CN112287691B - Conference recording method and related equipment - Google Patents

Conference recording method and related equipment Download PDF

Info

Publication number
CN112287691B
CN112287691B CN202011247871.5A CN202011247871A CN112287691B CN 112287691 B CN112287691 B CN 112287691B CN 202011247871 A CN202011247871 A CN 202011247871A CN 112287691 B CN112287691 B CN 112287691B
Authority
CN
China
Prior art keywords
application
information
audio information
secret
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011247871.5A
Other languages
Chinese (zh)
Other versions
CN112287691A (en
Inventor
侯怀德
戈东
吴岩
潘乐扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202011247871.5A priority Critical patent/CN112287691B/en
Publication of CN112287691A publication Critical patent/CN112287691A/en
Application granted granted Critical
Publication of CN112287691B publication Critical patent/CN112287691B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a conference recording method and related equipment, which are applied to electronic equipment, wherein the method comprises the following steps: under the condition that a first instruction is received, a first application is started, wherein the first instruction is used for indicating to start the first application to conduct conference recording; analyzing first audio information recorded currently by the first application by adopting a second application, and determining secret information in the first audio information; and deleting the secret information by adopting the second application. By adopting the embodiment of the application, secret information leakage can be avoided.

Description

Conference recording method and related equipment
Technical Field
The application relates to the technical field of electronics, in particular to a conference recording method and related equipment.
Background
Meetings are an efficient form of organization for people to communicate and discuss information for some unified purposes. In the process of meeting, meeting participants usually record the meeting content in a recording mode so as to facilitate later deeper understanding of the meeting content. However, when the participants participate in the conference requiring information confidentiality, if the participants record the confidential information in the conference, information leakage is caused, and irrecoverable loss is caused to the conference sponsor.
Disclosure of Invention
The embodiment of the application provides a conference recording method and related equipment, which are beneficial to avoiding conference secret information leakage.
In a first aspect, an embodiment of the present application provides a conference recording method, applied to an electronic device, where the method includes:
under the condition that a first instruction is received, a first application is started, wherein the first instruction is used for indicating to start the first application to conduct conference recording;
analyzing first audio information recorded currently by the first application by adopting a second application, and determining secret information in the first audio information;
and deleting the secret information by adopting the second application.
In a second aspect, an embodiment of the present application provides a conference recording apparatus, including:
the starting unit is used for starting a first application under the condition of receiving a first instruction, and the first instruction is used for indicating to start the first application to record a conference;
the determining unit is used for analyzing the first audio information recorded by the first application currently by adopting the second application, and determining secret information in the first audio information;
and the deleting unit is used for deleting the secret information by adopting the second application.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, the programs including instructions for performing steps in the method described in the first aspect of the embodiment of the present application.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program causes a computer to perform some or all of the steps described in the method according to the first aspect of the embodiments of the present application.
In a fifth aspect, embodiments of the present application provide a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program, the computer program being operable to cause a computer to perform some or all of the steps described in the method according to the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that in the embodiment of the present application, the electronic device first starts a first application when receiving a first instruction, where the first instruction is used to instruct to start the first application to record a conference, then uses a second application to analyze first audio information currently recorded by the first application, determines secret information in the first audio information, and finally uses the second application to delete the secret information. Since the second application is used to delete the secret information after determining that the currently recorded first audio information includes the secret information, the secret information is prevented from being revealed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a conference recording method provided in an embodiment of the present application;
fig. 3 is a schematic structural diagram of another electronic device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a conference recording device according to an embodiment of the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
The following will describe in detail.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims of this application and in the drawings, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In the following, some terms in the present application are explained for easy understanding by those skilled in the art.
The electronic device may include various handheld devices, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to a wireless modem, as well as various forms of User Equipment (UE), mobile Station (MS), terminal devices (terminal devices), etc.
