CN110602696A - Conversation privacy protection method and electronic equipment - Google Patents

Conversation privacy protection method and electronic equipment Download PDF

Info

Publication number
CN110602696A
CN110602696A CN201911042689.3A CN201911042689A CN110602696A CN 110602696 A CN110602696 A CN 110602696A CN 201911042689 A CN201911042689 A CN 201911042689A CN 110602696 A CN110602696 A CN 110602696A
Authority
CN
China
Prior art keywords
distance
user
interference
interference source
overhearing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911042689.3A
Other languages
Chinese (zh)
Inventor
樊永祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201911042689.3A priority Critical patent/CN110602696A/en
Publication of CN110602696A publication Critical patent/CN110602696A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a conversation privacy protection method and electronic equipment, wherein the conversation privacy protection method comprises the following steps: when a user communicates through the electronic equipment, determining a safe communication range corresponding to the user, and acquiring an overhearing distance between a listener and the user within the safe communication range; selecting a target interference source from a plurality of preset noise interference sources according to the hearing distance, and setting the interference intensity of the target interference source; and playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user. According to the technical scheme of the embodiment of the invention, the interference noise can be sent out according to the distance between the listener and the conversation user, so that the problem of privacy disclosure in the conversation process caused by the sound leakage phenomenon is solved, the risk of privacy disclosure in the conversation process is reduced, and the effect of protecting the conversation privacy is achieved.

Description

Conversation privacy protection method and electronic equipment
Technical Field
The present invention relates to the field of electronic devices, and in particular, to a method for protecting call privacy, an electronic device, and a computer-readable storage medium.
Background
In daily life, it is very common for users to use electronic devices to communicate. In the process of using the electronic equipment for communication, the communication content of the user can be heard by other people around the user due to the sound leakage phenomenon of the electronic equipment, so that the privacy of the user is leaked, and the personal information safety is damaged. Therefore, it is urgently needed to provide a technical scheme to alleviate the problem of privacy disclosure in the call process caused by the sound leakage phenomenon.
Disclosure of Invention
The embodiment of the invention aims to provide a conversation privacy protection method, electronic equipment and a computer readable storage medium, so as to relieve the problem of privacy disclosure in a conversation process caused by a sound leakage phenomenon.
To solve the above technical problem, the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides a call privacy protection method, including: when a user communicates through the electronic equipment, determining a safe communication range corresponding to the user, and acquiring an overhearing distance between a listener and the user within the safe communication range; selecting a target interference source from a plurality of preset noise interference sources according to the hearing distance, and setting the interference intensity of the target interference source; and playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user.
In a second aspect, an embodiment of the present invention provides an electronic device, including: the distance acquisition module is used for determining a safe call range corresponding to the user when the user calls through the electronic equipment and acquiring the listening distance between a listener and the user within the safe call range; the interference source determining module is used for selecting a target interference source from a plurality of preset noise interference sources according to the hearing distance and setting the interference intensity of the target interference source; and the interference source playing module is used for playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the method of call privacy protection as described in the first aspect above.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when executed by a processor, the computer program implements the call privacy protection method according to the first aspect.
According to the technical scheme of the embodiment of the invention, firstly, when a user carries out a call through the electronic equipment, a safe call range corresponding to the user is determined, and the listening distance between a listener positioned in the safe call range and the user is acquired; then, according to the hearing distance, selecting a target interference source from a plurality of preset noise interference sources, and setting the interference intensity of the target interference source; and finally, playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user. According to the embodiment of the invention, the interference noise can be sent out according to the distance between the listener and the conversation user, so that the problem of privacy disclosure in the conversation process caused by the sound leakage phenomenon is solved, the risk of privacy disclosure in the conversation process is reduced, and the effect of protecting the conversation privacy is achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a call privacy protection method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a call privacy protection method according to another embodiment of the present invention;
fig. 3 is a schematic diagram of an application scenario of the call privacy protection method on a dual-screen electronic device according to still another embodiment of the present invention;
fig. 4 is a schematic block diagram of an electronic device according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a conversation privacy protection method, electronic equipment and a computer readable storage medium. The conversation privacy protection method can be applied to an electronic device side and executed by the electronic device, and the electronic device provided by the embodiment of the invention includes but is not limited to electronic devices such as mobile phones, tablet computers, wearable devices and the like.
