Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent voice product privacy invasion detection method based on energy consumption

A technology of intelligent voice and detection method, which is applied in voice analysis, instrumentation, electrical digital data processing, etc.

Pending Publication Date: 2021-08-20
VKAN CERTIFICATION & TESTING +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Aiming at the current lack of means and methods for the detection of personal privacy violations by smart voice products, the present invention aims to provide an effective detection method for personal privacy violations, so as to improve consumers' confidence in smart voice products and fill the gap There is a gap in the industry in this area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent voice product privacy invasion detection method based on energy consumption
  • Intelligent voice product privacy invasion detection method based on energy consumption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Taking Tmall Elf Cube 2 as an example, the method for detecting privacy violations of intelligent voice products based on energy consumption of the present invention will be further described in detail.

[0027] Step (1): Connect the smart voice product (DUT) to be tested, that is, Tmall Genie Fangtang 2, to the energy consumption detection device, manually control it to work in each state, record the energy consumption map in each state, Especially the standby state, recording state, network transmission state and the coexistence of two or more of them.

[0028] Specifically, such as turning off other alarm clocks and device pairing functions of Tmall Elf Cube 2, connecting the power supply part to the energy detection device, recording the spectrum in the standby state, the spectrum in the recording state, recording and uploading the state after successful wake-up Maps, etc., if their map numbers are G1, G2, G3, etc. respectively. The standby state here refers to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent voice product privacy invasion detection method based on energy consumption. The method comprises the following steps: 1) acquiring an energy consumption map of an intelligent voice product to be detected in each working state; 2) analyzing the requirements of voice recording and voice uploading of each function of the intelligent voice product to be detected, and defining the privacy invading working state of the intelligent voice product to be detected; 3) matching the working state in the step (2) with the energy consumption map in the step (1) to obtain an energy consumption map corresponding to the privacy invading working state; and 4) defining and setting the state of the intelligent voice product to be detected according to the step 2), detecting the energy consumption map of the intelligent voice product to be detected in the preset time, and when the energy consumption map (called invading map hereinafter) corresponding to the privacy invading working state in the step 3) appears, , considering that the intelligent voice product to be detected has the privacy invading behavior. According to the method, the blank in the aspect of privacy invasion detection of the intelligent voice product is filled.

Description

technical field [0001] The invention belongs to the field of personal information protection, and in particular relates to a method for detecting privacy violations of intelligent voice products. Background technique [0002] The intelligent voice product referred to in the present invention is a hardware product that has voice recording function and can be used in a network. Smart voice products can free hands and bring comfort and convenience. At the same time, consumers are increasingly worried about privacy violations such as "stealing recordings" and "stealing uploads" by smart voice products. [0003] For privacy protection, there are GDRP and CCPA in the world, and GB / T 35273-2020 in China. GDPR (General Data Protection Regulation, General Data Protection Regulation) is a regulation of data protection and privacy for all EU individuals in EU law, involving the export of personal data outside Europe, and the main goal is to retrieve personal control of personal data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L25/78G10L25/51G06F21/62
CPCG06F21/6245G10L25/51G10L25/78
Inventor 孔睿迅孙杰英张明珠黄伟彬吴凤萍许蕴盈庄伟玮
Owner VKAN CERTIFICATION & TESTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products