CN110544483A - Method, device, terminal and storage medium for preventing user privacy from being revealed - Google Patents

Method, device, terminal and storage medium for preventing user privacy from being revealed Download PDF

Info

Publication number
CN110544483A
CN110544483A CN201910844554.2A CN201910844554A CN110544483A CN 110544483 A CN110544483 A CN 110544483A CN 201910844554 A CN201910844554 A CN 201910844554A CN 110544483 A CN110544483 A CN 110544483A
Authority
CN
China
Prior art keywords
equipment
voice
interference
state
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910844554.2A
Other languages
Chinese (zh)
Inventor
宋昌健
贾槐真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinmao Green Building Technology Co Ltd
Original Assignee
Jinmao Green Building Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinmao Green Building Technology Co Ltd filed Critical Jinmao Green Building Technology Co Ltd
Priority to CN201910844554.2A priority Critical patent/CN110544483A/en
Publication of CN110544483A publication Critical patent/CN110544483A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0208Noise filtering
    • G10L21/0216Noise filtering characterised by the method used for estimating noise
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0208Noise filtering
    • G10L21/0264Noise filtering characterised by the type of parameter measurement, e.g. correlation techniques, zero crossing techniques or predictive techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0208Noise filtering
    • G10L21/0216Noise filtering characterised by the method used for estimating noise
    • G10L2021/02161Number of inputs available containing the signal or the noise to be suppressed
    • G10L2021/02166Microphone arrays; Beamforming

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Computational Linguistics (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a method, a device, a terminal and a storage medium for preventing user privacy from being revealed, which comprise the following steps: judging whether the voice equipment is in a human-computer interaction state or not; when the voice equipment is not in a human-computer interaction state, controlling interference equipment in communication connection with the voice equipment to be started, wherein the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires user voice. According to the method and the device, when the voice equipment is not in a man-machine interaction state, the interference equipment is used for generating noise, the signal-to-noise ratio of the voice recognition microphone array is greatly reduced in a noise shielding mode, and the purpose of protecting the privacy of a user is achieved by interfering the ability of the voice equipment for acquiring external voice information. The application provides the user with the right to choose between privacy and convenience by providing the jamming device with a jamming switch or the voice device with a microphone switch.