Fig. 1 is a flowchart illustrating a call privacy protection method according to an embodiment of the present invention. Referring to fig. 1, the call privacy protection method includes step S110, step S120, and step S130. The following describes the call privacy protection method in the exemplary embodiment of fig. 1 in detail.
Referring to fig. 1, in step S110, when the user makes a call through the electronic device, a secure call range corresponding to the user is determined, and an overhearing distance between a listener located within the secure call range and the user is acquired.
In an example embodiment, a safe communication distance is marked through big data, experiments and the like, a user who carries out communication by the handheld electronic device is taken as a center, and the safe communication distance is taken as a radius to determine a safe communication range. The distance between the listener and the user in the call is denoted as the listening distance. When a user communicates through the electronic equipment, the listening distance between a listener and the user within a safe communication range is acquired.
In an example embodiment, acquiring the listening distance between the listener and the user within the secure call range includes: periodically acquiring an environment image of a user through a camera of the electronic equipment; judging whether a listener exists in a safe call range or not based on the environment image; and if so, acquiring the overhearing distance between the listener and the user within the safe call range according to the environment image.
In an example embodiment, when a user calls through an electronic device, the number of listeners located within a safe call range is obtained. When the number of the listeners is 0, that is, all the listeners do not fall within the secure call range any more, the call privacy protection method in the embodiment need not be used.
In an exemplary embodiment, the safe call distance is a distance at which a listener cannot hear a sound emitted from a handle of an electronic device after the handle of the electronic device is normally sounded during a call made by a user using the electronic device. If the listening distance of a certain listener is smaller than the safe calling distance, the listener can listen to the sound emitted by the handle of the electronic equipment, and at the moment, the calling privacy of the user is infringed, personal information may be leaked, and it is necessary to start the calling privacy protection method in the embodiment; if the listening distance of a certain listener is greater than or equal to the safe calling distance, the listener cannot hear the sound emitted by the handle of the electronic device, and the calling privacy of the user is safe at this time, and the calling privacy protection method in the embodiment does not need to be started.
In an example embodiment, the electronic device used by the user in the call may be a common single-screen electronic device, or may be a dual-screen electronic device.
In step S120, a target interference source is selected from a plurality of preset noise interference sources according to the overhearing distance, and the interference strength of the target interference source is set.
In an example embodiment, selecting a target interference source from a plurality of preset noise interference sources according to the overhearing distance, and setting the interference strength of the target interference source includes: selecting the nearest listening distance with the minimum value from the listening distances; selecting a target interference source corresponding to the nearest overhearing distance from a plurality of preset noise interference sources based on the mapping relation between the preset overhearing distance and the noise interference source; and setting the interference intensity of the target interference source as the interference intensity corresponding to the nearest overhearing distance based on the preset mapping relation between the overhearing distance and the interference intensity.
In an example embodiment, a plurality of different types of noise interference sources are pre-selected and stored in the electronic device, and each noise interference source can be adjusted to emit interference noise with different interference intensity. The noise interference source is screened out through big data, experiments and other modes. For example, noise interference sources of different types are marked as interference noise a, interference noise B, interference noise C … …, wherein the interference effect of the interference types on the listeners is ordered such that interference noise a is smaller than interference noise B is smaller than interference noise C. A minimum interference unit distance H is preset as a minimum interference strength unit, for example, the minimum interference unit distance H is 1 meter. For each increase of H, the interference effect of the corresponding type of noise interference source is reduced. The mapping relationship between the overhearing distance and the noise interference source is preset, for example, interference noise a corresponds to 3H, interference noise B corresponds to 2H, and interference noise C corresponds to 1H. When the overhearing distance is farther, the interference effect of the interference noise source of the corresponding type is smaller, for example, the overhearing distance is 3 meters, and the interference noise A with the minimum interference effect corresponds to; the overhearing distance is 2 meters, and corresponds to interference noise B with better interference effect than the interference noise A; the overhearing distance is 1 meter, corresponding to the interference noise C with the maximum interference effect.
