H04M1/80

Protecting user data during audio interactions

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

Protecting user data during audio interactions

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

PROTECTING USER DATA DURING AUDIO INTERACTIONS
20220006898 · 2022-01-06 ·

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

PROTECTING USER DATA DURING AUDIO INTERACTIONS
20220006898 · 2022-01-06 ·

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

PROTECTING USER DATA DURING AUDIO INTERACTIONS
20220294899 · 2022-09-15 ·

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

PROTECTING USER DATA DURING AUDIO INTERACTIONS
20220294899 · 2022-09-15 ·

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

TELEPHONE SYSTEM, TELEPHONE SET, AND TELEPHONE TRANSFER METHOD
20200228662 · 2020-07-16 · ·

When a call is transferred from one telephone set to another telephone set, it is possible to enable a user of a transfer destination telephone set to recognize from whom a call came. A first telephone set (11) makes a call to another person. A second telephone set (12) is a telephone set to which the call is transferred from the first telephone set (11). Voice data acquisition means (13) acquires voice data of the other person on the call made by the first telephone set (11). Voice recognition means (14) performs voice recognition on the voice data acquired by the voice data acquisition means (13) and generates text data. Transfer destination text display means (15) displays the text data generated by the voice data recognition means (14) for a user of the second telephone set (12).

Systems and methods for enabling a universal back-cover wireless charging solution

Systems and methods for converting voltages between different voltage levels in a receiver are disclosed. In an aspect, a wireless power receiver apparatus for charging a chargeable device is provided. The apparatus includes a plurality of receive antennas disposed on a cover of the chargeable device, wherein at least one of the plurality of receive antennas is configured to wirelessly receive power according to a wireless charging protocol different from at least one other of the plurality of receive antennas. The apparatus includes a switching circuit disposed on the cover and configured to receive the wireless power from at least one of the plurality of receive antennas and selectively provide a respective voltage from a corresponding one of the plurality of receive antennas across an output configured to be connected to an input of the chargeable device.

Systems and methods for enabling a universal back-cover wireless charging solution

Systems and methods for converting voltages between different voltage levels in a receiver are disclosed. In an aspect, a wireless power receiver apparatus for charging a chargeable device is provided. The apparatus includes a plurality of receive antennas disposed on a cover of the chargeable device, wherein at least one of the plurality of receive antennas is configured to wirelessly receive power according to a wireless charging protocol different from at least one other of the plurality of receive antennas. The apparatus includes a switching circuit disposed on the cover and configured to receive the wireless power from at least one of the plurality of receive antennas and selectively provide a respective voltage from a corresponding one of the plurality of receive antennas across an output configured to be connected to an input of the chargeable device.

SYSTEMS AND METHODS FOR ENABLING A UNIVERSAL BACK-COVER WIRELESS CHARGING SOLUTION

Systems and methods for converting voltages between different voltage levels in a receiver are disclosed. In an aspect, a wireless power receiver apparatus for charging a chargeable device is provided. The apparatus includes a plurality of receive antennas disposed on a cover of the chargeable device, wherein at least one of the plurality of receive antennas is configured to wirelessly receive power according to a wireless charging protocol different from at least one other of the plurality of receive antennas. The apparatus includes a switching circuit disposed on the cover and configured to receive the wireless power from at least one of the plurality of receive antennas and selectively provide a respective voltage from a corresponding one of the plurality of receive antennas across an output configured to be connected to an input of the chargeable device.