Privacy device for smart speakers

ABSTRACT

Systems, apparatuses, and methods are described for a privacy blocking device configured to prevent receipt, by a listening device, of video and/or audio data until a trigger occurs. A blocker may be configured to prevent receipt of video and/or audio data by one or more microphones and/or one or more cameras of a listening device. The blocker may use the one or more microphones, the one or more cameras, and/or one or more second microphones and/or one or more second cameras to monitor for a trigger. The blocker may process the data. Upon detecting the trigger, the blocker may transmit data to the listening device. For example, the blocker may transmit all or a part of a spoken phrase to the listening device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application No.62/802,628, filed on Feb. 7, 2019 and entitled “Privacy Device For SmartSpeakers,” and U.S. Provisional Application No. 62/958,305, filed onJan. 7, 2020 and entitled “Privacy Device for Smart Speakers,” theentireties of which are herein incorporated by reference in theirentireties.

This application is related to U.S. application Ser. No. 16/785,202,filed concurrently herewith and entitled “Privacy Device For MobileDevices,” the entirety of which is herein incorporated by reference inits entirety.

BACKGROUND

Computer devices using microphones for voice control are increasinglyprevalent, including devices that are constantly listening andprocessing audio to allow spontaneous voice commands to be processed atany time. Many of these devices send commands and other data to computerservers which store a massive amount of data in perpetuity.

This poses numerous privacy risks to the public. In many cases, thevalue presented by perpetually listening computing devices makes it anundesirable trade-off to refrain from using the devices to preserveprivacy. In other cases, a person may be unaware they are being listenedto. Therefore, systems that protect privacy but allow the listeningdevices to still provide their intended value are valuable.

SUMMARY

The following summary presents a simplified summary of certain features.The summary is not an extensive overview and is not intended to identifykey or critical elements.

Systems, apparatuses, and methods are described for blocking input datafrom reaching a listening device. A listening device may be configuredwith one or more microphones or one or more cameras which, in responseto a first trigger (e.g., a “wake word”), perform one or more actions.For example, the listening device may be a smart speaker. A blocker,which may be a computing device, may be configured to prevent thelistening device from receiving such input data (e.g., via the one ormore microphones or the one or more cameras) until a second trigger(which may be the same or similar to the first trigger) has beenreceived. For example, the blocker may intercept audio data or videodata, as collected from one or more microphones and/or one or morecameras, from being received by a listening device. As another example,the blocker may play one or more sounds (e.g., white noise, falsifiedambient noise that include one or more ambient sounds, noise configuredto obfuscate speech, false conversation data) using a speaker directedtoward the one or more microphones of the listening device, or the like.The blocker may be configured with one or more second microphones and/orone or more second cameras which retrieve audio and/or video data andmonitor such data for the second trigger. The blocker may use the one ormore microphones and/or the one or more cameras of the listening deviceto monitor for the second trigger. For example, the blocker may be amodule physically installed in the listening device which interceptscommunications from the one or more microphones and/or the one or morecameras. The second trigger may be, e.g., a gesture, spoken command thatincludes one or more spoken words, or the like, and may be defined by auser (e.g., using a configuration tool associated with the blocker). Theblocker may be configured to ignore audio and/or video originating fromthe listening device such that, for example, the listening device cannotattempt to bypass the blocker. Upon determining the presence of thesecond trigger, the blocker may permit audio and/or video data to bereceived by the listening device, e.g., for a predetermined period oftime. The blocker may modify such audio and/or video data beforetransmitting such data to the listening device. For example, the blockermay receive a command, use a language recognition algorithm on thecommand, use a text-to-speech algorithm to reproduce the command, andoutput the text-to-speech command via a speaker directed at the one ormore microphones of the listening device. The blocker may wait apredetermined period of time before transmitting such data to thelistening device.

These and other features and advantages are described in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

Some features are shown by way of example, and not by limitation, in theaccompanying drawings. In the drawings, like numerals reference similarelements.

FIG. 1 shows an example of a privacy blocker integrated into a listeningdevice according to one or more aspects of the disclosure;

FIG. 2 shows a modularized privacy blocker capable of integration into alistening device in accordance with one or more aspects of thedisclosure;

FIG. 3 shows an example of a privacy blocker operating with respect to alistening device according to one or more aspects of the disclosure;

FIG. 4 shows an example of a privacy blocker capable of integration intoa listening device, and with additional components, according to one ormore aspects of the disclosure

FIG. 5 shows an example of hardware elements of a computing deviceaccording to one or more aspects of the disclosure;

FIG. 6 shows an example of a flowchart for intercepting signals intendedfor a listening device according to one or more aspects of thedisclosure;

FIG. 7 shows an example of a flowchart for intercepting signals intendedfor a listening device according to one or more aspects of thedisclosure;

FIG. 8 shows an example of a flowchart for intercepting signals intendedfor a listening device according to one or more aspects of thedisclosure;

FIG. 9 shows an example of a flowchart for intercepting signals intendedfor a listening device according to one or more aspects of thedisclosure;

FIG. 10 shows an example of a flowchart for intercepting signalsintended for a mobile device according to one or more aspects of thedisclosure.

DETAILED DESCRIPTION

In the following description of the various embodiments, reference ismade to the accompanying drawings identified above and which form a parthereof, and in which is shown by way of illustration various embodimentsin which aspects described herein may be practiced. It is to beunderstood that other embodiments may be utilized and structural andfunctional modifications may be made without departing from the scopedescribed herein. Various aspects are capable of other embodiments andof being practiced or being carried out in various different ways.

It is to be understood that the phraseology and terminology used hereinare for the purpose of description and should not be regarded aslimiting. Rather, the phrases and terms used herein are to be giventheir broadest interpretation and meaning. The use of “including” and“include” and variations thereof is meant to encompass the items listedthereafter and equivalents thereof as well as additional items andequivalents thereof. The use of the terms “mounted,” “connected,”“coupled,” “positioned,” “engaged” and similar terms, is meant toinclude both direct and indirect mounting, connecting, coupling,positioning, and engaging.

Listening devices may be a wide variety of devices (e.g., computingdevices), including but not limited to home assistants, home automationassistants, music players, televisions, gaming systems, smart phones,smart watches, computer monitors, laptops, computer tablets,physical-security systems, motor vehicles, headphones, alarm clocks, andkitchen appliances. Non-limiting examples may include the Echo listeningdevice by Amazon.com, Inc. of Seattle, Wash.; the Home device by GoogleInc. of Menlo Park, Calif., and the HomePod system by Apple, Inc. ofCupertino, Calif. Listening devices may be referred to interchangeablywithin this description as listening device, listener device, and/orlistener.

Non-Integrated System

The system described herein may be implemented in a primarilynon-integrated manner, wherein a blocker is added to a listening devicewithout intercepting communications transmitted by input devices of thelistening device. A blocker device (301) may be a device, such as acomputing device, placed in a location covering and/or near one or moremicrophones (306) (which may be part of the blocker device and/orexternal from it) of the listening device (302) and limits the abilityfor the listening device to listen to the sound in the environment.

In some embodiments, the blocker device (301) may include a microphone(304), a speaker (305), processor, and power supply (308). In otherembodiments, the blocker may comprise circuitry, such as one or moreintegrated circuits, configured to perform the steps handled by theprocessor. In still others, combinations of circuitry and one or moreprocessors may be used

The blocker device (301) may use its microphone (304) to receiveinformation (e.g., sound data) about the sound in the environment. Themicrophone (304) may be configured to receive environmental audio thatincludes one or more sounds such as, for example, spoken words, music,and the like. The microphone need not be any particular type ofmicrophone, and may be any device configured to receive audio and/ortransmit audio data. The microphone may send such received audio, assound data, to the blocker's processor. The processor may process thesound to determine if trigger sounds have occurred. If trigger soundsare determined to have occurred, the blocker device may switch from ablocking mode to a pass-through mode, whereby the blocker may permit thesound from the environment to be received by the listening device (302).The blocker may perform passive blocking, whereby the blocker has asound-proof seal around the listening device's microphone (306) andprovides sound insulation such that the listening device cannoteavesdrop. In passive blocking, when the pass-through mode is entered,the blocker may play back through its speaker (305) the sounds it hearsfrom its microphone (304) such that the listening device is able toeavesdrop without the blocker being physically removed. Additionallyand/or alternatively, the blocker may perform active blocking, wherebythe blocker may play jamming sounds from its speaker (305) while inblocking mode such that the listening device cannot eavesdrop and/orenable eavesdropping for human eavesdroppers nor automated eavesdropperswith or without machine learning algorithms, and in the pass-throughmode the blocker may play either no sound from its speaker and/or mayplay the sounds it hears from its microphone to amplify them, so thatthe listening device can readily eavesdrop.