The interference intensity of the noise interference source is the sound production loudness of the noise interference source. The sounding loudness E is the minimum sounding loudness unit, and the corresponding sounding loudness is increased gradually when the distance H of the minimum interference unit is increased. The mapping relationship between the overhearing distance and the interference strength is preset, for example, 3H corresponds to 1E, 2H corresponds to 2E, and 1H corresponds to 3E. When the overhearing distance is farther, the sounding loudness of the corresponding noise interference source is smaller. For example, the overhearing distance is 3 meters, and the sounding loudness of the corresponding noise interference source is 1E; the overhearing distance is 2 meters, and the sound production loudness of the corresponding noise interference source is 2E; the overhearing distance is 1 meter, and the sound production loudness of the corresponding noise interference source is 3E.
It should be noted that, in the exemplary embodiment, a maximum sounding loudness Em is preset, and when the interference strength of the target interference source is set, the interference strength (i.e., sounding loudness) is less than or equal to the maximum sounding strength Em, that is, the aforementioned interference strength of the target interference source does not exceed the preset maximum sounding strength Em, so as to ensure that a user in a call can hear clearly when receiving a voice uttered by the electronic device.
In an example embodiment, by using technologies such as voice recognition, when preset keywords such as "inaudible" appear in the call voice collected by the electronic device, the volume of the call voice sent by the electronic device is increased according to a preset value, or the sound production loudness of interference noise is reduced, so that it is ensured that a user in a call can hear clearly when receiving the voice sent by the electronic device.
In an example embodiment, the interference strength may also be adjusted using the number of listeners obtained in step 110 as an auxiliary variable. The more the number of the people listening beside the telephone, the interference intensity is enhanced, and the sounding volume of the receiver is increased according to a preset numerical value.
In step S130, the target interference source is played according to the set interference strength, so as to protect the call privacy of the user.
In an example embodiment, the electronic device sends the target interference source interference noise from the loudspeaker according to the set interference intensity, so that the requirement of comfort of a user in a call is met, and the listener can be interfered to not hear the voice sent by the handle of the electronic device, so that the call privacy of the user is protected.
In an exemplary embodiment, when the listening distance of the listener is greater than the safe calling distance after the listener moves, the playing of the interference noise is stopped, but the camera is kept periodically on to monitor the surrounding environment, so that the power consumption of the electronic device is saved.
According to the call privacy protection method in the exemplary embodiment of fig. 1, first, when a user makes a call through an electronic device, a secure call range corresponding to the user is determined, and an overhearing distance between a listener located within the secure call range and the user is acquired; then, according to the hearing distance, selecting a target interference source from a plurality of preset noise interference sources, and setting the interference intensity of the target interference source; and finally, playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user. According to the embodiment of the invention, the interference noise can be sent out according to the distance between the listener and the conversation user, so that the problem of privacy disclosure in the conversation process caused by the sound leakage phenomenon is solved, the risk of privacy disclosure in the conversation process is reduced, and the effect of protecting the conversation privacy is achieved.
Further, in the exemplary embodiment, based on the environment image, it is determined whether there is a suspicious eavesdropping behavior of a listener located within the secure call range; and if the suspicious interception behavior exists, sending a safety warning to the user. Specifically, an alert distance is preset by taking the electronic device in the call as a center, the alert distance is far smaller than the safe call distance, an alert range with the alert distance as a radius is further determined, and the alert range is far smaller than the safe call range. And analyzing the collected environment image, and judging whether the listeners in the warning range have suspicious eavesdropping behaviors. The environment image analysis may adopt technologies such as image extraction, feature analysis, image analysis, AI identification, and the like, and the embodiment of the present invention is not particularly limited thereto. Suspicious eavesdropping behavior includes, but is not limited to, the behavior of listeners slowly or abnormally close to the talker. If suspicious eavesdropping behavior exists, a high risk hidden danger that a bystander eavesdrops the privacy of a caller exists, and at the moment, the electronic equipment sends a safety warning to the caller, for example, a receiver of the electronic equipment sends a warning voice of 'beep' and a call interface of the electronic equipment has a safety prompting message 'attention to call information safety' and the like.