As shown in fig. 1, fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device includes a processor, memory, signal processor, transceiver, display screen, speaker, communication interface, random access memory (Random Access Memory, RAM), camera, sensor, and the like. The device comprises a memory, a signal processor, a display screen, a loudspeaker, a RAM, a camera, a sensor and a communication interface, wherein the memory, the signal processor, the display screen, the loudspeaker, the RAM, the camera, the sensor and the communication interface are connected with the processor, and the transceiver is connected with the signal processor.
The display screen may be a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), an Active Matrix Organic Light-Emitting Diode panel (AMOLED), or the like.
The camera may be a common camera, may be an infrared camera, or may be an intelligent camera, which is not limited herein. The camera may be a front camera or a rear camera, which is not limited herein.
Wherein the sensor comprises at least one of: light sensing sensors, gyroscopes, infrared proximity sensors, fingerprint sensors, pressure sensors, etc. Wherein a light sensor, also called ambient light sensor, is used to detect the ambient light level. The light sensor may comprise a photosensitive element and an analog-to-digital converter. The photosensitive element is used for converting the collected optical signals into electric signals, and the analog-to-digital converter is used for converting the electric signals into digital signals. Optionally, the optical sensor may further include a signal amplifier, where the signal amplifier may amplify the electrical signal converted by the photosensitive element and output the amplified electrical signal to the analog-to-digital converter. The photosensitive element may include at least one of a photodiode, a phototransistor, a photoresistor, and a silicon photocell.
The processor is a control center of the electronic device, and is connected with various parts of the whole electronic device by various interfaces and lines, and executes various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory and calling data stored in the memory, so that the electronic device is monitored as a whole.
The processor may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, applications, etc., and the modem processor primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor.
The memory is used for storing software programs and/or modules, and the processor executes the software programs and/or modules stored in the memory so as to execute various functional applications of the electronic device and data processing. The memory may mainly include a memory program area and a memory data area, wherein the memory program area may store an operating system, a software program required for at least one function, and the like; the storage data area may store data created according to the use of the electronic device, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The embodiments of the present application are described in detail below.
As shown in fig. 2, a flow chart of a conference recording method provided in an embodiment of the present application is applied to the above electronic device, and specifically includes the following steps:
step 201: and under the condition that a first instruction is received, starting a first application, wherein the first instruction is used for indicating to start the first application to conduct conference recording.
The first instruction may be a click instruction or a voice instruction.
The first application is a downloaded application or an application configured in the electronic device.
In one possible implementation, before receiving the first instruction, the preset two-dimensional code is scanned to download the second application, and the second application is started after the second application is downloaded.
Wherein the electronic device grants the second application the ability to monitor and control other applications, so that the second application can manage the electronic device.
Wherein the second application may be guest application software for controlling the behaviour of the person attending the conference.
The preset two-dimensional code is made by a sponsor of the conference.
Step 202: and analyzing the first audio information currently recorded by the first application by adopting a second application, and determining secret information in the first audio information.
Wherein the secret information may include a plurality of pieces of important information, each piece of important information having a different semantic meaning.
In one possible implementation manner, first, semantic analysis is performed on the first audio information by using a second application, N pieces of second audio information and the occurrence number of each piece of second audio information are obtained from the first audio information, and then, the second audio information with the occurrence number greater than or equal to the preset number in the N pieces of second audio information is determined to be secret information. It can be understood that the semantics of each piece of second audio information in the N pieces of second audio information are different, and the duration corresponding to each piece of second audio information may be the same or different, and the confidential information may have one piece or a plurality of pieces, and the semantics of each piece of confidential information are different.
For example, after the first audio is semantically analyzed, 3 pieces of second audio information (Y1, Y2, and Y3) are determined, wherein the number of occurrences of Y1 is 5, the number of occurrences of Y2 is 2, the number of occurrences of Y3 is 7, and the preset number of occurrences is 3, and the secret information is Y1 and Y3.
The second audio information may be a sentence audio, a word audio, a paragraph audio, or the like.