Integrated System

The system described herein may be implemented in an integrated manner,wherein a blocker is added to a listening device and is configured tointercept communications transmitted by input devices of the listeningdevice. A blocker device (101) may be integrated to a listening device(102). The blocker may be physically affixed and/or mounted to thelistening device permanently, temporarily clipped on with a clip (204),and/or screwed in and/or otherwise temporarily mounted, looselyconnected with cables, and/or may have no physical connection to thelistening device. The listening device may have a physical switch whichcontrols whether the blocker is used or is bypassed.

The blocker device (101) may include a processor and may include aseparate microphone the listening device does not use (104), or it mayintegrate to the same microphone the listening device uses (106), orboth. While a blocker is installed, the listening device may have accessto receive sound information through the blocker's processor and may beincapable of receiving sound information from the one or moremicrophones directly. In some implementations, if the microphone istrusted, such as when it is not part of the untrusted listening device,then, alternatively, the microphone may send sound information directlyto the listening device when the blocker has indicated to the trustedmicrophone that the blocker is in pass-through mode and, in blockingmode, the listening device may be incapable of receiving sound from themicrophones. If, within the system that is a combination of the blockerand listening device, there is only one microphone or array ofmicrophones, that microphone may be used for both trigger detectionwhile in blocking mode, as well as for providing the listening device'sprocessor (103) with sound data via the blocker's processor inpass-through mode. Any of the microphones described herein may belocated within the blocker, the listening device, or separately fromboth. If within the combined system there are two separate microphonesor arrays of microphones, either microphone may be used for triggerdetection while in blocking mode, while the other microphone may be usedto provide the listening device's processor with sound data via theblocker's processor in pass-through mode.

The integration of the blocker device (101) to the listening device(102) may be in the form of having connected electrical circuits, havinga wireless connection, or a combination of both. The connections fromthe blocker to the one or more microphones may also be in the form ofhaving connected electrical circuits, having a wireless connection, or acombination of both, and need not be the same form as the integration tothe listening device. For example, one or more of the microphones may bea wireless microphone, and/or a wireless device that includes one ormore microphones. The connections from the blocker to the one or morespeakers may also be in the form of having connected electricalcircuits, having a wireless connection, or a combination of both, and donot necessarily need to be the same form as the integration to thelistening device or the connection to the microphones. In anyintegrations, connected electrical circuits may include power supplywires, traditional sound transmitting wires such as analog aux cables,various digital data transmitting wires such as a Universal Serial Bus(USB) interface, or any combination of multiple such connectedelectrical circuits. In any integrations, wireless connections may use astandard protocol, such as Wi-Fi or Bluetooth, and/or a proprietaryprotocol.

The blocker device (101) may have no capability to connect directly to awide area network (WAN), and/or the device it connects to in order toreach the WAN may have methods to significantly restrict the blockerdevice such that the blocker device's access to microphones does notpose an eavesdropping risk outside of the information it sends to thelistening device. The blocker may also have either no or limited abilityto accept instructions from the listening device through any of theintegrations to reduce the risk of the listening device being capable ofcompelling the blocker into entering pass-through mode for unauthorizedeavesdropping.

Power-Flow System

A blocker device may be plugged into a power source, and the listeningdevice's power cable may be plugged into the blocker's power socket. Theblocker device may comprise of a processor, a microphone, a power cable,and a power socket. While the blocker is in blocking mode, the power tothe listening device may be turned off, and while the blocker is inpass-through mode power may be available to the listening device.

The power source of the blocker and the power source of the listeningdevice need not be connected. The blocker may additionally and/oralternatively receive power from other sources. For example, blocker mayreceive power from the listening device, may be battery powered, may bepowered through a wall socket, and/or may receive power from anotherdevice (e.g., a nearby laptop). Any variety of methods of powering theblocker may be used. To conserve power, the blocker may be configured tooperate in a low-power state when no or little audio and/or motion isdetected.

Processor

The blocker's processor may be part of a more general computing devicethat is capable of executing software (e.g., as stored in memory),whereby the software provides the instructions for processing anddetermining if triggers have occurred. Alternatively and/oradditionally, the processor may comprise a circuit board that isspecifically designed to process sound, such that minimal or no softwaremay be required to determine if triggers have occurred. If bothapproaches are used, the circuit board may do initial processing todetermine if a trigger is even a possibility or likely at any giventime, and upon determining that a trigger has some reasonable level oflikelihood, it may wake up and/or otherwise activate the generalcomputing portion of the processor to use software to confirm withhigher confidence whether a trigger has actually occurred. This approachmay afford a number of benefits, including, but not limited to,conserving power and/or providing the extra privacy assurance that eventhe blocker's software has access to the environment's sound a smallerproportion of the time.

Multitude of Microphones

In all cases throughout this document, microphone and microphones areused interchangeably; for example, in any case where a singularmicrophone is referred to, the singular may be substituted for multiplemicrophones. All microphones may also be substituted for a microphonearray and/or intermediary device that provides data from a microphone.

Active Blocking

Active blocking may be particularly useful in non-integratedimplementations. The blocker may employ one or any combination of avariety of active blocking methods that are effective at preventingeavesdropping by devices using language recognition, artificialintelligence systems, and/or humans. The blocker may generate randomstatic noise. The blocker may determine the ongoing volume of theenvironment's sounds, measured in real-time and/or as a maximum of somenumber of seconds into the past, and adjust the generated noise volumebased on the environmental volume determined, such that the generatedvolume is more assured to prevent eavesdropping while not disturbingpeople when ambient volume decreases. The blocker may generate noisewith profiles that differ from white noise, such as brown noise, and/orprofiles that are specifically known to make it more difficult tounderstand human speech. The blocker may determine other characteristicsof the environment's sounds similar to the volume determination, such asthe presence and/or volume of specific frequency ranges, the types ofsound waveforms, duration of frequencies, and/or to what degree humanspeech is present, and use such determinations to vary the generatednoise's volume, profile, mix and/or duration of frequencies, volume ofindividual frequencies, and/or other characteristics. For example, theblocker may determine that the ambient general volume is 50 db and thata male voice is talking at 80 db in short bursts, then generate noisewhich is 60 db generally but having frequent short bursts of 90 db witha frequency typical of the male voice.

The blocker may store multiple recordings of the environment's sounds ofvarying lengths, ranging, for example, from less than 5 ms to longerthan a minute, and incorporate one or multiple simultaneous recordingsinto the generated noise. The blocker may periodically record the soundswhile in blocking mode, during recent pass-through modes, and/or both.For example, the blocker may perform three 20 ms recordings every 15seconds while in any mode, two 150 ms recordings every 5 minutes whilein any mode, and three 4 second recordings from the two most recentpass-through mode events, and may loop each of them repeatedly, combinethem all together, and/or combine them with noise, and generate theresulting noise through the blocker's speaker. The result is generatednoise that may be more difficult for a listening device and/orassociated servers to filter out to allow eavesdropping. Alternativelyand/or additionally, before using any given recordings in generatingnoise, a recording may be modified for obfuscation, and/or converted toa formula that can be used to later generate sound that may approximateone or more characteristics of the recorded sound but without having tostore the recordings. The blocker may store the recordings in such a wayas to make it inaccessible to the blocker's software, impossible to havetransmitted out of the blocker to a network, and/or the blocker mayintentionally lack the capability to connect to a network to transmitthe recordings; all these alternatives providing a high degree ofassurance of the recordings not being a privacy risk.

The blocker may also employ common noise cancelling techniques in thedetermination of what noise to generate. The blocker may analyze one ormore characteristics of the environmental sound and build a profile ofmetadata about the sound which would be used to select one or more noiseprofiles from a dictionary of noise profiles and/or noise recordingswhich have been determined in advance to be very effective in jammingthe type of environmental sound that is occurring during any givenperiod of time. Additionally and/or alternatively, the dictionary maycontain a definition of sound modifiers that should be applied to theenvironmental sound to generate one of the layers of noise.

The blocker may employ directional speakers in jamming the listener'sspeakers. The directional speakers may reduce the noise disturbance tonearby users. Directional speakers may include the types and techniquestypical for zoned audio systems, including parametric loudspeakers, buton a smaller scale.

The blocker may have multiple jamming speakers for one or more of thelistener's microphones. The jamming speakers may each separately and/orcollectively be able to be positioned by the user independent of theblocker, which may allow the blocker to be compatible with a greatervariety of listener shapes. For example, the blocker may have multipleflexible or rigid tentacles that extend from the blocker and out tovarious positions around the listener. Each tentacle may have one ormore jamming speakers.

The blocker may have a jamming test mode, and the blocker and/or aseparate device may emit specific signals that are intended to be jammedand which would normally cause expected behaviors from the listeningdevice. The blocker may measure if the jamming has been successful.Additionally or alternatively, the blocker may request that the userindicate to the blocker if the jamming was successful and/or if theaudio is disturbing the user. The blocker may test multiple times atdifferent intensities of jamming to determine the optimal intensityneeded for balancing user privacy, while minimizing disturbance to theuser.

The blocker may use non-audible jamming to affect the microphones.Non-audible jamming may include multiple ultrasonic sound waves (e.g.,including those used in parametric loudspeakers), single ultrasonicsound waves, and/or jamming that is not sound at all. Non-sound jammingmay include magnetic interference of the listener's microphones and/ortheir associated circuits, infrared based temperature interference,electromagnetic interference, electric interference in the form ofelectric fields, quantum interference, vibration, non-coherent light atsufficiently close proximity or from a distance where the listenerand/or microphone are susceptible to interference by light, as well aslasers. For example, it has been demonstrated that microphones mayinterpret a pattern of pulses from a light (e.g., light emitting diode(LED), laser, etc.), even from a great distance, as being equivalent tosound waves being received by the microphone, which may be useful forlight-based (e.g., laser-based) audio injection attacks onvoice-controllable systems. For example, a light (e.g., LED) may behigh-intensity light in close proximity (e.g., <30 cm) to themicrophone. The further the light source, the light source may be morefocused to concentrate the intensity of the light on the microphone. Thelight may cause the microphone to interpret the light as interference(e.g., white noise). In some embodiments, the blocker may use thisphenomenon to instead jam, at close proximity or from a distance, themicrophones of the listener while in blocking mode. The use of non-soundbased jamming may allow blocking of one microphone while permittinganother microphone in close proximity to receive signals (e.g., notimpacted by the non-sound based jamming). The blocker may use thetechniques described for sound-based jamming, non-sound jamming, and/orany combination thereof for added privacy assurance. The blocker mayprovide insulation and/or covers to isolate non-sound based jamming tothe space between the listener's microphone and the jamming source.

Electromagnetic jamming or interference considers the fullelectromagnetic spectrum, which includes ionizing radiation, visible andinvisible light, microwaves and radio waves. Light may be non-coherent,such as the light created by the sun or a regular bulb, or coherent,such as a laser light source. For any electromagnetic jamming technique,the jamming signal may be comprised of specific frequencies and/or acombination of them. For example, white light and/or a combination ofblue and infrared light. These frequencies, or carrier signals, aremodulated to produce the desired jamming effect. The modulating signalmay be digital or analog, or a combination of both. The modulatingsignal may emulate different noise profiles and/or audio signals, suchas a coffee shop conversation, or any other signal profile that is usedwith the intent to jam the microphone. The modulated carrier signal maybe used to alter the status of the microphone in such a way that it willoutput a signal with the desired jamming properties. For linearprocesses, the output signal of the microphone may have a highcorrelation to the modulated carrier signal, but for nonlinearinteractions the output signal of the microphone may not have suchcorrelation.

Noise profiles to modulate the carrier signal described above mayinclude, but are not limited to, white noise, pink noise, Brownian noiseand so on. Other noise profiles may be used, such as waveforms whosefrequency profile may induce noise levels on the microphone that allowthe masking effect. For example, a sinusoidal wave whose phase and/orfrequency change either randomly or at specified intervals.

Electromagnetic signals outside the boundaries of the light spectrum maybe produced with antennas, coils, or by other means. Electric fields maybe created with flat conductive plates or other methods. Quantuminterference embodiments may include, but are not limited to, the use ofprinciples, such as quantum entanglement. An example of a device thatcan be used to generate vibration of different frequencies may be anelectromagnetic motor that has an unbalanced load attached to it, andwhose rotating frequency is controlled by the modulated carrier signal.Other devices that generate vibrations that can be interpreted by themicrophone as sound signals can be used as well.

Non-coherent light sources for the carrier signal can be generated withlight emitting diodes (LEDs) or other technologies, such as, but notlimited to, fluorescent or filament bulbs. Optical artifacts, such asoptic fiber and lens, may be used to focus the light beam on themicrophone's membrane. LEDs may produce ultraviolet, visible or infraredlight, and any combination of these may be used as a carrier signal. TheLED may be mounted in close proximity to the microphone, and a lens maybe used to focus the light on the microphone's membrane surface. Or theLED may be mounted away from the microphone and optic fiber may be usedto direct the beam to the microphone sound port opening. For devicesthat have more than one microphone, a single LED with enough power andan optic fiber network may be used to distribute the modulated lightsignal to all the microphones. Or, more LEDs may be used to increase thelight power and/or to generate distinct modulated signals, one per LED,in such a way that the microphones receive different, or slightlydifferent, sound jamming profiles. Similar principles apply to otherjamming techniques as well.

Coherent light sources may be generated with laser diodes or by othermeans, and may use optical artifacts such as optic fiber and lenses tofocus the light beam on the microphone's membrane. The principles forthe use of coherent light sources remain the same as those described fornon-coherent light sources.

Carrier signals may be modulated with the use of digital or analogsystems, or a combination of both. These systems may be passive oractive. Passive jamming systems have a fixed profile, while activejamming systems adapt to the environment to increase the effectivenessof the jamming signal. An example of this would be a passive system thatgenerates white noise with constant power, versus an active system thatcan change the noise profile, and/or the noise power, according to thesound environment.

Non-audible jamming technologies and techniques should be designed insuch a way that they do not cause physical harm to the listener deviceand its microphones, such as heat damage. At the same time, thenon-audible jamming technique should create enough disturbance in themicrophone in such a way that the ambient sound is effectively masked.For example, increasing noise levels perceived by the microphone by anamount of decibels that may vary depending on the audio profile that isto be blocked. Furthermore, one or several non-audible jammingtechniques can be used in combination with audible jamming techniques toincrease sound masking effectiveness. Other means of increasing themasking efficiency of the jamming technique may use algorithms such as,but not limited to, noise cancelling to decrease the power of theambient sound that is captured by the microphone.

Passive Blocking

Passive blocking may find particular use in non-integratedimplementations. The blocker may have a compressible material, such asfoam, to form a sound-insulted seal when physically attached to thelistening device. The rigid or compressible portion of the blocker thatattaches to the listening device may consist of interchangeable adaptorsto other shapes that are designed for a variety of listening devices,and the interchangeable adaptors may be 3D printed from a catalog ofpossible designs. The blocker may use a variety of sound-insulatingmaterials and sound-insulating techniques. The sound-insulatingmaterials need not block all sound from reaching the listening device,but may instead insulate a particular amount or range of sounds fromreaching the listening device. For example, sound-insulating foam on theblocker may permit extremely loud sounds (e.g., explosions) to reach thelistening device, but may deaden sounds associated with speech fromreaching the listening device.

As an example of passive blocking, the listening device may be shapedlike a hockey puck with a microphone on the top of the listening device,and the blocker may comprise a circular foam element which attaches tothe top of the listening device and thereby blocks sound waves fromreaching the microphone. As another example of passive blocking, thelistening device may be shaped like a cylinder, and the blocker maycomprise an insulated sheath that, when slid onto the cylinder, blockssubstantially all sound from reaching one or more microphones dispersedaround the cylinder.

Interception of Signals

The blocker may be configured to intercept audio data and/or video databefore it reaches the listening device and/or a component of thelistening device (e.g., a processor in the listening device). Forexample, the blocker may be configured to receive and process audio dataand/or video data from one or more microphones and/or one or morecameras of a listening device, rather than allowing such data to bereceived by the listening device. Such interception may compriseinterrupting, shorting, or otherwise modifying one or more transmissionpaths associated with an input device. For example, a wire for amicrophone may be cut, and the two ends of the cut wire may be insertedinto the blocker.

Interception need not require a physical connection between inputdevices and the listening device. For example, the listening device maybe configured to receive audio data and/or video data from one or morewireless microphones and/or one or more wireless cameras. Interceptionof such signals may comprise the blocker establishing a connection withthe one or more wireless microphones and/or the one or more wirelesscameras, then presenting the blocker to the listening device as if itwere the one or more wireless microphones and/or one or more wirelesscameras. In this manner, the listening device need not know it iscommunicatively connected to the blocker. The blocker may additionallyand/or alternatively employ a jamming signal or other method to preventtransmission of audio data and/or video data directly from the one ormore wireless microphones and/or the one or more wireless cameras to thelistening device.

Triggers

The blocker may await and/or detect a variety of triggers to determinethat blocking mode should be changed to pass-through mode. The blockermay use the sound information from one or more of the microphones indetermining if a trigger has occurred. The blocker may use the volume ofthe ambient sound; for example, a >=50 db sound for at least 0.5seconds, could be a trigger. The blocker may use a particular frequencyand/or shape of sound wave, combination of frequencies and/or shape ofsound waves, and/or a general pattern of frequencies; for example,frequencies and waveforms that are typical of an adult female voicespeaking syllables, but without attempting to determine what words arespecifically being said, and/or a person whistling, could be a trigger.The blocker may use a variety of speech recognition techniques and/orlanguage recognition techniques (e.g., recognizing words of a particularlanguage rather than recognizing speech sounds without mapping them towords), to convert the sound information to text, and then determine ifa specific word or phrase has been said; for example, the word“command,” could be a trigger. The blocker may determine if a specificpattern of frequencies and waveforms has occurred that is indicative ofa higher likelihood that a specific word or phrase has been spoken, butwithout generally converting the sound information to text; for example,the blocker may determine simply whether the word “command” has or hasnot been spoken, if so, it could be a trigger and if not, then no speechanalysis is needed.

The blocker may use sources of information other than any microphones indetermining if a trigger has occurred. The blocker may have a physicalbutton that a user presses as the trigger. The blocker may have thecapability to have a connection, for example a Bluetooth and/or wificonnection, to a nearby cell phone and/or wearable smartwatch with anapplication installed that has a software button, and the pressing ofthat software button causes a signal to be sent to the blocker throughthe connection, and such a signal could be a trigger.

The blocker may have the capability to have a connection to a portabledevice which can detect movement gestures such as turning of the wrist,and the portable device may determine that it has a connection to ablocker device and that a gesture has occurred, and then may cause asignal to be sent to the blocker, and such signal could be a trigger.Such movement gestures may correspond to, for example, accelerometerdata received from a different computing device, such as a smartphone,portable device, motion controller, and/or the like.

The blocker may integrate to other devices, either directly and/orthrough an intermediary device such as a server and/or router, withsignals from the other devices being considered a trigger. For example,a garage door opener may send a signal to the blocker through a Wi-Finetwork, and the opening of the garage door may be considered a trigger.Another example is the presence of a particular smartwatch, detected byvarious means such as the presence of a Bluetooth connection and/orpresence of the device on a Wi-Fi network, which may indicate to theblocker that a designated person, such as a parent, is nearby where aparticular person or parent's presence could be a trigger, and saidtrigger may prevent the eavesdropping by the listening device ofchildren or other individuals without the parent's presence. Such animplementation may prevent children or other individuals issuingcommands to the listening device without the parent's or designatedperson's presence.

The blocker may use time and date based information, such as the time ofday and/or day of week, in determining if a trigger has occurred. Forexample, the time being between 5 pm and 9 pm on Monday to Friday orbetween 11 am and 9 pm on Saturday, could be a trigger, such that theblocker is in prolonged pass-through mode during those blocks of time.

The blocker may have and/or integrate with proximity sensors, motionsensors, infrared sensors, and/or light sensors to determine if atrigger has occurred. For example, an infrared motion sensor similar tothose found in automatic hand dryers, which detects that someone haswaved their hand near the blocker and/or listening device, could be atrigger. Another example is a light sensor detecting that the livingroom lights are on, which could be a trigger.

The blocker may comprise one or more cameras or integrate with one ormore cameras (e.g., over a network and/or inside the listening device).The blocker and/or the camera may perform a variety of processing of thevisual data or perform visual recognition to determine if a trigger hasoccurred. For example, the blocker may use a camera and visualprocessing to determine that it is likely that someone is waving theirhand back and forth above their head, and such waving and/or othergesture could be a trigger. Another example is that the blocker mayintegrate to a camera that is able to count the number of people and theblocker may poll the camera periodically to determine the number ofpeople in the room, with having only a single person in the room being atrigger. Another example is the blocker having both direction-detectingmicrophones and a built-in camera, that together are able to determinethat at least one person located in the determined direction of thesource of speaking is also looking towards the listening device, withsuch looking at the listening device by a speaker and/or someone nearthe speaker being a trigger.

A trigger may consist of one or more of the above individual triggers,including combinations thereof. Such combinations may include Booleanlogic, a point system whereby each individual trigger and/or particularBoolean combination of individual triggers may have a particular numberof points attributed to it, and a trigger may be associated with thecombined total of the points reaching a threshold. Additionally and/oralternatively, one or more formulas may be used for combining individualtriggers to determine if the probabilities of false positives and falsenegatives has reached one or more predetermined thresholds for thecombined trigger to be deemed to have occurred, and/or the negativeassertion that a particular individual trigger has not occurred. Thelength of time in between individual triggers may also be used in theformulas and may affect the determination of a combined trigger havingoccurred or not. For example, either pressing the physical button,and/or frequencies typical of a male voice plus sustained volume of 50db sound for over 2 seconds but less than 5 seconds followed by asilence of at least 1 second but only between 6 pm and 9 pm and only ifthe front door has not been opened within the past 4 hours asdemonstrated by a lack of signal from the front door sensor, and/orrecognizing the words “command” have been spoken, and/or recognizing themore common words “hello” followed by the words “send” within 5 seconds,could be the requirements logic for the blocker to determine that asingle trigger has occurred.

The speech recognition techniques, language recognition techniques,and/or the other mentioned triggers may include the use of machinelearning techniques and approaches, such as convolutional neuralnetworks (CNN) and recurrent neural networks (RNN) or models and/oralgorithms that are generated from them. When application of suchmachine learning models by the blocker requires significant processingpower, preliminary determinations of the occurrence of a trigger may bemade using methods that may require less processing power but result inlower accuracy. This may result in a very brief pass-through state untilthe non-real-time processing for the more reliable trigger determinationis able to be completed. The more reliable results may be used to endthe pass-through state and/or permit the pass-through state to beextended beyond the brief window which may have allowed the user tobegin communicating with the listening device without a delay.

The blocker may use increases in the volume of the environment indetermining if a trigger has occurred. This may afford advantages interms of improved accuracy in detecting intention to speak a comment,improved accuracy in detecting the start of a word, and/or decreasedpower consumption while in blocking mode and/or increased processingresponse times during trigger detection by awaiting a volume increase asthe preferred start of a time window of sound data to test for a voicetrigger. The increase in volume may be compared to milliseconds before,such as with the start of most spoken words. Additionally oralternatively, the increase in volume may be compared to the ambientvolume of a longer period of time, such as with background music playingand/or the user speaking a voice trigger louder than the backgroundmusic.

The blocker may use input devices connected to the blocker by electricalcircuits, or remotely having a wireless connection, or a combination ofboth. According to some aspects, the input devices need not be the sameform as the integration to the listening device nor the connection ofthe listening device to its input devices. The blocker may use thedetection and/or receipt of a specific Wi-Fi, Bluetooth, basic RF, orother wireless signal as a trigger. The blocker may confirm theproximity of the signal, for example, based on signal strength.Additionally or alternatively, the blocker may confirm the source of thesignal, for example, by checking a broadcast ID and/or confirming thevalidity of a PGP signature transmitted by the signal. The blocker maycompare the source of a signal versus a whitelist and/or blacklist ofapproved sources. For example, the blocker may use these capabilities tohave geofencing based triggers or to determine that the blocker is ontop of or within a predetermined distance (e.g., 10 cm) of a particularelectronics pad on a table. Alternatively or additionally, the blockermay also use a GPS sensor, dedicated to the blocker or shared with thelistening device, to provide geofencing based triggers. This may havebenefits such as having a corporate board room beacon emitting a signedsignal whereby all compatible blockers within the board room remain inblocking mode throughout the course of a meeting, and whereby the boardroom beacon may provide feedback to the users, via a mounted screenand/or otherwise, containing how many and/or a list of which deviceshave signaled a confirmation back to the beacon that they have enteredblocking mode.

The blocker may detect high-frequency sound that is outside the spectrumof hearing, including ultra-sound, UV light, or other such signals thatare less noticeable by users. The high-frequency sound may be used indetermining if a trigger has occurred. The blocker may process andanalyze the less-noticeable, high-frequency signals using one or more ofthe methods described herein for detecting sound-based triggers andnon-sound-based triggers. For example, the detection of ultra-soundbeacons or proximity to particular other electronic devices may be usedin determining if a trigger occurred.

The blocker may detect the listening device is in a vacant room, in apocket, and/or in a carrying case, in determining if a trigger hasoccurred. For example, the listening device may detect the vacant roomby detecting the amount and/or other characteristics of light (e.g.,visible and/or non-visible frequencies) and/or using proximity sensors,motion sensors, and/or accelerometers. The blocker may remain inblocking mode while the listening device is in a pocket, for example, ifthe listening device is not intended to be listening to the environmentwhile in the user's pocket. The input sensors of the blocker may beshared with the host device and/or independent of the listening device.

The blocker may detect that an external microphone has been plugged into itself or the listener, such as to an audio AUX-IN socket, indetermining if a trigger has occurred. For example, the blocker mayenable pass-through mode based on an external microphone beingplugged-in. The blocker and/or listen may emit one or more specifictones, when first plugged in and/or periodically, to signal to othercomponents that it is a privacy respecting component.

Additional Details Related to Word Trigger Detection

The blocker may be configured to be more false positive tolerant duringaudio trigger determination as the ambient volume of the environmentincreases. This may prevent false negatives, missed triggers, fromincreasing as the environment gets noisier. The blocker may determine ifthe ambient noise is caused by human speech or by non-speech noises, andthe blocker may use this determination in determining the impact of theambient volume on trigger detection tolerance. The blocker may acceptconfiguration such as user preferences in determining the impact ofambient volume on trigger detection tolerance.

The blocker may accept a whistle and/or clap as part of the audiotrigger, in isolation and/or in combination with a spoken trigger word.The blocker may also require the whistle and/or clap or it may beoptional but increases the confidence of a trigger occurring. This maybe a fall-back audio trigger and may assist with detection in loudenvironments or other environments where it is hard to detect just thespoken trigger word.

The blocker may accept repetition of the spoken trigger word, forexample as a required phrase or an optional input that increases theconfidence of a trigger occurring. The blocker may use each repetitionof the trigger word in determining if each is, by itself, a trigger, andsuch repetition may intrinsically increase the likelihood that at leastone of the repetitions will be successfully detected, and/or the blockermay evaluate whether any word is being repeated at all and may combinethe fact that repetition is occurring with the detection of the triggerword on each repetition, to increase the accuracy of detection. Theblocker may use the same and/or different detection algorithms fordetecting repetition as compared to detecting a word, which may beaided, for example, by the repetition having intrinsically similarambient noise as well as being the same speaker. The blocker maydetermine if the time between repetitions is appropriate to indicate arepeat attempt; for example, the blocker may require the repetition tobe 250 ms apart which may indicate intentional repetition, or theblocker may require the repetition to be within 6 seconds with a maximumof 5 spoken words in between, which may indicate the user spoke thetrigger word once and after waiting and failing to see feedback the userattempted again. This may allow the blocker to have increased accuracyin detecting the trigger word on reattempts after a failed attempt bythe user.

Additional Triggers, Such as Those Originating from the Listening Device

The blocker may use the listening device's behavior to determine if atrigger has occurred. Triggers may include initial triggers that resultin pass-through mode, as well as subsequent triggers and/orconfirmations that indicate the initial trigger was a true positive. Theblocker may require a confirmation trigger to maintain pass-through modebeyond a period of time limited to what is required to detect thelistening device's behavior. Additionally or alternatively, theconfirmation trigger may be used to extend pass-through mode byadditional time. The behavior detected may be based on the usage of thelistening device, such as a phone ringing in response to receiving acall. The behavior detected may be performed by the listening device aspart of its communications with the blocker. The behavior detected maybe the user configuring the listening device to perform the behavior forcompatibility and/or improved performance of the blocker.

For example, the blocker may enter pass-through mode for a listeningdevice (such as a smart speaker) upon the blocker detecting the triggerword “command.” Additionally or alternatively, the blocker may observewhether the home speaker behaves in a way that suggests the listeningdevice itself detected its wake word (e.g., such as in addition to theblocker detecting the user said the smart speaker's wake word) and hasinformed the user of its processing. Such observation may involve theblocker's microphone listening for the listening device's output audioto indicate to the user a successful command. For example, a smartspeaker may emit a first tone (e.g. 589 Hz) for a first predeterminedamount of time (e.g., 75 ms), followed by a second tone (e.g., 1169 Hz)tone for a second predetermined amount of time (e.g., 160 ms). Thesecond tone may emitted for the second predetermined amount of time witha decay. Additionally or alternatively, the smart speaker may emit athird tone (e.g., 350 hz) tone preceded by a ring. In general, the smartspeaker may emit any tones that are audible and/or an octave apart. Insome instances, the smart speaker may speak in a voice with predictablecharacteristics that may be detected as belonging to the listeningdevice. Additionally or alternatively, the observation may involve theblocker having a light sensor (e.g., photoreceptor) that is positionedto detect that the listening device has made use of its user feedbacklights to indicate to the user it is processing a request. The lightsensor may be located within the listening device and/or external to butfacing (e.g., pointed at) the listening device. Detecting the listeningdevice's behavior (e.g., as a confirmation) may have several benefits,including shortening the time in pass-through mode for false detectionof triggers by the blocker, allowing the blocker to be more falsepositive tolerant in trigger detection as compared to the listenerdevice's detection of its wake word due to the limited duration of thefalse positives, and/or increasing the user's awareness of the blockingdevice and/or listening device's pass-through mode. This may result inimproved user privacy, for example. Additionally, detecting thelistening device's behavior may be used to extend pass-through mode. Forexample, a smart speaker in conversation mode may turn on its userfeedback lights after it has detected each additional question that theuser holds. The feedback lights of the listening device may besufficient for the user to be aware that the listening device iscontinuing to listen for longer. This may allow the blocker to extendpass-through mode repeatedly without the user having to explicitlyrepeat a trigger word.

The blocker may detect the behavior of a listening device (such as aphone or tablet) based on the listening device's pixel-based screenbeing active and sufficiently brightly lit. Such detection may use manyof the methods previously described for detecting the lights (such as,LED lights) found on a smart speaker. The blocker may include a sensorplaced inside the phone, outside the phone along the edge of the screen,built-in to the protective case around the phone, and/or built-in to atransparent screen protector. Additionally or alternatively, the blockermay observe the power consumption of the screen, for example, if thescreen is trusted to not be able to increase power consumption whilehaving minimal visible light that the user could observe. The blockermay allow for variable positioning of the sensor by the user and/or havethe one or more sensors detect the average brightness of a broad area ofthe screen. By detecting a broad area of the screen, it may be moredifficult for the device (e.g., phone, tablet, etc.) to illuminate aportion of the screen to trick the blocker into entering pass-throughmode, but without sufficient light from the screen to alert the user.The blocker may factor in time of day and/or ambient light levels todetermine what amount of light is sufficient to alert the user.

The listening device may signal to the blocker that pass-through modemay be safely ended early. Additionally or alternatively, the listeningdevice may signal to the blocker that the listening device has a lowprobability of being used. For example, the listening device may detectthat its input device (such as microphone) has become available toprovide information, analyze that its own wakeword or other requirementsare not met, and that the pass-through mode is not required. The blockermay receive this signal to stop pass-through mode sooner than itotherwise would have. In another example, the listening device may beaware of its own unique usage parameters and/or anticipated upcomingusages, perhaps because usage by a user is typically responsive tosignals provided by the device (e.g., a warning alert). The listeningdevice may transmit a signal to the blocker that indicates a higherconfidence threshold for triggers to cause pass-through mode. Thelistening device may provide one or more signals (e.g., explicitsignals) to improve the user experience, demonstrate concern for userprivacy, and/or conserve power, especially in the case of batterypowered listening devices. Such signals may be transmitted throughdedicated integration circuits, as an additional use of otherintegration circuits, and/or by the listening device outputting throughits output devices, such as a quiet but detectable tone through itsspeaker.

The blocker may detect listening device's behavior directly with one ormore sensors and/or by intercepting a signal to a listening device'scomponent. The detecting may occur indirectly. For example, the blockermay detect a change to the electrical consumption of the listeningdevice and/or its processor, changes to electrical patterns within thelistening device's circuitry, changes to electromagnetic interferencefrom the listening device, and/or other similar effects indicating thelistening device may be using one or more of its input devices.

The blocker may use the intercepted listener device's signals being sent(e.g., transmitted) to the listener's output devices, for example, indetermining if a trigger has occurred. Additionally or alternatively,the blocker may use the detected output of the listener device's outputdevices, for example, in determining if a trigger has occurred. Forexample, if a phone begins ringing due to an incoming call, the blockermay detect the ringing is at a sufficient volume and enter pass-throughmode so that the user may answer the call without any further triggerbeing required. Additionally or alternatively, the phone's loudspeakermay emit a sound of sufficient volume and/or characteristics (e.g.,matching a voice), during the course of the phone call, that the blockermay enter and/or extend pass-through mode for the duration of the call.This may be due, in part, to the user's awareness of pass-through modebeing implicit. For higher assurance, the blocker may combine thephone's use of its loudspeaker with detection of intermittent speakingby the user to further suggest that the user is having a conversationwith the phone.

As an example of combining a plurality of behaviors for incrementalcertainty as pass-through length increase, the blocker may detect theword “command” to begin pass-through mode for a first time (e.g., 1second), require detection of the user saying the listening device'swakeword to extend pass-through a second time (e.g., 1 second), requiredetection of a host's lights blinking to extend pass-through mode athird time (e.g., 5 seconds), and/or require detection of the host'svoice (at a volume that is determined to be user-detectable given theknown environmental circumstances such as ambient noise level or time ofday, for a sufficient length of time, and/or within a few seconds of thewakeword) to extend pass-through mode by a fourth time (e.g., 20seconds).

The blocker may use the behavior of a numerous types of listeningdevices, such as an appliance turning off or not, lighting in the houseturning on or off due to home automation, and/or the sound of a garagedoor opening. These behaviors may be directly intended or by-products ofa successful command, either originating from the listening device orsomething the listening device communicates with or controls, or anycombination of multiple behaviors.

The listener may send, and the blocker may receive, a signal toexplicitly request pass-through mode. This may allow the blocker to logsuch requests, perform throttling of request approvals, perform logic todetermine whether the request should be approved, provide feedback tothe user to inform the user, and/or provide increased feedback relativeto more trusted triggers.

The listener, any cloud computers, microprocessors more powerful thanthe blocker, and/or any general computing systems may provide triggerdetection that does not require the blocked input device. Triggerdetection may or may not be complex and/or time consuming and/or powerconsuming and which may or may not be able to be performed by theblocker ongoing and/or real-time. The blocker may then receiveindication, trusted or untrusted, that the trigger has been found andmay receive meta-information about the trigger events. The blocker maythen validate the trigger using the meta-information that has beenprovided and using information that the blocker obtains directly. Forexample, a blocker may be configured (e.g., setup) to block a microphonesignal from reaching a smart speaker until a particular portable deviceis detected to be nearby (for example, based on Bluetooth presence). Theblocker may remain in low-power mode without scanning for Bluetoothsignals until a listener which scans for Bluetooth signals detects theportable device and signals to the blocker that it has been detected andthe identifier. Upon receiving the signal, the blocker may perform itsown Bluetooth scan. This may allow for ongoing readiness of the systemas a whole but without requiring the blocker to perform ongoing and/orreal-time analysis.

The blocker may receive from the listener and/or a third device,configuration preferences for trigger selection and/or triggerdetection. The preferences may be from a set of possibilities that areall treated by the blocker as sufficiently trustable, in isolation or incombination with other triggers. The preferences may include whichlanguage, which trigger words, a selection of machine learning models toapply against sensor input for trigger detection, and/or the definitionsof models and/or parameters which may be cryptographically signed to betrusted as approved. For example, the preferences may indicate if theword “command” or the word “hello” is the trigger word, or may includean updated signed voice model. The blocker may also enter a trainingand/or validation mode where the user confirms the validity of anyuntrusted parameters received.

Additional Triggers, Such as Those Originating from User Handling

The blocker may use the user's handling of the listening device indetermining if a trigger has occurred. This may include initial triggersthat result in pass-through mode, as well as subsequent triggers and/orconfirmations that indicate the initial trigger was a true positive. Thehandling detected may be based on the usage of the listening device. Forexample, a user putting a phone to their ear during a phone call and/ora user touching the screen of a GPS to request directions. The triggermay be detected based on actions performed by the user to communicatewith the blocker, for example, by pushing a button on the blocker and/oron the listening device. In some examples, the trigger may be detectedbased on a modified variation of a behavior inherent to the usage of alistening device. For example, the orientation of the listening deviceif the user intends for it to remain inactive or any combination ofmultiple handlings. User handling applies to many portable devices, suchas phones, tablets, and biometric wearables, that are portable in natureand therefore have significant movement and/or positioningcharacteristics. User handling may also apply to a plurality of devicesthat are stationary, such as smart fridge displays, smart microwaves,and smart thermostats, and have haptic (e.g., touch) and/or manipulationhandling. Some devices may only be used when the user is handling them,and other devices are used either primarily or occasionally by a user ata distance, such as a smart speaker.

Like other triggers described herein, user handling may be detected, forexample, in response to handling events and/or the absence of handlingevents for a period of time. For example, a trigger may be detected inresponse to a change in an accelerometer of a phone. Another trigger maybe detected in response to a phone being in motion for several minutes,or has not been stationary for a sufficient period of time. Similarly, atrigger may be detected when a phone has not moved for a period of time(e.g., several minutes), for example, because the phone has been left ona table. A trigger may be detected, for example, in response to thepresence of a detectable object, such as an NFC tag. Alternatively, atrigger may be detected in response to the absence of the detectableobject.

The blocker may use fingerprint scanners, touchscreens, and/or any othertouch-detectable components of the listening device and/or the blocker,to determine if a trigger has occurred. For example, the blocker maydetermine that a trigger has occurred, for example, if a touchscreen hasbeen touched by a user's finger. The determination may be made inisolation or in combination with one or more triggers that the user isinteracting with the device and the probability of the user desiringpass-through mode may be increased in response to the determination thatthe user is interacting with the device. Therefore, the blocker mayrequire a lower threshold of certainty when evaluating the presence of avoice-based and/or motion-based trigger. Additionally or alternatively,the blocker may treat alternate triggers as sufficient.

The blocker may detect tapping on a phone. The tapping may be detectedby detecting vibrations, movements, touch, etc. As with many types ofhandling triggers, the detection may simply require the event to occurone or more times. Additionally or alternatively, the detection mayrequire the events to have specific timing and/or duration.

The blocker may detect if the listening device has been covered by theuser. For example, a smart watch may end pass-through mode when theuser's hand covers the watch. Similarly, the smart watch may beginpass-through mode when covering and uncovering twice. For example, theuser's hand moving in one direction and then abruptly in the otherdirection may start pass-through mode. Pass-through mode on a smartwatch may start, for example, in response to the wrist rotating fromvertical to the horizontal rapidly, a hand moving from right-to-leftover top of the smart watch, a hand shaking the smart watch, and/or theuser lifting their hand high up after being in a resting position.

The blocker may detect that the listening device was placed in a movingvehicle. For example, the blocker may use one or more accelerometersand/or other motion and/or position sensors to detect vibrations of amotor vehicle. Similarly, the blocker may use one or more sensors todetect the typical sounds of either a motor vehicle, the user'sparticular vehicle, and/or traffic. In some embodiments, the blocker maydetect that the user is near a short-distance beacon and/or detectableobject (e.g., an NFC tag) located inside the vehicle. The blocker maydetect a trigger using a GPS sensor to detect high speed travel.

The blocker may detect that the listening device was placed into, takenout of, and/or is currently located inside a pocket and/or carryingcase. For example, a user putting a phone in a pocket may involvedetecting that the phone is being held and/or is not touching anyobjects other than a hand, followed by the phone detecting a fabric.Additionally or alternatively, the phone may detect a downward movementthat matches a reasonable depth of a pocket. In some embodiments, alight sensor may indicate darkness associated with being located in apocket and/or a carrying case.

The blocker may detect the vibration mode of a listening device and mayonly consider the vibration a sufficient trigger if the phone is alsodetected as actively being handled.

The listening device and/or its case may be touch sensitive. The blockermay detect the user's touch and/or grip. The user's touch and/or gripmay be used to indicate how the user intends to use the listeningdevice. The indication may inform the blocker about whether or not toenter pass-through mode.

The blocker may detect the orientation of the device as a gesturetrigger. For example, a blocker for a phone may detect that theorientation of the phone is level to the ground and the orientation hasbeen maintained for a sufficient period of time. This orientation mayindicate that the phone has been left idle on a fairly level surface.Accordingly, a trigger word of “command” may be required before enteringpass-through mode for both the phone's microphone and/or the phone's GPSsensor, and/or a physical override switch may need to be toggled by theuser, disregarding any behavior by the phone may be disregarded. If thesame phone is moved sufficiently after being idle on the level surface,the blocker may require a lower threshold of listener behavior detectionin order to enter pass-through mode. The lower threshold of listenerbehavior detection may be indicative of the listener informing the userthat it is active. If the user wishes for pass-through mode to bemaintained even when on a surface, then the user can place the phone ontop of an object and/or cradle the phone such that it rests at an anglerather than level. The different positions and/or orientations (e.g.,holding the phone vertically as in the case of a phone call versusholding the phone horizontally as in the case of a video conference orloudspeaker call) may have different effects on entering pass-throughmode. For example, pass-through mode may be entered without any furtherbehavior by the phone being a requirement nor any trigger word beingspoken by the user. A trigger may be detected by the blocker may bedetected if the listening device is charging. The trigger may bedetected, for example, if other devices, such as the blocker, are alsocharging. The trigger may be detected based on proximity to otherdevices, such as a charging cradle, by observing the effects of chargingon the listening device's circuitry and/or battery.

The blocker may detect that the user is walking, using any suitablemethod and/or technique, such as those employed by pedometers, to detecta user's steps to determine if a trigger has occurred.

The blocker may detect intentionally modified variants of impliedgestures to determine if a trigger has occurred. For example, theblocker may detect that it is upside down while in a pocket and remainonly in blocking mode, whereas being right side up while in a pocket mayalso be in blocking mode, but the blocker may enter pass-through modewhen other triggers are encountered. Additionally or alternatively, theblocker may detect that it is upside down while in a car and remain inblocking mode. The blocker may disregard one or more other triggers forentering pass-through mode while in the car. If the device allows forrotating of interfaces based on an upside orientation (e.g., thedevice's screen is still readable and/or touchable), this may allow theuser to treat upside down (versus right side up) as a toggle for sensorsthat at times is implicit, such as a phone call never having the phoneupside down unless laying down, and sometime explicit, such as puttingthe phone into a cradle upside down. Similarly, the blocker may detectlandscape versus portrait or landscape left versus portrait right,and/or any other orientation or combination of orientation changes, anduse that detection as a trigger.

The blocker may use very intentional gestures as triggers. For example,spinning the phone while it is on a table, flipping it over front toback one or more times while on a table, flipping the phone front toback in one direction and flipping it back in a specific direction,spinning it one way and then back the other way, and/or any otherintentional gestures which may have low probability of occurring exceptwhen the user is intentionally communicating with the blocker and may bereadily detectable by the blocker.

The blocker may detect the particular combination of flat orientation,lack of movement, and/or absence and/or presence of a pad (e.g.,charging pad). With a combination of triggers, the pad may be a “silencepad” that forces blocking mode regardless of the other present and/orconfigured triggers. Alternatively, the pad can be a “listening pad”that forces pass-through mode regardless of the other present and/orconfigured triggers. In some embodiments, the pad may be a “modifiedmode pad” that changes what triggers are required when detected incombination with the orientation and/or the lack of movement.

The blocker may detect the user shaking the listening device indetermining if a trigger has occurred.

The blocker's input sensors for trigger detection, such as anaccelerometer, may be on the same electrical circuit as the listener'smicrophone and/or other input devices, and may or may not require amicroprocessor for the input sensor's trigger to disable the signals ofthe listener's input devise to the listener's processor.

The techniques and examples for gestures affecting listener input devicemay also be implemented without requiring a blocker. The techniques andexamples for gestures affecting listener input device may be useddirectly by a listener and/or a listener's processor, implemented inhardware and/or software, as an input gesture. For example, a phone'sorientation such as being flipped upside down and/or being stationary onan approximately level surface, may be detected by a phone operatingsystem and used to affect whether an input component is enabled and/orwhether a phone's software selects to process data from the inputcomponent.

Lower Trigger Accuracy

Unlike a button being pressed, for many of the types of triggers, theremay be a complex determination as to whether a trigger has occurred; forexample, in determining whether the user said “command” or not. Theblocker may use lower accuracy methods and algorithms in sound-basedtriggers than the listening device. Such lower accuracy may allow theblocker processor to be less powerful than the listening device'sprocessor, because of the limited number of audio triggers and limitednumber of potential resultant actions. The blocker may allow a greaternumber of false positives for trigger detection than false negatives,because the impact of a false positive may have no detrimental effect onthe user experience other than a nominal decrease in the percentage ofsound that is blocked.

Ending Pass-Through Mode

The blocker may use a variety of indicators to determine when to endpass-through mode and therefore change back from a pass-through mode toa blocking mode, and these indicators may be referred to as endingindicators. The blocker may use the elapsed time since enteringpass-through mode as an ending indicator; for example, pass-through modemay be limited to 15 seconds and then the blocker may return to blockingmode. For example, the blocker may cease the pass-through mode after apredetermined period of time. The blocker may use any of the types oftriggers described in this description as the ending indicator. Forexample, an ending indicator may be that it is both after 9 pm and afemale voice is detected. The blocker may use metadata about the triggerthat triggered the pass-through mode to determine what type of endingindicators and/or parameters for those ending indicators are needed; forexample, if the trigger was the time of day reaching 4 pm, then theblocker may determine that the only ending indicator is the time of dayreaching 5 pm, whereas if the trigger was the word “command” beingspoken, then the blocker may determine the ending indicator can beeither 15 seconds elapsing or detecting that a different person hasbegun speaking based, for instance, on the frequencies or othercharacteristics of the voice. The blocker may receive additionalmetadata from the user during triggering that may affect the endingindicator; for example, if the word “command” is spoken as a triggerthen the ending indicator may be defaulted to 15 seconds elapsing, butif the phrases “command 1 hour” and/or “command long” are spoken as atrigger then the ending indicator may be one hour elapsing since thetrigger.

The blocker may determine that a child is speaking, based oncharacteristics of the sound such as frequencies, tone, waveforms, etc.,and may consider any child speaking as an ending indicator. This may beparticularly beneficial in protecting the privacy of children, and/or inthe prevention of children issuing commands to the listening device. Theblocker may determine that a particular designated individual isspeaking using voice recognition techniques, and may consider thisperson speaking as an ending indicator. This may be particularlybeneficial in protecting the privacy of particular vulnerable adultsand/or in preventing certain adults from issuing commands to thelistening device.

