Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice interaction method, device, system and equipment for protecting privacy and storage medium

A technology for privacy protection and voice interaction, applied in voice analysis, transmission systems, electrical components, etc., can solve problems such as poor protection of user privacy, disclosure of privacy by drivers and passengers, and no protection for content information, etc. Risk, avoiding being leaked, and protecting privacy

Active Publication Date: 2021-10-01
ZEBRED NETWORK TECH CO LTD
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to avoid privacy leakage, the existing technology proposes a method of hiding acoustic features, such as removing the unique characteristics of the individual through the voice change process of the recorded voice information, but this method does not do anything to the content information expressed in the voice information. protection, so it does not protect the user's privacy well
[0005] In addition, in the existing technology, the car does not warn the drivers and passengers of privacy leaks, and it may be difficult for the drivers and passengers to realize when they have leaked their privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice interaction method, device, system and equipment for protecting privacy and storage medium
  • Voice interaction method, device, system and equipment for protecting privacy and storage medium
  • Voice interaction method, device, system and equipment for protecting privacy and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Reference manual attached figure 2 , which shows the flow of a privacy-preserving voice interaction method provided by an embodiment of the present invention, which can be applied to figure 1 In the implementation environment shown, specifically as figure 2 As shown, the method may include the following steps:

[0069] S210: The terminal acquires a voice signal input by the user.

[0070] In the embodiment of the present invention, the terminal may be provided with a voice collection module for collecting the voice input by the user to obtain the voice signal. Wherein, the voice collection module can be a sound sensor, a microphone, etc., and the voice signal can include information such as the user's voice characteristics and voice content, and the voice characteristics can include the user's voiceprint characteristics, age characteristics, gender characteristics, and health characteristics. Features, etc., the voice content may include instruction information iss...

Embodiment 2

[0133] Reference manual attached Figure 5 , which shows the flow of a privacy-preserving voice interaction method provided by another embodiment of the present invention, which can be applied to figure 1 In the cloud server 120 in, specifically as Figure 5 As shown, the method may include the following steps:

[0134] S510: Acquire an encrypted voice signal sent by the terminal, where the encrypted voice signal is obtained by the terminal encrypting a voice signal input by a user.

[0135] S520: Analyze the encrypted voice signal, and generate corresponding encrypted interaction data based on a result of the analysis.

[0136] Optionally, analyzing the encrypted voice signal, and generating corresponding encrypted interaction data based on a result of the analysis may include:

[0137] performing speech recognition on the encrypted speech signal to obtain corresponding encrypted speech text;

[0138] Performing semantic analysis on the encrypted speech text to obtain cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy-protecting voice interaction method, device, system and equipment and a storage medium. The method comprises the steps: acquiring, by a terminal, a voice signal input by a user; encrypting the voice signal to obtain an encrypted voice signal; sending the encrypted voice signal to a cloud server; analying, by the cloud server, the encrypted voice signal and generating the corresponding encrypted interaction data based on an analysis result; sending the encrypted interaction data to the terminal; decrpyting, by the terminal, the encrypted interaction data, and determining and executing a corresponding interaction operation. According to the voice interaction method, in the whole voice interaction process, the cloud server carries out analysis processing completely based on the encrypted information, the problem that personal information of the user is leaked is avoided, and the privacy of the user is effectively protected.

Description

technical field [0001] The present invention relates to the technical field of voice processing, in particular to a privacy-protecting voice interaction method, device, system, equipment and storage medium. Background technique [0002] With the advancement of artificial intelligence technology, human-computer voice interaction has also made great progress, and various voice assistant applications (Application, APP) and human-computer interaction robots are booming. In the automotive field, the full-duplex voice interaction mode has gradually emerged. The feature of the full-duplex voice interaction mode is that after one wake-up, multiple interactions can be performed within a certain period of time. [0003] In the full-duplex voice interaction mode, the entire car's intelligent system records the entire process, and understands and responds to the entire recording. The user's voice information recorded in this mode includes the user's voice characteristics, voice content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G10L25/48
CPCH04L63/0428G10L25/48
Inventor 蔡勇靳莹雪章乐蒋磊
Owner ZEBRED NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products