In one possible implementation manner, the second application may also monitor videos and/or photos shot by the electronic device, identify characters and/or pictures in the shot videos and/or photos, determine M pieces of information and the occurrence times of each piece of information, make the semantics of each piece of information different, and delete video clips and/or photos where the information with the occurrence times greater than or equal to the preset times is located.
Because the secret information is often important information, the important information needs to be emphasized or explained for many times, the electronic equipment determines the secret information through the occurrence times of each piece of second audio information, and the effectiveness of determining the secret information is improved.
In a possible implementation manner, the storage area associated with the second application includes preset important meeting information, so that semantic analysis can be performed on the first audio information by using the second application based on the preset important meeting information, and secret information is determined in the first audio information, where the semantic of the secret information is the same as that of the preset important meeting information.
The preset important meeting information is the important information of the current meeting and is determined by the meeting holder.
Wherein the secret information may be a plurality of pieces of information in the first audio information.
The confidential information is determined by presetting the important conference information, so that the accuracy of determining the confidential information is improved.
In one possible implementation, the second application may first be used to obtain the note information from the note-like application (e.g., memo, note-like, impression note, etc.), and then semantic analysis is performed on the first audio information based on the note information to determine the secret information, where the note information includes first information having the same semantic meaning as the secret information. It is to be appreciated that the note information may be meeting related information (e.g., meeting profile, meeting emphasis, meeting procedure, etc.) recorded in the electronic device prior to the meeting of the attendees, and thus the first information may be part of the note information or may be all of the note information.
Alternatively, the secret information may be determined by at least one of the above possible implementations.
Step 203: and deleting the secret information by adopting the second application.
It can be seen that in the embodiment of the present application, the electronic device first starts a first application when receiving a first instruction, where the first instruction is used to instruct to start the first application to record a conference, then uses a second application to analyze first audio information currently recorded by the first application, determines secret information in the first audio information, and finally uses the second application to delete the secret information. Since the second application is used to make the secret information clear after determining that the currently recorded first audio information includes the secret information, the leakage of the secret information is avoided.
In an implementation manner of the present application, after the deleting the secret information with the second application, the method further includes:
displaying first warning information, wherein the first warning information is used for indicating that the secret information is deleted, and the first warning information is generated by the second application;
and in a first period, if the second application detects the secret information in the third audio information recorded by the first application, closing the first application by the second application, wherein the starting time of the first period is the time for displaying the first warning information.
The first warning information may be "secret information is deleted", or "secret information is deleted, and recording is not performed any more", or other warning information.
After the electronic device displays the warning information, the second application continuously performs semantic analysis on the audio information recorded by the first application, and if the audio information is recorded again to the secret information, the first application is forcedly closed.
Optionally, after the electronic device displays the alert information, if the number of times of detecting the secret information in the second period is greater than the specified number of times, the electronic device sends a prompt message to the target device through the target device address stored in the storage area associated with the second application, so as to prompt the electronic device to monitor the secret information for multiple times, the starting time of the second period is the time of displaying the first alert information, and the duration of the second period is preset.
And under the condition that the electronic equipment detects the secret information again, closing the first application, so that the problem of secret information leakage is solved.
In an implementation manner of the present application, after the deleting the secret information with the second application, the method further includes:
and under the condition that a second instruction is received, displaying second warning information, wherein the first instruction is used for indicating to delete the second application, and the second warning information is used for warning to delete the second application and synchronously deleting the first audio information.
The second instruction may be a click instruction or a voice instruction.
Wherein the second alert information may be generated by the second application.
It can be seen that the second warning information is displayed under the condition that the second instruction is received, which is favorable for improving the security of the secret information.