In an example embodiment, echo cancellation techniques are used to cancel noise emitted by a target interference source collected by a microphone of an electronic device. After the interference noise is emitted to the environment through the loudspeaker, the interference noise can be collected by a microphone of the mobile phone, and if the interference noise is emitted through the modem, the interference noise can be heard by the other party in the call. By adopting echo cancellation technology, the interference noise voice signal collected by the microphone of the mobile phone and the played interference noise signal are subjected to phase transformation, amplitude subtraction and other operations, so that the noise collected by the microphone is eliminated, and the two parties of the call are ensured not to be influenced by the noise.
Fig. 2 is another schematic flow chart of a call privacy protection method according to another embodiment of the present invention.
Referring to fig. 2, in step S210, mapping relationships between interference sources of different types and interference intensities according to distances are preset.
In an example embodiment, a mapping relationship of the distance to the noise interference source is preset; and presetting a mapping relation between the distance and the interference strength. For example, 3 meters corresponds to interference noise a, 2 meters corresponds to interference noise B, and 1 meter corresponds to interference noise C. The 3 m corresponds to the sounding loudness 1E, the 2 m corresponds to the sounding loudness 2E, and the 1 m corresponds to the sounding loudness 3E.
In step S220, the screen camera is periodically turned on during the handle call, the hearing distance between the other people and the caller and the safe call distance are obtained, and the number of hearing people within the safe call distance is recorded.
In an example embodiment, a safe communication distance is marked through big data, experiments and the like, a user who carries out communication by the handheld electronic device is taken as a center, and the safe communication distance is taken as a radius to determine a safe communication range. When a user uses a handle of a mobile phone to communicate, a screen camera is periodically started; and acquiring the hearing distance between the listener and the user based on the environment image acquired by the camera.
In an example embodiment, the number of listeners whose listening distance is less than the safe talk distance is counted as the number of listeners. The number of bystanders is applied in the subsequent step S270.
In step S230, it is determined whether the overhearing distance is less than the safe call distance.
In an exemplary embodiment, the auditing distance is compared with the safe communication distance to determine whether the auditing distance is less than the safe communication distance, if so, the process goes to step S240, and if not, the process goes to step S250.
In step S240, the interference source type and the interference intensity corresponding to the overhearing distance are selected.
In an exemplary embodiment, when the overhearing distance is smaller than the safe call distance, based on the mapping relationship between the distance preset in step S210 and the noise interference source, selecting an interference source type corresponding to the overhearing distance as a target interference source; and setting the interference intensity of the target interference source based on the preset mapping relation between the distance and the interference intensity in the step S210.
In step S250, the speaker is turned off and the playing of the interference source is stopped.
In an example embodiment, when the overhearing distance is not less than the safe talking distance, the speaker is turned off and no interference noise is emitted.
In step S260, the speaker is turned on, and the selected interference source emits sound from the speaker with the selected interference intensity.
In an example embodiment, the selected interferer, i.e., the target interferer, emits the target interferer from the speaker with the set interference strength.
In step S270, the number of listeners is used as an auxiliary variable, and the greater the number of listeners, the greater the interference strength, and the greater the receiver sound emission (the selected strength is less than the maximum sound emission strength).
In an example embodiment, the number of the bystanders acquired in step S240 is used as an auxiliary variable to adjust the interference intensity of the target interference source, the more the number of the bystanders, the greater the interference intensity, and the sound volume of the receiver is increased.
It is noted that in an example embodiment, the target interferer is set to an interference level less than a preset maximum voicing level.
In step S280, the echo cancellation technique cancels the interference noise collected by the microphone of the handset.
In an exemplary embodiment, the interference noise is picked up by the microphone of the handset after being emitted to the environment through the speaker. By adopting echo cancellation technology, the interference noise voice signal collected by the microphone of the mobile phone and the played interference noise signal are subjected to phase transformation, amplitude subtraction and other operations, so that the noise collected by the microphone is eliminated, and the two parties of the call are ensured not to be influenced by the noise.
In step S290, the modem transmits a call voice packet.
In an exemplary embodiment, the modem transmits a call voice packet, and a call partner of a user who calls with the mobile phone hears the voice with interference noise removed, and makes a normal call with the user.