Description

Method, device, terminal and storage medium for preventing user privacy from being revealed
Technical Field
The application relates to the technical field of internet of things, in particular to a method, a device, a terminal and a storage medium for preventing user privacy from being revealed.
background
with the rapid development of technology, more and more consumers are beginning to use intelligent speech recognition-type devices (e.g., intelligent voice speakers). The intelligent voice recognition equipment really provides convenient functional experience for the user, namely the user can control or operate the intelligent voice recognition equipment through voice, the limitation of the geographic position between the user and the intelligent voice recognition equipment is removed in a certain range, meanwhile, the hands of the user are also liberated, and the user can have more idle time to process other things.
However, the risk of divulging the privacy of the user exists in the intelligent speech recognition device, and therefore, a method for preventing the divulging of the privacy of the user is needed to avoid the irreparable loss of the user.
Disclosure of Invention
The application provides a method, a device, a terminal and a storage medium for preventing the privacy of a user from being revealed, so as to solve the problems.
a first aspect of the present application provides a method for preventing disclosure of user privacy, which specifically includes:
a method of preventing disclosure of user privacy, comprising:
judging whether the voice equipment is in a human-computer interaction state or not;
When the voice equipment is not in a human-computer interaction state, controlling interference equipment in communication connection with the voice equipment to be started, wherein the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires user voice.
further, when the voice device is not in a human-computer interaction state, controlling an interfering device in communication connection with the voice device to be turned on, specifically including:
When the voice equipment is not in a human-computer interaction state, identifying the state of an interference switch of the interference equipment;
and when the state of an interference switch of the interference equipment is in an on state, controlling the interference equipment to be on.
further, the method further comprises:
And when the state of an interference switch of the interference equipment is in a closed state, controlling the interference equipment to be closed.
further, the method further comprises:
And when the voice equipment is in a human-computer interaction state, controlling the interference equipment to be closed.
Further, the noise generated by the interference device is periodically changed.
further, the frequency of the noise generated by the interference equipment is 500 Hz-5000 Hz.
The second aspect of the present application provides an apparatus for preventing disclosure of user privacy, which specifically includes:
an apparatus for preventing disclosure of user privacy, comprising:
The judging module is used for judging whether the voice equipment is in a human-computer interaction state or not;
And the interference equipment opening module is used for controlling the interference equipment in communication connection with the voice equipment to be opened when the voice equipment is not in a human-computer interaction state, and the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires the voice of a user.
further, the interfering device starting module specifically includes:
The judging submodule is used for identifying the state of an interference switch of the interference equipment when the voice equipment is not in a man-machine interaction state;
and the interference equipment starting submodule is used for controlling the starting of the interference equipment when the state of an interference switch of the interference equipment is in a starting state.
Further, the apparatus further comprises:
and the interference equipment closing submodule is used for controlling the interference equipment to be closed when the state of an interference switch of the interference equipment is in a closed state.
further, the apparatus further comprises:
and the interference equipment closing module is used for controlling the interference equipment to be closed when the voice equipment is in a human-computer interaction state.
a third aspect of the present application provides a terminal, which specifically includes:
A terminal, comprising:
a processor;
A memory for storing the processor-executable instructions;
wherein the processor is configured to perform operations to implement a method of preventing disclosure of user privacy.
a fourth aspect of the present application provides a non-transitory computer-readable storage medium, which includes:
A non-transitory computer-readable storage medium having instructions therein, which, when executed by a processor of a terminal, enable the terminal to perform operations performed to implement a method of preventing disclosure of user privacy.
compared with the prior art, the method has the following advantages:
according to the method and the device, when the voice equipment is not in a man-machine interaction state, the interference equipment is used for generating noise, the signal-to-noise ratio of the voice recognition microphone array is greatly reduced in a noise shielding mode, and the purpose of protecting the privacy of a user is achieved by interfering the ability of the voice equipment for acquiring external voice information.
the application provides the user with the right to choose between privacy and convenience by providing the jamming device with a jamming switch or the voice device with a microphone switch.
it is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
drawings
in order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart of a method for preventing privacy of a user from being revealed according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for preventing privacy of a user from being compromised according to another embodiment of the present application;
FIG. 3 is a block diagram of an apparatus for preventing privacy disclosure of a user according to another embodiment of the present application;
fig. 4 is a schematic structural diagram of a terminal according to another embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
along with the rapid development of science and technology, more and more consumers begin to be used to intelligent speech recognition class equipment, for example intelligent voice sound, through speech control intelligent voice sound, can realize the broadcast music, set up the alarm clock, listen to functions such as news. The intelligent voice recognition equipment can be controlled only by sound, and the control mechanism of the intelligent voice recognition equipment is that voice of a user is continuously acquired for recognition and judgment, so that convenient functional experience is provided for consumers. Just because the voice of the user needs to be acquired continuously, the voice data of the user needs to be extracted continuously to realize the functions, and therefore the great hidden danger that the privacy of the user is revealed is caused. This corresponds to a constant monitoring of the user, which makes the risk of privacy disclosure of the user extremely high, and may cause irreparable damage to the user.
In order to solve the above problem, the present application provides a method for preventing disclosure of user privacy, which specifically includes:
A method of preventing disclosure of user privacy, as shown in fig. 1, comprising:
Step S101, judging whether the voice equipment is in a human-computer interaction state;
step S102, when the voice equipment is not in a human-computer interaction state, controlling an interference device in communication connection with the voice equipment to be started, wherein the interference device is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment collects user voice.
The voice device in the related art generally implements the wake-up by a voice wake-up word. The voice device in the application can be a terminal such as a smart phone, a smart watch, a smart bracelet, a tablet computer and a smart television.
When the user does not use the audio device, the audio device needs to continuously monitor the external sound in order to timely respond to the wakeup word. In the process of continuous monitoring, the voice device uploads the monitored voice data to the cloud. The background of the speech device, although not intended to collect the user's speech, clearly forms a way to reveal the user's privacy.