Referring to fig. 3, in accordance with the embodiment shown in fig. 2, fig. 3 is a schematic structural diagram of another electronic device provided in the embodiment of the present application, as shown in the fig. 3, the electronic device includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the programs include instructions for executing the following steps:
under the condition that a first instruction is received, a first application is started, wherein the first instruction is used for indicating to start the first application to conduct conference recording;
analyzing first audio information recorded currently by the first application by adopting a second application, and determining secret information in the first audio information;
and deleting the secret information by adopting the second application.
In an implementation of the present application, before receiving the first instruction, the program includes instructions for further performing the steps of:
scanning a preset two-dimensional code to download the second application;
and after the second application is downloaded, starting the second application.
In one implementation of the present application, in analyzing, with a second application, first audio information currently recorded by the first application, and determining secret information in the first audio information, the program includes instructions for performing the following steps:
carrying out semantic analysis on the first audio information by adopting the second application, and determining N pieces of second audio information and the occurrence times of each piece of second audio information, wherein the N pieces of second audio information correspond to N kinds of semantics, the N pieces of second audio information correspond to the N kinds of semantics one by one, and the first audio information comprises the N pieces of second audio information;
and determining target audio information in the N pieces of second audio information based on the occurrence times of each piece of second audio information, and determining the target audio information as secret information, wherein the occurrence times of the target audio information are larger than or equal to preset times.
In an implementation manner of the present application, the second application carries preset important meeting information;
in analyzing first audio information currently recorded by the first application by using a second application, determining secret information in the first audio information, the program comprises instructions for executing the following steps:
and carrying out semantic analysis on the first audio information by adopting the second application based on preset important meeting information, and determining secret information in the first audio information, wherein the semantic meaning of the preset important meeting information is the same as that of the secret information.
In one implementation of the present application, in analyzing, with a second application, first audio information currently recorded by the first application, and determining secret information in the first audio information, the program includes instructions for performing the following steps:
acquiring note information from a third foreground application of the electronic equipment by adopting the second application, wherein the third foreground application is a note application;
and carrying out semantic analysis on the first audio information by adopting the second application based on the note information, and determining secret information in the first audio information, wherein the semantic meaning of the note information is the same as that of the secret information.
In an implementation manner of the present application, after the second application is used to delete the secret information, the program includes instructions for performing the following steps:
displaying first warning information, wherein the first warning information is used for indicating that the secret information is deleted, and the first warning information is generated by the second application;
and in a first period, if the second application detects the secret information in the third audio information recorded by the first application, closing the first application, wherein the starting time of the first period is the time of displaying the first warning information.
In an implementation manner of the present application, after the second application is used to delete the secret information, the program includes instructions for performing the following steps:
and under the condition that a second instruction is received, displaying second warning information, wherein the first instruction is used for indicating to delete the second application, and the second warning information is used for warning to delete the second application and synchronously deleting the first audio information.
It should be noted that, the specific implementation process of this embodiment may refer to the specific implementation process described in the foregoing method embodiment, which is not described herein.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a conference recording apparatus, which is applied to an electronic device and includes:
an opening unit 401, configured to open a first application when a first instruction is received, where the first instruction is used to instruct to open the first application to perform conference recording;
a determining unit 402, configured to analyze, with a second application, first audio information currently recorded by the first application, and determine secret information in the first audio information;
and the deleting unit 403 is configured to delete the secret information by using the second application.
In an implementation manner of the present application, before receiving the first instruction, the opening unit 401 is further configured to:
scanning a preset two-dimensional code to download the second application;
and after the second application is downloaded, starting the second application.
In an implementation manner of the present application, in analyzing, by using a second application, first audio information currently recorded by the first application, and determining secret information in the first audio information, the determining unit 402 is configured to:
carrying out semantic analysis on the first audio information by adopting the second application, and determining N pieces of second audio information and the occurrence times of each piece of second audio information, wherein the N pieces of second audio information correspond to N kinds of semantics, the N pieces of second audio information correspond to the N kinds of semantics one by one, and the first audio information comprises the N pieces of second audio information;
and determining target audio information in the N pieces of second audio information based on the occurrence times of each piece of second audio information, and determining the target audio information as secret information, wherein the occurrence times of the target audio information are larger than or equal to preset times.
In an implementation manner of the application, the storage area associated with the second application includes preset important meeting information;
in analyzing the first audio information currently recorded by the first application by using the second application, determining secret information in the first audio information, the determining unit 402 is configured to:
and carrying out semantic analysis on the first audio information by adopting the second application based on preset important meeting information, and determining secret information in the first audio information, wherein the semantic meaning of the preset important meeting information is the same as that of the secret information.
In an implementation manner of the present application, in analyzing, by using a second application, first audio information currently recorded by the first application, and determining secret information in the first audio information, the determining unit 402 is configured to:
acquiring note information from a third foreground application of the electronic equipment by adopting the second application, wherein the third foreground application is a note application;
and carrying out semantic analysis on the first audio information by adopting the second application based on the note information, and determining secret information in the first audio information, wherein the semantic meaning of the first information included in the note information is the same as that of the secret information.
In a possible implementation, the conference recording device further includes a display unit 404.
In an implementation manner of the present application, after the second application is used to delete the secret information, the display unit 404 is configured to:
displaying first warning information, wherein the first warning information is used for indicating that the secret information is deleted, and the first warning information is generated by the second application;
the deleting unit 403 is further configured to:
and in a first period, if the second application detects the secret information in the third audio information recorded by the first application, closing the first application by the second application, wherein the starting time of the first period is the time for displaying the first warning information.
In an implementation manner of the present application, after the second application is used to delete the secret information, the display unit 404 is configured to:
and under the condition that a second instruction is received, displaying second warning information, wherein the first instruction is used for indicating to delete the second application, and the second warning information is used for warning to delete the second application and synchronously deleting the first audio information.
Note that, the opening unit 401, the determining unit 402, the deleting unit 403, and the display unit 404 may be implemented by a processor, and the display unit 404 may be implemented by a display screen.
The present application also provides a computer storage medium storing a computer program that is executed by a processor to implement some or all of the steps of any one of the conference recording methods described in the method embodiments above.
Embodiments of the present application also provide a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps described by an electronic device in the above method. The computer program product may be a software installation package.
The steps of a method or algorithm described in the embodiments of the present application may be implemented in hardware, or may be implemented by executing software instructions by a processor. The software instructions may be comprised of corresponding software modules that may be stored in random access Memory (Random Access Memory, RAM), flash Memory, read Only Memory (ROM), erasable programmable Read Only Memory (Erasable Programmable ROM), electrically Erasable Programmable Read Only Memory (EEPROM), registers, hard disk, a removable disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. In addition, the ASIC may reside in an access network device, a target network device, or a core network device. It is of course also possible that the processor and the storage medium reside as discrete components in an access network device, a target network device, or a core network device.
Those of skill in the art will appreciate that in one or more of the above examples, the functions described in the embodiments of the present application may be implemented, in whole or in part, in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a digital video disc (Digital Video Disc, DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
The foregoing embodiments have been provided for the purpose of illustrating the embodiments of the present application in further detail, and it should be understood that the foregoing embodiments are merely illustrative of the embodiments of the present application and are not intended to limit the scope of the embodiments of the present application, and any modifications, equivalents, improvements, etc. made on the basis of the technical solutions of the embodiments of the present application are included in the scope of the embodiments of the present application.