Fig. 3 is a schematic diagram of an application scenario of the call privacy protection method on a dual-screen electronic device according to still another embodiment of the present invention.
Referring to fig. 3, the dual-screen electronic device is divided into an a-screen 310 and a B-screen 320, and during a call using the dual-screen electronic device, a security prompt 330 is displayed on the a-screen 310, specifically, the content is "call information security attention", and is used for prompting a user that there is a high risk of eavesdropping privacy at this time.
Fig. 4 is a schematic block diagram of an electronic device according to an embodiment of the present invention. Referring to fig. 4, the electronic device 400 includes: a distance acquisition module 410, an interference source determination module 420, and an interference source playing module 430. The distance obtaining module 410 is configured to determine a secure call range corresponding to a user when the user makes a call through the electronic device, and obtain an overhearing distance between an audience and the user within the secure call range; the interference source determining module 420 is configured to select a target interference source from a plurality of preset noise interference sources according to the overhearing distance, and set interference strength of the target interference source; the interference source playing module 430 is configured to play the target interference source according to the set interference strength, so as to protect the conversation privacy of the user.
In some embodiments of the present invention, based on the above scheme, the interference source determining module 420 is specifically configured to: selecting the nearest listening distance with the minimum value from the listening distances; selecting a target interference source corresponding to the nearest overhearing distance from a plurality of preset noise interference sources based on the mapping relation between the preset overhearing distance and the noise interference source; and setting the interference intensity of the target interference source as the interference intensity corresponding to the nearest overhearing distance based on the preset mapping relation between the overhearing distance and the interference intensity.
In some embodiments of the present invention, based on the above scheme, the distance obtaining module 410 is specifically configured to: periodically acquiring an environment image of a user through a camera of the electronic equipment; judging whether a listener exists in a safe call range or not based on the environment image; and if so, acquiring the overhearing distance between the listener and the user within the safe call range according to the environment image.
In some embodiments of the present invention, based on the above scheme, the electronic device 400 further includes: the suspicious behavior judging module is used for judging whether the suspicious eavesdropping behavior exists in the listeners in the safe call range based on the environment image; and the warning sending module is used for sending a safety warning to the user if the suspicious interception behavior exists.
According to the technical scheme provided by the embodiment of the invention, firstly, when a user carries out a call through electronic equipment, a safe call range corresponding to the user is determined, and the listening distance between a listener and the user within the safe call range is acquired; then, according to the hearing distance, selecting a target interference source from a plurality of preset noise interference sources, and setting the interference intensity of the target interference source; and finally, playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user. According to the embodiment of the invention, the interference noise can be sent out according to the distance between the listener and the conversation user, so that the problem of privacy disclosure in the conversation process caused by the sound leakage phenomenon is solved, the risk of privacy disclosure in the conversation process is reduced, and the effect of protecting the conversation privacy is achieved.
It should be noted that the electronic device provided in the embodiment of the present invention can implement each process of the foregoing call privacy protection method, and achieve the same function and effect, which is not repeated here.
Fig. 5 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention, and as shown in fig. 5, the electronic device 500 includes but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, a user input unit 507, an interface unit 508, a memory 509, a processor 510, and a power supply 511. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 5 does not constitute a limitation of the electronic device, and that the electronic device may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The memory 509 stores therein a computer program, and when the computer program is executed by the processor 510, the following procedure can be implemented: when a user communicates through the electronic equipment, determining a safe communication range corresponding to the user, and acquiring an overhearing distance between a listener and the user within the safe communication range; selecting a target interference source from a plurality of preset noise interference sources according to the hearing distance, and setting the interference intensity of the target interference source; and playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user.
Optionally, when executed by the processor 510, the computer program selects a target interference source from a plurality of preset noise interference sources according to the overhearing distance, and sets an interference strength of the target interference source, including: selecting the nearest listening distance with the minimum value from the listening distances; selecting a target interference source corresponding to the nearest overhearing distance from a plurality of preset noise interference sources based on the mapping relation between the preset overhearing distance and the noise interference source; and setting the interference intensity of the target interference source as the interference intensity corresponding to the nearest overhearing distance based on the preset mapping relation between the overhearing distance and the interference intensity.
Optionally, the computer program, when executed by the processor 510, is configured to obtain an overhearing distance between an audience and a user within a secure call range, including: periodically acquiring an environment image of a user through a camera of the electronic equipment; judging whether a listener exists in a safe call range or not based on the environment image; and if so, acquiring the overhearing distance between the listener and the user within the safe call range according to the environment image.
Optionally, when executed by the processor 510, the computer program may also implement the following process: judging whether a listener positioned in a safe call range has suspicious eavesdropping behavior or not based on the environment image; and if the suspicious interception behavior exists, sending a safety warning to the user.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 510; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 can also communicate with a network and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user via the network module 502, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 503 may convert audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output as sound. Also, the audio output unit 503 may also provide audio output related to a specific function performed by the electronic apparatus 500 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
The input unit 504 is used to receive an audio or video signal. The input Unit 504 may include a Graphics Processing Unit (GPU) 5041 and a microphone 5042, and the Graphics processor 5041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 506. The image frames processed by the graphic processor 5041 may be stored in the memory 509 (or other storage medium) or transmitted via the radio frequency unit 501 or the network module 502. The microphone 5042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 501 in case of the phone call mode.
The electronic device 500 also includes at least one sensor 505, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 5061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 5061 and/or a backlight when the electronic device 500 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 505 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 506 is used to display information input by the user or information provided to the user. The Display unit 506 may include a Display panel 5061, and the Display panel 5061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 507 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 5071 using a finger, stylus, or any suitable object or attachment). The touch panel 5071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 510, and receives and executes commands sent by the processor 510. In addition, the touch panel 5071 may be implemented in various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may include other input devices 5072. In particular, other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 5071 may be overlaid on the display panel 5061, and when the touch panel 5071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 510 to determine the type of the touch event, and then the processor 510 provides a corresponding visual output on the display panel 5061 according to the type of the touch event. Although the touch panel 5071 and the display panel 5061 are two independent components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 5071 and the display panel 5061 may be integrated to implement the input and output functions of the electronic device, and is not limited herein.
The interface unit 508 is an interface for connecting an external device to the electronic apparatus 500. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 508 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the electronic apparatus 500 or may be used to transmit data between the electronic apparatus 500 and external devices.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 509 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 510 is a control center of the electronic device, connects various parts of the whole electronic device by using various interfaces and lines, performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 509 and calling data stored in the memory 509, thereby performing overall monitoring of the electronic device. Processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 510.
The electronic device 500 may further include a power supply 511 (e.g., a battery) for supplying power to various components, and preferably, the power supply 511 may be logically connected to the processor 510 via a power management system, so as to implement functions of managing charging, discharging, and power consumption via the power management system.
In addition, the electronic device 500 includes some functional modules that are not shown, and are not described in detail herein.
The electronic equipment in the embodiment of the invention can realize each process of the conversation privacy protection method and achieve the same effect and function, and the process is not repeated.
Preferably, an embodiment of the present invention further provides an electronic device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the foregoing call privacy protection method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
The electronic equipment in the embodiment of the invention can realize each process of the conversation privacy protection method and achieve the same effect and function, and the process is not repeated.
Further, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the foregoing call privacy protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
The computer-readable storage medium in the embodiment of the present invention can implement the processes of the foregoing call privacy protection method, and achieve the same effects and functions, which are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the above-mentioned embodiment of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A conversation privacy protection method is applied to electronic equipment and is characterized by comprising the following steps:
when a user carries out a call through the electronic equipment, determining a safe call range corresponding to the user, and acquiring an overhearing distance between a listener positioned in the safe call range and the user;
selecting a target interference source from a plurality of preset noise interference sources according to the hearing distance, and setting the interference intensity of the target interference source;
and playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user.
2. The method according to claim 1, wherein the selecting a target interference source from a plurality of preset noise interference sources according to the overhearing distance and setting an interference strength of the target interference source comprises:
selecting the nearest listening distance with the minimum value from the listening distances;
selecting a target interference source corresponding to the nearest overhearing distance from a plurality of preset noise interference sources based on a mapping relation between the preset overhearing distance and the noise interference source;
and setting the interference intensity of the target interference source as the interference intensity corresponding to the nearest overhearing distance based on the preset mapping relation between the overhearing distance and the interference intensity.
