CN110544483A - Method, device, terminal and storage medium for preventing user privacy from being revealed - Google Patents
Method, device, terminal and storage medium for preventing user privacy from being revealed Download PDFInfo
- Publication number
- CN110544483A CN110544483A CN201910844554.2A CN201910844554A CN110544483A CN 110544483 A CN110544483 A CN 110544483A CN 201910844554 A CN201910844554 A CN 201910844554A CN 110544483 A CN110544483 A CN 110544483A
- Authority
- CN
- China
- Prior art keywords
- equipment
- voice
- interference
- state
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000003993 interaction Effects 0.000 claims abstract description 42
- 230000002452 interceptive effect Effects 0.000 claims abstract description 17
- 238000004891 communication Methods 0.000 claims abstract description 9
- 230000001010 compromised effect Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
- G10L21/0216—Noise filtering characterised by the method used for estimating noise
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
- G10L21/0264—Noise filtering characterised by the type of parameter measurement, e.g. correlation techniques, zero crossing techniques or predictive techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
- G10L21/0216—Noise filtering characterised by the method used for estimating noise
- G10L2021/02161—Number of inputs available containing the signal or the noise to be suppressed
- G10L2021/02166—Microphone arrays; Beamforming
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computational Linguistics (AREA)
- Quality & Reliability (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
Abstract
The application provides a method, a device, a terminal and a storage medium for preventing user privacy from being revealed, which comprise the following steps: judging whether the voice equipment is in a human-computer interaction state or not; when the voice equipment is not in a human-computer interaction state, controlling interference equipment in communication connection with the voice equipment to be started, wherein the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires user voice. According to the method and the device, when the voice equipment is not in a man-machine interaction state, the interference equipment is used for generating noise, the signal-to-noise ratio of the voice recognition microphone array is greatly reduced in a noise shielding mode, and the purpose of protecting the privacy of a user is achieved by interfering the ability of the voice equipment for acquiring external voice information. The application provides the user with the right to choose between privacy and convenience by providing the jamming device with a jamming switch or the voice device with a microphone switch.
Description
Technical Field
The application relates to the technical field of internet of things, in particular to a method, a device, a terminal and a storage medium for preventing user privacy from being revealed.
background
with the rapid development of technology, more and more consumers are beginning to use intelligent speech recognition-type devices (e.g., intelligent voice speakers). The intelligent voice recognition equipment really provides convenient functional experience for the user, namely the user can control or operate the intelligent voice recognition equipment through voice, the limitation of the geographic position between the user and the intelligent voice recognition equipment is removed in a certain range, meanwhile, the hands of the user are also liberated, and the user can have more idle time to process other things.
However, the risk of divulging the privacy of the user exists in the intelligent speech recognition device, and therefore, a method for preventing the divulging of the privacy of the user is needed to avoid the irreparable loss of the user.
Disclosure of Invention
The application provides a method, a device, a terminal and a storage medium for preventing the privacy of a user from being revealed, so as to solve the problems.
a first aspect of the present application provides a method for preventing disclosure of user privacy, which specifically includes:
a method of preventing disclosure of user privacy, comprising:
judging whether the voice equipment is in a human-computer interaction state or not;
When the voice equipment is not in a human-computer interaction state, controlling interference equipment in communication connection with the voice equipment to be started, wherein the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires user voice.
further, when the voice device is not in a human-computer interaction state, controlling an interfering device in communication connection with the voice device to be turned on, specifically including:
When the voice equipment is not in a human-computer interaction state, identifying the state of an interference switch of the interference equipment;
and when the state of an interference switch of the interference equipment is in an on state, controlling the interference equipment to be on.
further, the method further comprises:
And when the state of an interference switch of the interference equipment is in a closed state, controlling the interference equipment to be closed.
further, the method further comprises:
And when the voice equipment is in a human-computer interaction state, controlling the interference equipment to be closed.
Further, the noise generated by the interference device is periodically changed.
further, the frequency of the noise generated by the interference equipment is 500 Hz-5000 Hz.