whether the voice equipment is in the man-machine interaction state is judged firstly, when the voice equipment is not in the man-machine interaction state, the fact that voice sent by a user is not used for controlling the voice equipment but belongs to content which does not need the voice equipment to monitor is meant, at the moment, the interference equipment connected with the voice equipment is controlled to work, the interference equipment generates noise, the signal-to-noise ratio of the voice equipment when a microphone array in the voice equipment collects voice of a user can be reduced, the voice equipment can be prevented from monitoring the voice of the user when the voice equipment is not in the man-machine interaction state, and therefore privacy of the user is protected.
For example, for a certain smart sound, the wake-up word is: the same school of the small and beautiful schools.
When the user does not control this intelligent stereo set, the intelligent stereo set need monitor external pronunciation constantly in order to catch and awaken word-little american classmate, in order to avoid this intelligent stereo set to collect user's pronunciation (privacy promptly), when the intelligent stereo set is not in man-machine interaction state, through opening interfering device, interfering device produces the noise, and user's privacy just can't be collected to the intelligent stereo set to protection user's privacy.
And S103, controlling the interference equipment to be closed when the voice equipment is in a man-machine interaction state.
when the voice device is in the human-computer interaction state, the fact that the current voice of the user is sent out for controlling the voice device is meant, the possibility of privacy existence of the voice device is low, therefore, the voice device can normally acquire the voice of the user, at the moment, the interference device does not need to interfere monitoring, and the interference device can be turned off.
for example, when a user needs to use the intelligent sound box, the user can speak a little schoolmate to realize voice control on the intelligent sound box. When the user speaks a little scholar, the intelligent sound box is in a human-computer interaction state, at the moment, the user needs to speak specific control over the intelligent sound box, such as playing songs, and the intelligent sound box needs to receive the instruction to complete the operation of playing the songs. When intelligent stereo set is in the human-computer interaction state, this intelligent stereo set of user's intention for needs control accomplishes a certain task, and when the intelligent stereo set need know what task the user need accomplish, need carry out accurate monitoring to user's pronunciation, if interfering device is still working this moment, will influence user's convenience, consequently when intelligent stereo set is in the human-computer interaction state, need close interfering device, make intelligent pronunciation accurately receive the instruction that the user sent.
In another embodiment proposed by the present application, a method for preventing privacy disclosure is further proposed, as shown in fig. 2, specifically as follows:
Step S201, when the voice equipment is not in a human-computer interaction state, identifying the state of an interference switch of the interference equipment;
Step S202, when the state of the interference switch of the interference equipment is in an on state, the interference equipment is controlled to be on.
Step S203, when the state of the interference switch of the interference equipment is in the closed state, controlling the interference equipment to be closed.
According to the embodiment of the application, the interference switch is arranged for the interference equipment (the interference switch is used for controlling whether the interference equipment can be started or not when the voice equipment is not in a man-machine interaction state, the interference switch can also be a microphone switch of the voice equipment, and the microphone switch is used for controlling whether a microphone of the voice equipment works or not), when a user cares that the voice equipment collects privacy, the interference equipment can work by starting the interference switch, and the privacy is prevented from being revealed. When the user does not mind that the voice equipment collects the privacy of the user, the interference switch can be turned on or off, so that the interference equipment stops working.
After the interference switch is set for the interference device, when the voice device is not in a human-computer interaction state, the state of the interference switch needs to be recognized first. When the state of the interference switch of the interference equipment is in the open state, the user does not want to reveal the privacy, so the interference equipment can be controlled to open, the interference equipment generates noise, the signal-to-noise ratio when the microphone array in the voice equipment collects the voice of the user is reduced, the voice equipment can be prevented from monitoring the voice of the user when the voice equipment is not in the human-computer interaction state, and the privacy of the user is protected. When the state of the interference switch of the interference device is in the off state, it means that the user does not care about privacy disclosure for the voice device, and the interference device may not operate, thereby controlling the interference device to be turned off.
the noise generated by the interference device in the embodiment of the application is periodically changed. The noise generated by the interference equipment needs to cover the human voice frequency, so the frequency range of the noise generated by the interference equipment is 500 Hz-5000 Hz.
According to the method and the device, when the voice equipment is not in a man-machine interaction state, the interference equipment is used for generating noise, the signal-to-noise ratio of the voice recognition microphone array is greatly reduced in a noise shielding mode, and the purpose of protecting the privacy of a user is achieved by interfering the ability of the voice equipment for acquiring external voice information.
the application provides the user with the right to choose between privacy and convenience by providing the jamming device with a jamming switch or the voice device with a microphone switch.
Based on the same concept, the embodiment of the application provides a device for preventing user privacy from being revealed, which specifically comprises the following steps:
An apparatus for preventing privacy of a user from being revealed, as shown in fig. 3, comprises:
the judging module 301 is configured to judge whether the voice device is in a human-computer interaction state;
An interfering device turning-on module 302, configured to control, when the speech device is not in a human-computer interaction state, turning on an interfering device in communication connection with the speech device, where the interfering device is configured to generate noise, so as to reduce a signal-to-noise ratio when a microphone array in the speech device collects user speech.
And an interfering device closing module 303, configured to control the interfering device to close when the voice device is in a human-computer interaction state.
the interfering device starting module 302 specifically includes:
the judging submodule is used for identifying the state of an interference switch of the interference equipment when the voice equipment is not in a man-machine interaction state;
And the interference equipment starting submodule is used for controlling the starting of the interference equipment when the state of an interference switch of the interference equipment is in a starting state.
And the interference equipment closing submodule is used for controlling the interference equipment to be closed when the state of an interference switch of the interference equipment is in a closed state.
The embodiment of the application provides a terminal, as shown in fig. 4, specifically as follows:
A terminal, comprising:
A processor 401;
A memory 402 for storing the processor-executable instructions;
Wherein the processor 401 is configured to perform operations to implement a method of preventing privacy of a user from being compromised.
An embodiment of the present application provides a non-transitory computer-readable storage medium, which includes:
A non-transitory computer-readable storage medium having instructions therein, which, when executed by a processor of a terminal, enable the terminal to perform operations performed to implement a method of preventing disclosure of user privacy.
the embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
as will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
these computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
the method, the device, the terminal and the storage medium for preventing the user privacy from being revealed provided by the application are introduced in detail, a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (12)