3. The method according to claim 1 or 2, wherein the obtaining of the listening distance between the user and the listener located in the secure call range includes:
periodically acquiring an environment image of the user through a camera of the electronic equipment;
judging whether a listener exists in the safe call range or not based on the environment image;
and if the environment image exists, acquiring the hearing distance between the listener and the user within the safe call range according to the environment image.
4. The call privacy protection method according to claim 3, further comprising:
judging whether suspicious eavesdropping behaviors exist in the listeners in the safe call range or not based on the environment image;
and if the suspicious interception behavior exists, sending a safety warning to the user.
5. An electronic device, comprising:
the distance acquisition module is used for determining a safe call range corresponding to a user when the user calls through the electronic equipment, and acquiring an audion distance between a listener positioned in the safe call range and the user;
the interference source determining module is used for selecting a target interference source from a plurality of preset noise interference sources according to the overhearing distance and setting the interference intensity of the target interference source;
and the interference source playing module is used for playing the target interference source according to the set interference intensity so as to protect the conversation privacy of the user.
6. The electronic device of claim 5, wherein the interference source determining module is specifically configured to:
selecting the nearest listening distance with the minimum value from the listening distances;
selecting a target interference source corresponding to the nearest overhearing distance from a plurality of preset noise interference sources based on a mapping relation between the preset overhearing distance and the noise interference source;
and setting the interference intensity of the target interference source as the interference intensity corresponding to the nearest overhearing distance based on the preset mapping relation between the overhearing distance and the interference intensity.
7. The electronic device according to claim 5 or 6, wherein the distance acquisition module is specifically configured to:
periodically acquiring an environment image of the user through a camera of the electronic equipment;
judging whether a listener exists in the safe call range or not based on the environment image;
and if the environment image exists, acquiring the hearing distance between the listener and the user within the safe call range according to the environment image.
8. The electronic device of claim 7, further comprising:
the suspicious behavior judging module is used for judging whether the suspicious eavesdropping behavior exists in the listeners in the safe communication range based on the environment image;
and the warning sending module is used for sending a safety warning to the user if the suspicious interception behavior exists.
9. An electronic device, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing a call privacy protection method as claimed in any one of claims 1 to 4.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the call privacy protection method of any one of claims 1 to 4.
CN201911042689.3A 2019-10-30 2019-10-30 Conversation privacy protection method and electronic equipment Pending CN110602696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911042689.3A CN110602696A (en) 2019-10-30 2019-10-30 Conversation privacy protection method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911042689.3A CN110602696A (en) 2019-10-30 2019-10-30 Conversation privacy protection method and electronic equipment

Publications (1)

Publication Number Publication Date
CN110602696A true CN110602696A (en) 2019-12-20

Family

ID=68851819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911042689.3A Pending CN110602696A (en) 2019-10-30 2019-10-30 Conversation privacy protection method and electronic equipment

Country Status (1)

Country Link
CN (1) CN110602696A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930339A (en) * 2020-08-19 2020-11-13 Oppo广东移动通信有限公司 Device control method, device, storage medium and electronic device
WO2021184920A1 (en) * 2020-03-20 2021-09-23 华为技术有限公司 Method and apparatus for masking sound, and terminal device
CN113438367A (en) * 2021-06-23 2021-09-24 中国第一汽车股份有限公司 Call control method, device, medium and electronic equipment based on vehicle system
CN113660658A (en) * 2021-08-03 2021-11-16 西安万像电子科技有限公司 Audio data protection method and device and voice equipment