The second aspect of the present application provides an apparatus for preventing disclosure of user privacy, which specifically includes:
an apparatus for preventing disclosure of user privacy, comprising:
The judging module is used for judging whether the voice equipment is in a human-computer interaction state or not;
And the interference equipment opening module is used for controlling the interference equipment in communication connection with the voice equipment to be opened when the voice equipment is not in a human-computer interaction state, and the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires the voice of a user.
further, the interfering device starting module specifically includes:
The judging submodule is used for identifying the state of an interference switch of the interference equipment when the voice equipment is not in a man-machine interaction state;
and the interference equipment starting submodule is used for controlling the starting of the interference equipment when the state of an interference switch of the interference equipment is in a starting state.
Further, the apparatus further comprises:
and the interference equipment closing submodule is used for controlling the interference equipment to be closed when the state of an interference switch of the interference equipment is in a closed state.
further, the apparatus further comprises:
and the interference equipment closing module is used for controlling the interference equipment to be closed when the voice equipment is in a human-computer interaction state.
a third aspect of the present application provides a terminal, which specifically includes:
A terminal, comprising:
a processor;
A memory for storing the processor-executable instructions;
wherein the processor is configured to perform operations to implement a method of preventing disclosure of user privacy.
a fourth aspect of the present application provides a non-transitory computer-readable storage medium, which includes:
A non-transitory computer-readable storage medium having instructions therein, which, when executed by a processor of a terminal, enable the terminal to perform operations performed to implement a method of preventing disclosure of user privacy.
compared with the prior art, the method has the following advantages:
according to the method and the device, when the voice equipment is not in a man-machine interaction state, the interference equipment is used for generating noise, the signal-to-noise ratio of the voice recognition microphone array is greatly reduced in a noise shielding mode, and the purpose of protecting the privacy of a user is achieved by interfering the ability of the voice equipment for acquiring external voice information.
the application provides the user with the right to choose between privacy and convenience by providing the jamming device with a jamming switch or the voice device with a microphone switch.
it is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
drawings
in order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart of a method for preventing privacy of a user from being revealed according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for preventing privacy of a user from being compromised according to another embodiment of the present application;
FIG. 3 is a block diagram of an apparatus for preventing privacy disclosure of a user according to another embodiment of the present application;
fig. 4 is a schematic structural diagram of a terminal according to another embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
along with the rapid development of science and technology, more and more consumers begin to be used to intelligent speech recognition class equipment, for example intelligent voice sound, through speech control intelligent voice sound, can realize the broadcast music, set up the alarm clock, listen to functions such as news. The intelligent voice recognition equipment can be controlled only by sound, and the control mechanism of the intelligent voice recognition equipment is that voice of a user is continuously acquired for recognition and judgment, so that convenient functional experience is provided for consumers. Just because the voice of the user needs to be acquired continuously, the voice data of the user needs to be extracted continuously to realize the functions, and therefore the great hidden danger that the privacy of the user is revealed is caused. This corresponds to a constant monitoring of the user, which makes the risk of privacy disclosure of the user extremely high, and may cause irreparable damage to the user.
In order to solve the above problem, the present application provides a method for preventing disclosure of user privacy, which specifically includes:
A method of preventing disclosure of user privacy, as shown in fig. 1, comprising:
Step S101, judging whether the voice equipment is in a human-computer interaction state;
step S102, when the voice equipment is not in a human-computer interaction state, controlling an interference device in communication connection with the voice equipment to be started, wherein the interference device is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment collects user voice.
The voice device in the related art generally implements the wake-up by a voice wake-up word. The voice device in the application can be a terminal such as a smart phone, a smart watch, a smart bracelet, a tablet computer and a smart television.
When the user does not use the audio device, the audio device needs to continuously monitor the external sound in order to timely respond to the wakeup word. In the process of continuous monitoring, the voice device uploads the monitored voice data to the cloud. The background of the speech device, although not intended to collect the user's speech, clearly forms a way to reveal the user's privacy.
whether the voice equipment is in the man-machine interaction state is judged firstly, when the voice equipment is not in the man-machine interaction state, the fact that voice sent by a user is not used for controlling the voice equipment but belongs to content which does not need the voice equipment to monitor is meant, at the moment, the interference equipment connected with the voice equipment is controlled to work, the interference equipment generates noise, the signal-to-noise ratio of the voice equipment when a microphone array in the voice equipment collects voice of a user can be reduced, the voice equipment can be prevented from monitoring the voice of the user when the voice equipment is not in the man-machine interaction state, and therefore privacy of the user is protected.
