit 121 is configured to determine whether the call content includes a preset voice keyword through voice recognition. The first executing unit 122 is configured to start an anti-skimming function if the call content includes a preset voice keyword.
Further, the first starting unit 120 includes a second judging unit 123 and a second executing unit 124.
The second judging unit 123 is configured to judge whether the call content conforms to a preset key speech sentence pattern through speech recognition.
The second executing unit 124 is configured to start the anti-skimming function if the call content matches a preset key speech sentence pattern.
For example, the second determining unit 123 is configured to determine whether the call content conforms to a preset key speech sentence pattern through speech recognition; the second executing unit 124 is configured to start the anti-skimming function if the call content matches a preset key speech sentence pattern.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be formulated by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
By setting the voice keywords or the voice key sentence patterns, the user can realize the anti-stealing recording function by speaking the voice keywords or the voice key sentence patterns in the process of carrying out voice communication by using the terminal.
Referring to fig. 5, fig. 5 is a schematic block diagram of a terminal according to another embodiment of the present invention. The terminal 400 in the present embodiment as shown in the figure may include: one or more processors 401; one or more input devices 402, one or more output devices 403, and memory 404. The processor 401, the input device 402, the output device 403 and the memory 404 are all in communication with each other via a communication bus 405.
The memory 404 is used to store program instructions.
The processor 401 is configured to obtain a trigger condition for starting the anti-skimming function, which is set by the user:
the processor 401 is configured to, if the call request information is detected, respond to the call request information and perform voice recognition on the call content, so as to start an anti-skimming function when the call content meets the trigger condition, so as to prevent a user from being skimming.
The processor 401 is further configured to start an anti-skimming function if it is detected that the current location information of the user meets the trigger condition, so as to prevent the user from being skimming.
Wherein the trigger condition may include: the method comprises the steps of presetting keywords, presetting key sentence patterns, contact numbers, voice call requests sent by target contacts, presetting common places or presetting common places.
Further, the processor 401 is configured to determine whether the call content includes a preset voice keyword through voice recognition; and if the conversation content contains preset voice keywords, starting an anti-recording function.
Further, the processor 401 is specifically configured to determine whether the call content conforms to a preset key speech sentence pattern through speech recognition; and if the conversation content conforms to a preset key speech sentence pattern, starting an anti-stealing recording function.
Further, the processor 401 is specifically configured to determine whether the current location information matches a preset common location; and if the current position information is not matched with the preset common place, starting an anti-theft recording function.
Further, the processor 401 is specifically configured to radiate a high-frequency interference signal to the surroundings to form recording interference for the recording device in the area where the user is located.
According to the scheme, the triggering condition for starting the anti-skimming function set by the user is obtained, when the call request information is detected, the call request information is responded, the voice recognition is carried out on the call content, the call content meets the triggering condition, the anti-skimming function is started, or when the current position information of the user is detected to meet the triggering condition, the anti-skimming function is started, the condition for triggering the anti-skimming function can be set by the user, the anti-skimming function is started when the triggering condition is met, and the privacy of the user is protected.
It should be understood that, in the embodiments of the present invention, the Processor 401 may be a Central Processing Unit (CPU), and the Processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 402 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a camera, a microphone, etc., and the output device 403 may include a display (LCD, etc.), a speaker, etc.
The memory 404 may include a read-only memory and a random access memory, and provides instructions and data to the processor 401. A portion of the memory 404 may also include non-volatile random access memory. For example, the memory 404 may also store device type information.
In a specific implementation, the processor 401, the input device 402, and the output device 403 described in this embodiment of the present invention may execute the implementation manners described in the first embodiment and the second embodiment of the backup method for communication records provided in this embodiment of the present invention, and may also execute the implementation manner of the terminal described in this embodiment of the present invention, which is not described herein again.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the terminal and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (6)

1. An anti-skimming method, comprising:
acquiring a trigger condition for starting an anti-skimming function, wherein the trigger condition comprises preset keywords, a preset key sentence pattern, a contact number, a voice call request sent by a target contact, a preset common place or a preset non-common place;
if the call request information is detected, responding to the call request information and carrying out voice recognition on call contents so as to start an anti-recording function when the call contents meet the trigger condition to prevent a user from being recorded illegally; alternatively, the first and second electrodes may be,
judging whether the current position information is matched with a preset common place or not; if the current position information is not matched with the preset common place, starting an anti-theft recording function;
wherein, the starting anti-skimming function includes: high-frequency interference signals are radiated to the surroundings to form recording interference for recording equipment in the area of the user.
2. The method for preventing the surreptitious recording according to claim 1, wherein the performing voice recognition on the call content to start an surreptitious recording prevention function to prevent the surreptitious recording of the user when the call content meets the trigger condition comprises:
judging whether the conversation content contains preset voice keywords or not through voice recognition;
and if the conversation content contains preset voice keywords, starting an anti-recording function.
3. The method for preventing the surreptitious recording according to claim 1, wherein the performing voice recognition on the call content to start an surreptitious recording prevention function to prevent the surreptitious recording of the user when the call content meets the trigger condition comprises:
judging whether the conversation content conforms to a preset voice key sentence pattern or not through voice recognition;
and if the conversation content conforms to a preset key speech sentence pattern, starting an anti-stealing recording function.
4. A terminal, characterized in that the terminal comprises:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a trigger condition for starting an anti-theft recording function, which is set by a user, wherein the trigger condition comprises a preset keyword, a preset key sentence pattern, a contact number, a voice call request sent by a target contact, a preset common place or a preset non-common place;
the first starting unit is used for responding to the call request information and carrying out voice recognition on the call content if the call request information is detected, so that when the call content meets the trigger condition, a record stealing prevention function is started to prevent a user from being recorded in a stolen way; alternatively, the first and second electrodes may be,
the second starting unit is used for starting the anti-recording function if the current position information of the user meets the trigger condition so as to prevent the user from being recorded in an anti-recording manner;
the first starting unit is specifically used for radiating a high-frequency interference signal to the periphery so as to form recording interference on recording equipment in an area where a user is located;
the second starting unit is specifically used for radiating a high-frequency interference signal to the periphery so as to form recording interference on recording equipment in the area where the user is located;
the second starting unit includes:
the third judging unit is used for judging whether the current position information is matched with a preset common place or not;
and the third execution unit is used for starting the anti-skimming function if the current position information is not matched with the preset common place.
5. The terminal of claim 4, wherein the first enabling unit comprises:
the first judging unit is used for judging whether the conversation content contains preset voice keywords or not through voice recognition;
and the first execution unit is used for starting the anti-skimming function if the call content contains preset voice keywords.
6. The terminal of claim 4, wherein the first enabling unit comprises:
the second judging unit is used for judging whether the conversation content conforms to a preset voice key sentence pattern or not through voice recognition;
and the second execution unit is used for starting the anti-stealing recording function if the conversation content conforms to a preset voice key sentence pattern.
CN201610882036.6A 2016-10-08 2016-10-08 Anti-stealing recording method and terminal Active CN106571134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610882036.6A CN106571134B (en) 2016-10-08 2016-10-08 Anti-stealing recording method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610882036.6A CN106571134B (en) 2016-10-08 2016-10-08 Anti-stealing recording method and terminal

Publications (2)

Publication Number Publication Date
CN106571134A CN106571134A (en) 2017-04-19
CN106571134B true CN106571134B (en) 2021-02-12

Family

ID=58531661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610882036.6A Active CN106571134B (en) 2016-10-08 2016-10-08 Anti-stealing recording method and terminal

Country Status (1)

Country Link
CN (1) CN106571134B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115865406A (en) * 2020-05-15 2023-03-28 华为技术有限公司 Authority negotiation method and device in communication process and electronic equipment
CN116567150B (en) * 2023-07-11 2023-09-08 山东凌晓通信科技有限公司 Method and system for preventing eavesdropping and recording in conference room

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968080A (en) * 2006-09-06 2007-05-23 四川长虹电器股份有限公司 Method for privacy protection in digital media application
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN104144601A (en) * 2014-07-22 2014-11-12 北京利云技术开发公司 Device for preventing hacking through mobile phone
CN104601784A (en) * 2015-01-26 2015-05-06 电子科技大学 Anti-eavesdropping device
CN104615937A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal
WO2015131559A1 (en) * 2014-09-17 2015-09-11 中兴通讯股份有限公司 Terminal, method and device for controlling functions thereof, and communication system
CN105047191A (en) * 2015-03-03 2015-11-11 西北工业大学 Ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device, and anti-eavesdrop and anti-wiretapping method using the device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045712B (en) * 2011-01-04 2013-03-20 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN102186166A (en) * 2011-03-11 2011-09-14 深圳市易联盛世科技有限公司 Method for preventing environmental monitoring and environmental sound-recording based on Bluetooth technology
CN103581422A (en) * 2012-08-09 2014-02-12 富泰华工业(深圳)有限公司 Communication terminal and anti-eavesdrop communication method thereof
JP5899324B2 (en) * 2012-09-20 2016-04-06 ▲華▼▲為▼終端有限公司Huawei Device Co., Ltd. Method and terminal device for detecting eavesdropping activity
CN103929551B (en) * 2013-01-11 2017-10-31 上海掌门科技有限公司 Householder method and system based on call
CN204119249U (en) * 2014-09-22 2015-01-21 石家庄于栋电子科技有限公司 Ultrasonic wave recording shielding device
CN105306162B (en) * 2015-10-29 2018-04-06 天津光电安辰信息技术股份有限公司 The recording screening arrangement and its implementation of a kind of mixing
CN105827357B (en) * 2016-05-24 2018-07-27 广东电网有限责任公司信息中心 A kind of recording shielding device and screen method of recording

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968080A (en) * 2006-09-06 2007-05-23 四川长虹电器股份有限公司 Method for privacy protection in digital media application
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN104144601A (en) * 2014-07-22 2014-11-12 北京利云技术开发公司 Device for preventing hacking through mobile phone
WO2015131559A1 (en) * 2014-09-17 2015-09-11 中兴通讯股份有限公司 Terminal, method and device for controlling functions thereof, and communication system
CN104601784A (en) * 2015-01-26 2015-05-06 电子科技大学 Anti-eavesdropping device
CN104615937A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal
CN105047191A (en) * 2015-03-03 2015-11-11 西北工业大学 Ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device, and anti-eavesdrop and anti-wiretapping method using the device

Also Published As

Publication number Publication date
CN106571134A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
US10623963B2 (en) Proactive security for mobile devices
JP6246854B2 (en) Smart audio playback when connected to an audio output system
US11706584B2 (en) Location service management
CN107690620B (en) Application suggestion based on detected trigger events
EP3493056B1 (en) Information displaying method for terminal device, and terminal device
US9076020B2 (en) Protected mode for mobile communication and other devices
CN104700010B (en) Personal information protection method and protection device
CN107291962B (en) Searching method, searching device, storage medium and electronic equipment
CN107193598B (en) Application starting method, mobile terminal and computer readable storage medium
US11562051B2 (en) Varying computing device behavior for different authenticators
KR20150062686A (en) Spam filtering method of electronic apparatus and electronic appparatus thereof
CN107729781B (en) Method for preventing loss of mobile terminal, mobile terminal and computer readable storage medium
WO2018082189A1 (en) Isolation method and device for payment application, and terminal
US9565289B2 (en) Mobile terminal and method of controlling the same
US11455411B2 (en) Controlling content visibility on a computing device based on computing device location
CN111656347B (en) Project display method and terminal
US20240118851A1 (en) Method and device of controlling display of terminal information, terminal, and storage medium
CN106571134B (en) Anti-stealing recording method and terminal
CN111079438A (en) Identity authentication method and device, electronic equipment and storage medium
US9721454B2 (en) Method for protecting terminal devices and the terminal device thereof
CN107872573B (en) Alarm clock setting method and terminal
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN107835312A (en) Indicating mode switching method, device, computer installation and computer-readable recording medium
CN107888480A (en) Prompting message processing method, device, storage medium and mobile terminal
US20130042204A1 (en) Automatic data entry to an automated response system (ars)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210121

Address after: No. 1702-1703, 17 / F (natural floor, 15 / F), Desai technology building, 9789 Shennan Avenue, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Microphone Holdings Co.,Ltd.

Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong.

Applicant before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant