Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice shielding method, voice shielding device and terminal

A shielding device and voice technology, which is applied in the field of voice shielding devices and voice shielding, can solve problems such as excessive volume and leakage of voice information, and achieve the effects of avoiding leakage, improving concealment and safety

Inactive Publication Date: 2016-06-01
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, if the volume at the voice generating end is too loud, other people around will be able to hear it, causing voice information leakage; another example, when answering a call, the volume of the earpiece at the voice receiving end is too loud, and other people around can hear it. , resulting in voice information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice shielding method, voice shielding device and terminal
  • Voice shielding method, voice shielding device and terminal
  • Voice shielding method, voice shielding device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0034] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0035] figure 1 A flow chart of a voice masking method according to an embodiment of the present invention is shown.

[0036] Such as figure 1 As shown, the voice masking method according to an em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voice shielding method, a voice shielding device and a terminal. The voice shielding method comprises following steps: carrying out timbre analysis to call voices by using a timbre analysis model in a call process, wherein the call voices are collected at a voice output end and / or a voice receiving end, thus determining user fundamental tones in the call voices; superposing reverse waveforms of the user fundamental tones onto the user fundamental tones in an external environment, thus shielding the spread of the user fundamental tones in the external environment. Through the technical solution of the invention, the user fundamental tones are shielded; the user fundamental tones are prevented from being leaked through environment spread such as air at the voice generation end and / or the voice receiving end; and the call stealthiness and security can be promoted.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a voice shielding method, a voice shielding device and a terminal. Background technique [0002] At present, the secrecy of the voice call in the related art is only to encrypt and decrypt the voice communication process, but no security measures are taken for the voice generating end and the voice receiving end. For example, if the volume at the voice generating end is too loud, other people around will be able to hear it, causing voice information leakage; another example, when answering a call, the volume of the earpiece at the voice receiving end is too loud, and other people around can hear it. , resulting in voice information leakage. [0003] Therefore, a new technical solution is needed, which can prevent the leakage of voice information at the voice generating end and the voice receiving end, so as to improve the concealment and security of the call. Content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/42G10L15/00G10L25/51H04K1/00H04M1/725
CPCG10L21/02H04M1/725
Inventor 沈小刚杨中云徐超
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products