1. A method for preventing disclosure of user privacy, comprising:
judging whether the voice equipment is in a human-computer interaction state or not;
when the voice equipment is not in a human-computer interaction state, controlling interference equipment in communication connection with the voice equipment to be started, wherein the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires user voice.
2. the method according to claim 1, wherein when the voice device is not in the human-computer interaction state, controlling an interfering device in communication connection with the voice device to be turned on includes:
When the voice equipment is not in a human-computer interaction state, identifying the state of an interference switch of the interference equipment;
And when the state of an interference switch of the interference equipment is in an on state, controlling the interference equipment to be on.
3. The method of claim 2, further comprising:
And when the state of an interference switch of the interference equipment is in a closed state, controlling the interference equipment to be closed.
4. The method of claim 1, further comprising:
And when the voice equipment is in a human-computer interaction state, controlling the interference equipment to be closed.
5. The method of claim 1, wherein the noise generated by the jamming device is periodically varied.
6. The method of claim 1, wherein the noise generated by the jamming device has a frequency of 500Hz to 5000 Hz.
7. an apparatus for preventing disclosure of user privacy, comprising:
The judging module is used for judging whether the voice equipment is in a human-computer interaction state or not;
and the interference equipment opening module is used for controlling the interference equipment in communication connection with the voice equipment to be opened when the voice equipment is not in a human-computer interaction state, and the interference equipment is used for generating noise so as to reduce the signal-to-noise ratio when a microphone array in the voice equipment acquires the voice of a user.
8. the apparatus of claim 7, wherein the interfering device opening module specifically comprises:
The judging submodule is used for identifying the state of an interference switch of the interference equipment when the voice equipment is not in a man-machine interaction state;
and the interference equipment starting submodule is used for controlling the starting of the interference equipment when the state of an interference switch of the interference equipment is in a starting state.
9. the apparatus of claim 8, further comprising:
And the interference equipment closing submodule is used for controlling the interference equipment to be closed when the state of an interference switch of the interference equipment is in a closed state.
10. The apparatus of claim 7, further comprising:
and the interference equipment closing module is used for controlling the interference equipment to be closed when the voice equipment is in a human-computer interaction state.
11. a terminal, comprising:
A processor;
A memory for storing the processor-executable instructions;
Wherein the processor is configured to execute to implement the operations performed by a method of preventing privacy of a user from being compromised as claimed in any of claims 1 to 7.
12. A non-transitory computer-readable storage medium having instructions that, when executed by a processor of a terminal, enable the terminal to perform operations performed to implement a method of preventing disclosure of user privacy as recited in any one of claims 1-7.
CN201910844554.2A 2019-09-06 2019-09-06 Method, device, terminal and storage medium for preventing user privacy from being revealed Pending CN110544483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910844554.2A CN110544483A (en) 2019-09-06 2019-09-06 Method, device, terminal and storage medium for preventing user privacy from being revealed