For example, for a certain smart sound, the wake-up word is: the same school of the small and beautiful schools.
When the user does not control this intelligent stereo set, the intelligent stereo set need monitor external pronunciation constantly in order to catch and awaken word-little american classmate, in order to avoid this intelligent stereo set to collect user's pronunciation (privacy promptly), when the intelligent stereo set is not in man-machine interaction state, through opening interfering device, interfering device produces the noise, and user's privacy just can't be collected to the intelligent stereo set to protection user's privacy.
And S103, controlling the interference equipment to be closed when the voice equipment is in a man-machine interaction state.
when the voice device is in the human-computer interaction state, the fact that the current voice of the user is sent out for controlling the voice device is meant, the possibility of privacy existence of the voice device is low, therefore, the voice device can normally acquire the voice of the user, at the moment, the interference device does not need to interfere monitoring, and the interference device can be turned off.
for example, when a user needs to use the intelligent sound box, the user can speak a little schoolmate to realize voice control on the intelligent sound box. When the user speaks a little scholar, the intelligent sound box is in a human-computer interaction state, at the moment, the user needs to speak specific control over the intelligent sound box, such as playing songs, and the intelligent sound box needs to receive the instruction to complete the operation of playing the songs. When intelligent stereo set is in the human-computer interaction state, this intelligent stereo set of user's intention for needs control accomplishes a certain task, and when the intelligent stereo set need know what task the user need accomplish, need carry out accurate monitoring to user's pronunciation, if interfering device is still working this moment, will influence user's convenience, consequently when intelligent stereo set is in the human-computer interaction state, need close interfering device, make intelligent pronunciation accurately receive the instruction that the user sent.
In another embodiment proposed by the present application, a method for preventing privacy disclosure is further proposed, as shown in fig. 2, specifically as follows:
Step S201, when the voice equipment is not in a human-computer interaction state, identifying the state of an interference switch of the interference equipment;
Step S202, when the state of the interference switch of the interference equipment is in an on state, the interference equipment is controlled to be on.
Step S203, when the state of the interference switch of the interference equipment is in the closed state, controlling the interference equipment to be closed.
According to the embodiment of the application, the interference switch is arranged for the interference equipment (the interference switch is used for controlling whether the interference equipment can be started or not when the voice equipment is not in a man-machine interaction state, the interference switch can also be a microphone switch of the voice equipment, and the microphone switch is used for controlling whether a microphone of the voice equipment works or not), when a user cares that the voice equipment collects privacy, the interference equipment can work by starting the interference switch, and the privacy is prevented from being revealed. When the user does not mind that the voice equipment collects the privacy of the user, the interference switch can be turned on or off, so that the interference equipment stops working.
After the interference switch is set for the interference device, when the voice device is not in a human-computer interaction state, the state of the interference switch needs to be recognized first. When the state of the interference switch of the interference equipment is in the open state, the user does not want to reveal the privacy, so the interference equipment can be controlled to open, the interference equipment generates noise, the signal-to-noise ratio when the microphone array in the voice equipment collects the voice of the user is reduced, the voice equipment can be prevented from monitoring the voice of the user when the voice equipment is not in the human-computer interaction state, and the privacy of the user is protected. When the state of the interference switch of the interference device is in the off state, it means that the user does not care about privacy disclosure for the voice device, and the interference device may not operate, thereby controlling the interference device to be turned off.
the noise generated by the interference device in the embodiment of the application is periodically changed. The noise generated by the interference equipment needs to cover the human voice frequency, so the frequency range of the noise generated by the interference equipment is 500 Hz-5000 Hz.
According to the method and the device, when the voice equipment is not in a man-machine interaction state, the interference equipment is used for generating noise, the signal-to-noise ratio of the voice recognition microphone array is greatly reduced in a noise shielding mode, and the purpose of protecting the privacy of a user is achieved by interfering the ability of the voice equipment for acquiring external voice information.
the application provides the user with the right to choose between privacy and convenience by providing the jamming device with a jamming switch or the voice device with a microphone switch.
Based on the same concept, the embodiment of the application provides a device for preventing user privacy from being revealed, which specifically comprises the following steps:
An apparatus for preventing privacy of a user from being revealed, as shown in fig. 3, comprises:
the judging module 301 is configured to judge whether the voice device is in a human-computer interaction state;
An interfering device turning-on module 302, configured to control, when the speech device is not in a human-computer interaction state, turning on an interfering device in communication connection with the speech device, where the interfering device is configured to generate noise, so as to reduce a signal-to-noise ratio when a microphone array in the speech device collects user speech.
And an interfering device closing module 303, configured to control the interfering device to close when the voice device is in a human-computer interaction state.
the interfering device starting module 302 specifically includes:
the judging submodule is used for identifying the state of an interference switch of the interference equipment when the voice equipment is not in a man-machine interaction state;
And the interference equipment starting submodule is used for controlling the starting of the interference equipment when the state of an interference switch of the interference equipment is in a starting state.
And the interference equipment closing submodule is used for controlling the interference equipment to be closed when the state of an interference switch of the interference equipment is in a closed state.
The embodiment of the application provides a terminal, as shown in fig. 4, specifically as follows:
A terminal, comprising:
A processor 401;
A memory 402 for storing the processor-executable instructions;
Wherein the processor 401 is configured to perform operations to implement a method of preventing privacy of a user from being compromised.
An embodiment of the present application provides a non-transitory computer-readable storage medium, which includes:
A non-transitory computer-readable storage medium having instructions therein, which, when executed by a processor of a terminal, enable the terminal to perform operations performed to implement a method of preventing disclosure of user privacy.
the embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
as will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
these computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
the method, the device, the terminal and the storage medium for preventing the user privacy from being revealed provided by the application are introduced in detail, a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (12)
1. A method for preventing disclosure of user privacy, comprising:
judging whether the voice equipment is in a human-computer interaction state or not;
when the voice equipment is not in a human-computer interaction state, controlling interference equipment in communication connection with the voice equipment to be started, wherein the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires user voice.
2. the method according to claim 1, wherein when the voice device is not in the human-computer interaction state, controlling an interfering device in communication connection with the voice device to be turned on includes:
When the voice equipment is not in a human-computer interaction state, identifying the state of an interference switch of the interference equipment;
And when the state of an interference switch of the interference equipment is in an on state, controlling the interference equipment to be on.
3. The method of claim 2, further comprising:
And when the state of an interference switch of the interference equipment is in a closed state, controlling the interference equipment to be closed.
4. The method of claim 1, further comprising:
And when the voice equipment is in a human-computer interaction state, controlling the interference equipment to be closed.
5. The method of claim 1, wherein the noise generated by the jamming device is periodically varied.
6. The method of claim 1, wherein the noise generated by the jamming device has a frequency of 500Hz to 5000 Hz.
7. an apparatus for preventing disclosure of user privacy, comprising:
The judging module is used for judging whether the voice equipment is in a human-computer interaction state or not;
and the interference equipment opening module is used for controlling the interference equipment in communication connection with the voice equipment to be opened when the voice equipment is not in a human-computer interaction state, and the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires the voice of a user.
8. the apparatus of claim 7, wherein the interfering device opening module specifically comprises:
The judging submodule is used for identifying the state of an interference switch of the interference equipment when the voice equipment is not in a man-machine interaction state;
and the interference equipment starting submodule is used for controlling the starting of the interference equipment when the state of an interference switch of the interference equipment is in a starting state.
9. the apparatus of claim 8, further comprising:
And the interference equipment closing submodule is used for controlling the interference equipment to be closed when the state of an interference switch of the interference equipment is in a closed state.
10. The apparatus of claim 7, further comprising:
and the interference equipment closing module is used for controlling the interference equipment to be closed when the voice equipment is in a human-computer interaction state.
11. a terminal, comprising:
A processor;
A memory for storing the processor-executable instructions;
Wherein the processor is configured to execute to implement the operations performed by a method of preventing privacy of a user from being compromised as claimed in any of claims 1 to 7.