Claims (8)

1. A conference recording method, applied to an electronic device, comprising:
under the condition that a first instruction is received, a first application is started, wherein the first instruction is used for indicating to start the first application to conduct conference recording;
performing semantic analysis on first audio information currently recorded by the first application by adopting a second application, and determining N pieces of second audio information and the occurrence times of each piece of second audio information, wherein the N pieces of second audio information correspond to N kinds of semantics, the N pieces of second audio information correspond to the N kinds of semantics one by one, and the first audio information comprises the N pieces of second audio information; determining target audio information in the N pieces of second audio information based on the occurrence times of each piece of second audio information, and determining the target audio information as secret information, wherein the occurrence times of the target audio information are greater than or equal to preset times;
deleting the secret information by adopting the second application;
displaying first warning information, wherein the first warning information is used for indicating that the secret information is deleted, and the first warning information is generated by the second application; and in a first period, if the second application detects the secret information in the third audio information recorded by the first application, closing the first application by the second application, wherein the starting time of the first period is the time for displaying the first warning information.
2. The method of claim 1, wherein prior to receiving the first instruction, the method further comprises:
scanning a preset two-dimensional code to download the second application;
and after the second application is downloaded, starting the second application.
3. The method of claim 2, wherein the second application-associated storage area includes preset important meeting information;
the step of adopting a second application to analyze the first audio information currently recorded by the first application, and determining secret information in the first audio information comprises the following steps:
and carrying out semantic analysis on the first audio information by adopting the second application based on preset important meeting information, and determining secret information in the first audio information, wherein the semantic meaning of the preset important meeting information is the same as that of the secret information.
4. The method of claim 2, wherein the analyzing, with the second application, the first audio information currently recorded by the first application, and determining secret information in the first audio information, comprises:
acquiring note information from a third foreground application of the electronic equipment by adopting the second application, wherein the third foreground application is a note application;
and carrying out semantic analysis on the first audio information by adopting the second application based on the note information, and determining secret information in the first audio information, wherein the semantic meaning of the first information included in the note information is the same as that of the secret information.
5. The method of claim 3 or 4, wherein after the deleting the secret information with the second application, the method further comprises:
and under the condition that a second instruction is received, displaying second warning information, wherein the first instruction is used for indicating to delete the second application, and the second warning information is used for warning to delete the second application and synchronously deleting the first audio information.
6. A conference recording device, characterized by being applied to an electronic apparatus, the device comprising:
the starting unit is used for starting a first application under the condition of receiving a first instruction, and the first instruction is used for indicating to start the first application to record a conference;
the determining unit is used for carrying out semantic analysis on first audio information recorded currently by the first application by adopting a second application, determining N pieces of second audio information and the occurrence times of each piece of second audio information, wherein the N pieces of second audio information correspond to N kinds of semantics, the N pieces of second audio information correspond to the N kinds of semantics one by one, and the first audio information comprises the N pieces of second audio information; determining target audio information in the N pieces of second audio information based on the occurrence times of each piece of second audio information, and determining the target audio information as secret information, wherein the occurrence times of the target audio information are greater than or equal to preset times;
a deleting unit, configured to delete the secret information by using the second application;
the display unit is used for displaying first warning information, the first warning information is used for indicating that the secret information is deleted, and the first warning information is generated by the second application; and in a first period, if the second application detects the secret information in the third audio information recorded by the first application, closing the first application by the second application, wherein the starting time of the first period is the time for displaying the first warning information.
7. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-5.
8. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, wherein the computer program is processed to perform the method according to any of claims 1-5.
CN202011247871.5A 2020-11-10 2020-11-10 Conference recording method and related equipment Active CN112287691B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011247871.5A CN112287691B (en) 2020-11-10 2020-11-10 Conference recording method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011247871.5A CN112287691B (en) 2020-11-10 2020-11-10 Conference recording method and related equipment