CN113993036A (en) * 2021-10-19 2022-01-28 广州番禺巨大汽车音响设备有限公司 High-definition-mode-based control method and device for sound equipment with HDMI ARC function
CN115086477A (en) * 2022-06-02 2022-09-20 Oppo广东移动通信有限公司 Control method and device, electronic equipment, conversation system and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101350A (en) * 2016-05-31 2016-11-09 维沃移动通信有限公司 A kind of mobile terminal and call method thereof
CN106911864A (en) * 2017-04-26 2017-06-30 维沃移动通信有限公司 A kind of speech playing method and mobile terminal
CN107566656A (en) * 2017-09-29 2018-01-09 努比亚技术有限公司 Mobile terminal guard method, mobile terminal and computer-readable recording medium
CN109065058A (en) * 2018-09-30 2018-12-21 合肥鑫晟光电科技有限公司 Voice communication method, apparatus and system
CN110290262A (en) * 2019-06-14 2019-09-27 华为技术有限公司 A kind of call method and terminal device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101350A (en) * 2016-05-31 2016-11-09 维沃移动通信有限公司 A kind of mobile terminal and call method thereof
CN106911864A (en) * 2017-04-26 2017-06-30 维沃移动通信有限公司 A kind of speech playing method and mobile terminal
CN107566656A (en) * 2017-09-29 2018-01-09 努比亚技术有限公司 Mobile terminal guard method, mobile terminal and computer-readable recording medium
CN109065058A (en) * 2018-09-30 2018-12-21 合肥鑫晟光电科技有限公司 Voice communication method, apparatus and system
CN110290262A (en) * 2019-06-14 2019-09-27 华为技术有限公司 A kind of call method and terminal device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021184920A1 (en) * 2020-03-20 2021-09-23 华为技术有限公司 Method and apparatus for masking sound, and terminal device
CN111930339A (en) * 2020-08-19 2020-11-13 Oppo广东移动通信有限公司 Device control method, device, storage medium and electronic device
CN111930339B (en) * 2020-08-19 2024-04-12 Oppo广东移动通信有限公司 Equipment control method and device, storage medium and electronic equipment
CN113438367A (en) * 2021-06-23 2021-09-24 中国第一汽车股份有限公司 Call control method, device, medium and electronic equipment based on vehicle system
CN113660658A (en) * 2021-08-03 2021-11-16 西安万像电子科技有限公司 Audio data protection method and device and voice equipment
CN113993036A (en) * 2021-10-19 2022-01-28 广州番禺巨大汽车音响设备有限公司 High-definition-mode-based control method and device for sound equipment with HDMI ARC function
CN113993036B (en) * 2021-10-19 2023-05-05 广州番禺巨大汽车音响设备有限公司 Control method and device for sound equipment with HDMI ARC function based on high definition mode
CN115086477A (en) * 2022-06-02 2022-09-20 Oppo广东移动通信有限公司 Control method and device, electronic equipment, conversation system and readable storage medium
CN115086477B (en) * 2022-06-02 2024-05-03 Oppo广东移动通信有限公司 Control method and device, electronic equipment, communication system and readable storage medium

Similar Documents

Publication Publication Date Title
CN110602696A (en) Conversation privacy protection method and electronic equipment
CN108874357B (en) Prompting method and mobile terminal
EP4109863A1 (en) Method and apparatus for masking sound, and terminal device
CN109215683B (en) Prompting method and terminal
CN110012143B (en) Telephone receiver control method and terminal
CN109639863B (en) Voice processing method and device
CN107785027B (en) Audio processing method and electronic equipment
CN109981904B (en) Volume control method and terminal equipment
CN111083297A (en) Echo cancellation method and electronic equipment
CN111182118B (en) Volume adjusting method and electronic equipment
CN108848267B (en) Audio playing method and mobile terminal
CN111459447B (en) Volume adjustment display method and electronic equipment
CN111093137B (en) Volume control method, volume control equipment and computer readable storage medium
CN111107223B (en) Message processing method and electronic equipment
CN109873894B (en) Volume adjusting method and mobile terminal
CN109815679B (en) Authority management method and mobile terminal
CN111683171A (en) Audio output method and electronic equipment
CN108093119B (en) Strange incoming call number marking method and mobile terminal
CN108307048B (en) Message output method and device and mobile terminal
CN108307075B (en) Incoming call processing method and mobile terminal
CN110545351B (en) Incoming call processing method, electronic equipment and computer readable storage medium
CN109561214B (en) Call processing method and mobile terminal
CN109639905B (en) Incoming call reminding method, mobile terminal and computer readable storage medium
CN109451143B (en) Call method and mobile terminal
CN109348366B (en) Method for adjusting volume by using electrical parameters and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191220