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910844554.2A CN110544483A (en) 2019-09-06 2019-09-06 Method, device, terminal and storage medium for preventing user privacy from being revealed

Publications (1)

Publication Number Publication Date
CN110544483A true CN110544483A (en) 2019-12-06

Family

ID=68712897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910844554.2A Pending CN110544483A (en) 2019-09-06 2019-09-06 Method, device, terminal and storage medium for preventing user privacy from being revealed

Country Status (1)

Country Link
CN (1) CN110544483A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782174A (en) * 2020-06-30 2020-10-16 联想(北京)有限公司 Electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209296A (en) * 2016-06-29 2016-12-07 中北大学 A kind of band signal EVAC
CN106910500A (en) * 2016-12-23 2017-06-30 北京第九实验室科技有限公司 The method and apparatus of Voice command is carried out to the equipment with microphone array
CN108831471A (en) * 2018-09-03 2018-11-16 与德科技有限公司 A kind of voice method for security protection, device and route terminal
US20190096408A1 (en) * 2017-09-25 2019-03-28 Cirrus Logic International Semiconductor Ltd. Talker change detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209296A (en) * 2016-06-29 2016-12-07 中北大学 A kind of band signal EVAC
CN106910500A (en) * 2016-12-23 2017-06-30 北京第九实验室科技有限公司 The method and apparatus of Voice command is carried out to the equipment with microphone array
US20190096408A1 (en) * 2017-09-25 2019-03-28 Cirrus Logic International Semiconductor Ltd. Talker change detection
CN108831471A (en) * 2018-09-03 2018-11-16 与德科技有限公司 A kind of voice method for security protection, device and route terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782174A (en) * 2020-06-30 2020-10-16 联想(北京)有限公司 Electronic equipment

Similar Documents

Publication Publication Date Title
US9552816B2 (en) Application focus in speech-based systems
KR102118209B1 (en) Voice trigger for a digital assistant
CN108346433A (en) A kind of audio-frequency processing method, device, equipment and readable storage medium storing program for executing
CN104954555A (en) Volume adjusting method and system
US10540994B2 (en) Personal device for hearing degradation monitoring
KR20210013140A (en) Hotword suppression
CN108198569A (en) A kind of audio-frequency processing method, device, equipment and readable storage medium storing program for executing
JP6783339B2 (en) Methods and devices for processing audio
MX2021014721A (en) Systems and methods for machine learning of voice attributes.
CN117912447A (en) Hotword aware speech synthesis
US10536786B1 (en) Augmented environmental awareness system
WO2015107741A1 (en) Information processing device, information processing method, and program
US9715540B2 (en) User driven audio content navigation
US9558758B1 (en) User feedback on microphone placement
CN111640434A (en) Method and apparatus for controlling voice device
CN114600187A (en) Providing countermeasure protection for speech in an audio signal
CN103152481B (en) Mobile terminal sound timing system and mobile terminal sound reporting method
CN110544483A (en) Method, device, terminal and storage medium for preventing user privacy from being revealed
Sciarretta et al. Smart speakers for inclusion: How can intelligent virtual assistants really assist everybody?
CN110232909A (en) A kind of audio-frequency processing method, device, equipment and readable storage medium storing program for executing
CN108231074A (en) A kind of data processing method, voice assistant equipment and computer readable storage medium
CN110580910B (en) Audio processing method, device, equipment and readable storage medium
US20190311732A1 (en) Nullify stuttering with voice over capability
US20140059549A1 (en) Application recognition system and method
US20220020368A1 (en) Output apparatus, output method and non-transitory computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191206