Publications (2)

Publication Number Publication Date
CN112287691A CN112287691A (en) 2021-01-29
CN112287691B true CN112287691B (en) 2024-02-13

Family

ID=74351971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011247871.5A Active CN112287691B (en) 2020-11-10 2020-11-10 Conference recording method and related equipment

Country Status (1)

Country Link
CN (1) CN112287691B (en)

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103918247A (en) * 2011-09-23 2014-07-09 数字标记公司 Context-based smartphone sensor logic
CN105653975A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 APP (Application) operation control method and device
CN106294796A (en) * 2010-02-18 2017-01-04 株式会社尼康 Information processor, mancarried device and information processing system
CN106412346A (en) * 2016-10-31 2017-02-15 努比亚技术有限公司 Speech communication method and device
CN106933465A (en) * 2015-12-31 2017-07-07 北京三星通信技术研究有限公司 A kind of content display method and intelligence desktop terminal based on intelligence desktop
CN107147803A (en) * 2017-06-21 2017-09-08 努比亚技术有限公司 A kind of way of recording, terminal device and computer-readable recording medium
CN108062469A (en) * 2017-12-20 2018-05-22 卢金梁 Application program launching method in mobile phone
CN108121914A (en) * 2018-01-17 2018-06-05 四川神琥科技有限公司 A kind of document, which is divulged a secret, protects tracing system
CN108256513A (en) * 2018-03-23 2018-07-06 中国科学院长春光学精密机械与物理研究所 A kind of intelligent video analysis method and intelligent video record system
CN108292203A (en) * 2015-12-23 2018-07-17 苹果公司 Active assistance based on equipment room conversational communication
CN108540469A (en) * 2018-03-30 2018-09-14 联想(北京)有限公司 Method of speech processing and electronic equipment
CN109727601A (en) * 2018-12-24 2019-05-07 联想(北京)有限公司 A kind of information processing method and device
CN109819128A (en) * 2019-01-23 2019-05-28 平安科技(深圳)有限公司 A kind of quality detecting method and device of telephonograph
CN109830248A (en) * 2018-12-14 2019-05-31 维沃移动通信有限公司 A kind of audio recording method and terminal device
CN110059207A (en) * 2019-04-04 2019-07-26 Oppo广东移动通信有限公司 Processing method, device, storage medium and the electronic equipment of image information
CN110177074A (en) * 2019-04-10 2019-08-27 华为技术有限公司 A kind of sending method and electronic equipment of conversation message
CN110322872A (en) * 2019-06-05 2019-10-11 平安科技(深圳)有限公司 Conference voice data processing method, device, computer equipment and storage medium
CN110347862A (en) * 2019-06-24 2019-10-18 歌尔股份有限公司 Recording processing method, device, equipment, system and audio frequency apparatus
CN110534113A (en) * 2019-08-26 2019-12-03 深圳追一科技有限公司 Audio data desensitization method, device, equipment and storage medium
CN110768894A (en) * 2019-09-02 2020-02-07 上海掌门科技有限公司 Method and equipment for deleting session message
CN110853615A (en) * 2019-11-13 2020-02-28 北京欧珀通信有限公司 Data processing method, device and storage medium
CN110858492A (en) * 2018-08-23 2020-03-03 阿里巴巴集团控股有限公司 Audio editing method, device, equipment and system and data processing method
CN110992957A (en) * 2019-11-15 2020-04-10 东华大学 Voice data processing method based on privacy protection
CN111131189A (en) * 2019-12-09 2020-05-08 维沃移动通信有限公司 Data protection method and electronic equipment
CN111243590A (en) * 2020-01-17 2020-06-05 中国平安人寿保险股份有限公司 Conference record generation method and device
CN111258528A (en) * 2018-12-03 2020-06-09 华为技术有限公司 Voice user interface display method and conference terminal
CN111462785A (en) * 2020-04-03 2020-07-28 惠州Tcl移动通信有限公司 Recording control method, recording control device, storage medium and mobile terminal
CN111756930A (en) * 2020-06-28 2020-10-09 维沃移动通信有限公司 Communication control method, communication control device, electronic apparatus, and readable storage medium
CN111784971A (en) * 2019-04-04 2020-10-16 北京地平线机器人技术研发有限公司 Alarm processing method and system, computer readable storage medium and electronic device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080221882A1 (en) * 2007-03-06 2008-09-11 Bundock Donald S System for excluding unwanted data from a voice recording
US20200143821A1 (en) * 2018-11-05 2020-05-07 International Business Machines Corporation Protecting sensitive information on stored audio recordings

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106294796A (en) * 2010-02-18 2017-01-04 株式会社尼康 Information processor, mancarried device and information processing system
CN103918247A (en) * 2011-09-23 2014-07-09 数字标记公司 Context-based smartphone sensor logic
CN108292203A (en) * 2015-12-23 2018-07-17 苹果公司 Active assistance based on equipment room conversational communication
CN105653975A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 APP (Application) operation control method and device
CN106933465A (en) * 2015-12-31 2017-07-07 北京三星通信技术研究有限公司 A kind of content display method and intelligence desktop terminal based on intelligence desktop
CN106412346A (en) * 2016-10-31 2017-02-15 努比亚技术有限公司 Speech communication method and device
CN107147803A (en) * 2017-06-21 2017-09-08 努比亚技术有限公司 A kind of way of recording, terminal device and computer-readable recording medium
CN108062469A (en) * 2017-12-20 2018-05-22 卢金梁 Application program launching method in mobile phone
CN108121914A (en) * 2018-01-17 2018-06-05 四川神琥科技有限公司 A kind of document, which is divulged a secret, protects tracing system
CN108256513A (en) * 2018-03-23 2018-07-06 中国科学院长春光学精密机械与物理研究所 A kind of intelligent video analysis method and intelligent video record system
CN108540469A (en) * 2018-03-30 2018-09-14 联想(北京)有限公司 Method of speech processing and electronic equipment
CN110858492A (en) * 2018-08-23 2020-03-03 阿里巴巴集团控股有限公司 Audio editing method, device, equipment and system and data processing method
CN111258528A (en) * 2018-12-03 2020-06-09 华为技术有限公司 Voice user interface display method and conference terminal
CN109830248A (en) * 2018-12-14 2019-05-31 维沃移动通信有限公司 A kind of audio recording method and terminal device
CN109727601A (en) * 2018-12-24 2019-05-07 联想(北京)有限公司 A kind of information processing method and device
CN109819128A (en) * 2019-01-23 2019-05-28 平安科技(深圳)有限公司 A kind of quality detecting method and device of telephonograph
CN110059207A (en) * 2019-04-04 2019-07-26 Oppo广东移动通信有限公司 Processing method, device, storage medium and the electronic equipment of image information
CN111784971A (en) * 2019-04-04 2020-10-16 北京地平线机器人技术研发有限公司 Alarm processing method and system, computer readable storage medium and electronic device
CN110177074A (en) * 2019-04-10 2019-08-27 华为技术有限公司 A kind of sending method and electronic equipment of conversation message
CN110322872A (en) * 2019-06-05 2019-10-11 平安科技(深圳)有限公司 Conference voice data processing method, device, computer equipment and storage medium
CN110347862A (en) * 2019-06-24 2019-10-18 歌尔股份有限公司 Recording processing method, device, equipment, system and audio frequency apparatus
CN110534113A (en) * 2019-08-26 2019-12-03 深圳追一科技有限公司 Audio data desensitization method, device, equipment and storage medium
CN110768894A (en) * 2019-09-02 2020-02-07 上海掌门科技有限公司 Method and equipment for deleting session message
CN110853615A (en) * 2019-11-13 2020-02-28 北京欧珀通信有限公司 Data processing method, device and storage medium
CN110992957A (en) * 2019-11-15 2020-04-10 东华大学 Voice data processing method based on privacy protection
CN111131189A (en) * 2019-12-09 2020-05-08 维沃移动通信有限公司 Data protection method and electronic equipment
CN111243590A (en) * 2020-01-17 2020-06-05 中国平安人寿保险股份有限公司 Conference record generation method and device
CN111462785A (en) * 2020-04-03 2020-07-28 惠州Tcl移动通信有限公司 Recording control method, recording control device, storage medium and mobile terminal
CN111756930A (en) * 2020-06-28 2020-10-09 维沃移动通信有限公司 Communication control method, communication control device, electronic apparatus, and readable storage medium

Also Published As

Publication number Publication date
CN112287691A (en) 2021-01-29

Similar Documents

Publication Publication Date Title
CN106970754B (en) Screen capture processing method and device
CN105845124B (en) Audio processing method and device
CN105095345B (en) The reminding method and device of PUSH message
US20170171321A1 (en) Methods and devices for managing accounts
CN110781813B (en) Image recognition method and device, electronic equipment and storage medium
CN106454392A (en) Live broadcast processing method, device and terminal
CN107239351B (en) Pasting method and device
CN106331328B (en) Information prompting method and device
CN105630780A (en) Webpage information processing method and apparatus
CN113259226A (en) Information synchronization method and device, electronic equipment and storage medium
CN107316207B (en) Method and device for acquiring display effect information
CN104199915B (en) Method and device for detecting webpage changes
EP3068097A1 (en) Method and device for filtering information
CN110213062B (en) Method and device for processing message
CN105227660A (en) A kind of based reminding method and device
CN112685269A (en) Data acquisition method and device, electronic equipment and storage medium
CN112433787A (en) Target object serialization method and device, electronic device and storage medium
CN112287691B (en) Conference recording method and related equipment
CN105824513A (en) Message processing method and apparatus
US20170201479A1 (en) Group message display method, device and medium
CN111131000B (en) Information transmission method, device, server and terminal
CN110941670B (en) Mark state detection method, device, equipment and storage medium
CN110502714B (en) Information detection method and device, electronic equipment and storage medium
CN111258877B (en) Method and device for detecting visible time of first screen page and electronic equipment
CN107526683B (en) Method and device for detecting functional redundancy of application program and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant