Securing audio data
First Claim
1. A method comprising:
- restricting, by a processing module in a device, access by a processor in the device to audio information detected by a microphone in the device;
receiving, by the processing module in the device, data from the processor in the device indicating that the processor in the device is authorized during a limited period of time to access audio information detected by the microphone in the device;
in response to receiving data indicating that the processor in the device is authorized during the limited period of time to access audio information detected by the microphone in the device, providing the processor in the device access to audio information detected by the microphone in the device;
monitoring, by the processing module in the device, audio information detected by the microphone in the device during the limited period of time for the presence of a hotword; and
after the end of the limited period of time, restricting, by the processing module in the device, access by the processor in the device to audio information detected by the microphone in the device.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for securing audio data. In one aspect, a method includes restricting access by the device to audio information detected by a microphone, receiving data indicating that the device is authorized to access audio information detected by the microphone during a limited period of time, and in response to receiving data indicating that the device is authorized to access audio information detected by the microphone during the limited period of time, providing audio information to the device. The method also includes monitoring audio information detected by the microphone during the limited period of time for the presence of a hotword and after the end of the limited period of time, restricting access by the device to audio information detected by the microphone.
-
Citations
20 Claims
-
1. A method comprising:
-
restricting, by a processing module in a device, access by a processor in the device to audio information detected by a microphone in the device; receiving, by the processing module in the device, data from the processor in the device indicating that the processor in the device is authorized during a limited period of time to access audio information detected by the microphone in the device; in response to receiving data indicating that the processor in the device is authorized during the limited period of time to access audio information detected by the microphone in the device, providing the processor in the device access to audio information detected by the microphone in the device; monitoring, by the processing module in the device, audio information detected by the microphone in the device during the limited period of time for the presence of a hotword; and after the end of the limited period of time, restricting, by the processing module in the device, access by the processor in the device to audio information detected by the microphone in the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 20)
-
-
10. A device, comprising:
-
a microphone; a processor that handles primary functions of the device; and a processing module configured to perform operations comprising; restricting, by a processing module in a device, access by a processor in the device to audio information detected by a microphone in the device; receiving, by the processing module in the device, data from the processor in the device indicating that the processor in the device is authorized during a limited period of time to access audio information detected by the microphone in the device; in response to receiving data indicating that the processor in the device is authorized during the limited period of time to access audio information detected by the microphone in the device, providing the processor in the device access to audio information detected by the microphone in the device; monitoring, by the processing module in the device, audio information detected by the microphone in the device during the limited period of time for the presence of a hotword; and after the end of the limited period of time, restricting, by the processing module in the device, access by the processor in the device to audio information detected by the microphone in the device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. One or more non-transitory computer-readable media storing software comprising instructions executable by one or more processors that, upon such execution, cause the one or more processors to perform operations comprising:
-
restricting, by a processing module in a device, access by a processor in the device to audio information detected by a microphone in the device; receiving, by the processing module in the device, data from the processor in the device indicating that the processor in the device is authorized during a limited period of time to access audio information detected by the microphone in the device; in response to receiving data indicating that the processor in the device is authorized during the limited period of time to access audio information detected by the microphone in the device, providing the processor in the device access to audio information detected by the microphone in the device; monitoring, by the processing module in the device, audio information detected by the microphone in the device during the limited period of time for the presence of a hotword; and after the end of the limited period of time, restricting, by the processing module in the device, access by the processor in the device to audio information detected by the microphone in the device.
-
Specification