12. A non-transitory computer-readable storage medium having instructions that, when executed by a processor of a terminal, enable the terminal to perform operations performed to implement a method of preventing disclosure of user privacy as recited in any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910844554.2A CN110544483A (en) | 2019-09-06 | 2019-09-06 | Method, device, terminal and storage medium for preventing user privacy from being revealed |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910844554.2A CN110544483A (en) | 2019-09-06 | 2019-09-06 | Method, device, terminal and storage medium for preventing user privacy from being revealed |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110544483A true CN110544483A (en) | 2019-12-06 |
Family
ID=68712897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910844554.2A Pending CN110544483A (en) | 2019-09-06 | 2019-09-06 | Method, device, terminal and storage medium for preventing user privacy from being revealed |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110544483A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111782174A (en) * | 2020-06-30 | 2020-10-16 | 联想(北京)有限公司 | Electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209296A (en) * | 2016-06-29 | 2016-12-07 | 中北大学 | A kind of band signal EVAC |
CN106910500A (en) * | 2016-12-23 | 2017-06-30 | 北京第九实验室科技有限公司 | The method and apparatus of Voice command is carried out to the equipment with microphone array |
CN108831471A (en) * | 2018-09-03 | 2018-11-16 | 与德科技有限公司 | A kind of voice method for security protection, device and route terminal |
US20190096408A1 (en) * | 2017-09-25 | 2019-03-28 | Cirrus Logic International Semiconductor Ltd. | Talker change detection |
-
2019
- 2019-09-06 CN CN201910844554.2A patent/CN110544483A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209296A (en) * | 2016-06-29 | 2016-12-07 | 中北大学 | A kind of band signal EVAC |
CN106910500A (en) * | 2016-12-23 | 2017-06-30 | 北京第九实验室科技有限公司 | The method and apparatus of Voice command is carried out to the equipment with microphone array |
US20190096408A1 (en) * | 2017-09-25 | 2019-03-28 | Cirrus Logic International Semiconductor Ltd. | Talker change detection |
CN108831471A (en) * | 2018-09-03 | 2018-11-16 | 与德科技有限公司 | A kind of voice method for security protection, device and route terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111782174A (en) * | 2020-06-30 | 2020-10-16 | 联想(北京)有限公司 | Electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9552816B2 (en) | Application focus in speech-based systems | |
KR102118209B1 (en) | Voice trigger for a digital assistant | |
CN108346433A (en) | A kind of audio-frequency processing method, device, equipment and readable storage medium storing program for executing | |
CN104954555A (en) | Volume adjusting method and system | |
US10540994B2 (en) | Personal device for hearing degradation monitoring | |
KR20210013140A (en) | Hotword suppression | |
CN108198569A (en) | A kind of audio-frequency processing method, device, equipment and readable storage medium storing program for executing | |
JP6783339B2 (en) | Methods and devices for processing audio | |
MX2021014721A (en) | Systems and methods for machine learning of voice attributes. | |
CN117912447A (en) | Hotword aware speech synthesis | |
US10536786B1 (en) | Augmented environmental awareness system | |
WO2015107741A1 (en) | Information processing device, information processing method, and program | |
US9715540B2 (en) | User driven audio content navigation | |
US9558758B1 (en) | User feedback on microphone placement | |
CN111640434A (en) | Method and apparatus for controlling voice device | |
CN114600187A (en) | Providing countermeasure protection for speech in an audio signal | |
CN103152481B (en) | Mobile terminal sound timing system and mobile terminal sound reporting method | |
CN110544483A (en) | Method, device, terminal and storage medium for preventing user privacy from being revealed | |
Sciarretta et al. | Smart speakers for inclusion: How can intelligent virtual assistants really assist everybody? | |
CN110232909A (en) | A kind of audio-frequency processing method, device, equipment and readable storage medium storing program for executing | |
CN108231074A (en) | A kind of data processing method, voice assistant equipment and computer readable storage medium | |
CN110580910B (en) | Audio processing method, device, equipment and readable storage medium | |
US20190311732A1 (en) | Nullify stuttering with voice over capability | |
US20140059549A1 (en) | Application recognition system and method | |
US20220020368A1 (en) | Output apparatus, output method and non-transitory computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191206 |