The listening device may have a reserved word and/or phrase and/or othersound which the listening device detects and the user may say and/orcause as a way for the user to indicate to the listening device that averbal command is to follow; such a word and/or phrase may be referredto as a “wake word” even though it need not be a single word and/or aword at all. While the blocker is in pass-through mode, the blocker maymonitor sound from the microphones, and based on detecting a wake wordin such sound, extend the pass-through mode for an additional period oftime; for example, the user may say “command, hey listener, what time isit? . . . hey listener, play a song.” and each time the wake word of“hey listener” is used and presumably the listening device takes actionon, a 15 second time limit on the pass-through mode is extended anadditional 15 seconds, such that the user does not need to say “command”repeatedly to avoid a conversation with the listening device being cutoff by the blocker. While the blocker is in a pass-through mode andmonitoring the sound from the microphones, the blocker may extend thepass-through mode for an additional period of time based on determiningthat a user is engaging in ongoing conversation with the listeningdevice. The determination of ongoing conversation may be based ondetecting that a user and the listening device are taking turns; thatis, a user has spoken, the user has stopped speaking approximatelyshortly before the listening device has used its speaker to provide aresponse back to the user, and the user has once again started speakingapproximately after the listening device has completed its response. Forexample, if the user said “command, hey listener, what time is it?”, thelistener responded “9 pm”, and then the user said “what day is it?”, andthe listener responded “Friday”, the blocker may extend the pass-throughmode for additional periods of time until the conversation is determinedto have ended 5 minutes later, even though the trigger and wake wordwere not spoken and the blocker was configured to return to blockingmode after 15 seconds. In the detection of ongoing conversations, theblocker may use the integration to the listening device's speakers, asdescribed in this document.

Pass-Through Pre-Processing

When the blocker is in a pass-through mode, it may pass-through allsound from the microphones, and/or it may pre-process and/or modify thesound from the microphones before passing it on to the listening device.The blocker may filter the sounds to only some frequencies, such asthose of human speech; for example, if a person is speaking while themicrowave is running and/or the sound of footsteps is heard, the blockermay modify the sound from the microphones by filtering it such that thelistening device only receives the sound of the human speaking. Althoughthis may result in improved accuracy of the listening device's languagerecognition, it may also result in increased privacy by reducing theability for the listening device to eavesdrop on activities occurringduring pass-through mode. The blocker may additionally and/oralternatively filter all sound during a period of time where aparticular volume threshold hasn't been reached, such that sounds thatare considered very quiet and therefore are determined to be unlikely tobe commands intended for the listening device may be filtered; forexample, ongoing background movement noises and/or whispers duringpass-through mode may be removed from the sound before passing them onto the listening device.

The blocker may also filter out any voices that are not those of theperson who performed the trigger using speaker recognition; for example,the blocker in blocking mode may detect a person using the trigger word“command” at a house party, and switch to pass-through mode for 15seconds, and during pass-through mode filter out all voices of theguests at the house party except for the person who issued the triggercommand so that the guests have reduced privacy impact. In order to dothis, the blocker may use a variety of beamforming, source localization,and other similar techniques; the blocker may also use such techniquesduring trigger detection to improve the accuracy of trigger detection.The blocker may also have a training mode, during which users train theblocker with their voice much like dictation software improves accuracyby having training modes, and where the training data is used forspeaker recognition to restrict what voices pass through to thelistening device.

As part of the pre-processing of sound from the microphones, the blockermay use speaker detection followed by audio filtering, and/oralternatively may use synthetic reconstruction of sound, and/or acombination of both. Synthetic reconstruction may involve the blockerreceiving the sound from a microphone, the blocker's processorperforming language recognition to convert the sound to text words, theblocker's processor generating a sound that is a synthetic voicespeaking said text, and then the blocker sending the listening deviceonly the generated synthetic sound. For example, the blocker maydetermine one or more words spoken by a user, convert such words totext, and, using a text-to-speech algorithm, output text-to-speechaudio.

Alternatively and/or in addition to language recognition converting thesound to text words, the speech recognition may convert the sound on aphonetic basis and/or otherwise syllable by syllable basis withoutneeding to process the speech into specific words. Alternatively, thespeech recognition may convert the sound to an intermediary form that iseven more granular by detecting each component of a syllable, such as aphoneme and/or linguistic segment, as is sometimes done as part of thesteps needed for language recognition. The syllables, phonemes, and/orsegments may then be used to produce sound with a synthetic voice withmore exactness to the original speech than language recognition, and/orthey may be delivered to the listening device as digital data, such as astream of symbols representing the various possible segments, withoutconverting them back to sound waves. Whether converting back to soundwaves with a synthetic voice or not, these alternatives to languagerecognition allow the listening device to retain the ability to make useof their own proprietary language recognition capabilities and allow forless computing power being required by the blocker device which wouldnot need to do higher-level language recognition, while allowing forincreased privacy benefits, such as the removal of some characteristicsof speech that would indicate emotions and/or levels of stress and/orother metadata that the speaker would not desire the listening device tohave access to and/or maintain a long-term history of.

The blocker may pass along all or a portion of the trigger itself to thelistening device, and/or the blocker may use the trigger but not providethe listening device with access to the trigger itself; for example, ifthe sound of the word “command” is a trigger, the sound of that wordneed not be passed on to the listener device but only all of the audiothat follows. The blocker may have memory storage and the ability tostore both trigger information (e.g., one or more sounds associated witha trigger, user-specified time periods which the trigger is to beactive) as well as pass-through sound to allow the listening device toreceive the trigger after a delay, as opposed to real-time, such theuser does not need to wait before speaking in a pass-through mode thatfollows; for example, the blocker may detect the user speaking “command”and enter pass-through mode, and simultaneous to the user saying “turnon the lights” the blocker still needs to pass on the user saying“command” followed by the “turn on the lights”, which would be delayedapproximately 250 milliseconds because the blocker didn't determine“command” was spoken until the word was finished being spoken. Thisdelayed communication to the listener device by the blocker may beparticularly useful if the trigger is the same phrase that the listeningdevice uses as a wake word, which provides the user with convenience ofnot having to speak extra words as a trigger before beginning to speakthe words the listener device requires as a prefix to commands. Theblocker may play additional pre-determined sound before passing onpass-through sound, at any point in the middle of pass-through sound,when silence is detected in pass-through sound, or at the end ofpass-through mode. For example, the blocker may insert a sound that thelistening device would detect as its wake word. Delayed communication tothe listener device by the blocker may also be useful in this case ofinserting wake words, as it may provide the user with convenience of nothaving to wait after the trigger and before speaking to the listeningdevice while the blocker plays the pre-determined wake word. In theparticular case of non-integrated active blocking, the blocker mayperform the delayed replay of the trigger and pass-through audio throughits speaker with a volume level such that the real-time soundsimultaneously occurring does not interfere with the listener device'sability to analyze the delayed replay; the blocker may use noisecancelling to prevent real-time audio from interfering with the listenerdevice's ability to analyze the delayed replay; the blocker may continueproducing noise not only during blocking mode (including the trigger)but also during pass-through mode until it is determined that the useris done speaking a command and only begin the replay after the fullcommand has been received and/or an ending indicator has been detected.In some instances, the replay of the trigger may be generated by apredetermined pattern of light pulses. The predetermined light pulsesmay relay the trigger to the microphone.

If the listening device risks misbehaving and/or has undesirablebehaviors when it receives no audio from its microphones, the blockermay simulate the microphone by sending ambient noise, simulated ambientsound, pre-recorded ambient sound, and/or a combination of such soundsas is required to prevent the listening device from detecting that it isnot receiving sound from the microphones.

The blocker may replay information it receives from the input device ata faster speed. For example, if the trigger word is the same as thelistener's wake word and/or the blocker passes along the trigger word tothe listener upon entering pass-through mode, then it may do so at ahigher speed to reduce any delay the user may require before speakingthe command that follows. The blocker may also use a trigger as an aliasfor the listener's wake word and/or a command to the listener. Forexample, the trigger word “command” may translate to “hello brand, whatis the weather.” The blocker may make use of aliases at any time,including both when in blocking mode as well as when already inpass-through mode. Such pre-processing may additionally and/oralternatively result in the blocker using alternate communicationchannels to inform the listener that it is now in pass-through mode. Thelistener may also detect an input device signal is being received,compared to when in blocking mode, and bypass its own requirement for awake word.

The blocker may replay information previously obtained by that blocker,by other blockers, and/or from a library of commands. This may enablethe blocker to disrupt the listener from detecting usage patterns. Thereplay may be an exact duplicate of the information previously obtained,an obfuscated version, and/or a modified version of the informationpreviously obtained, including making use of any of the pass-throughpre-processing described herein. The user may configure the blocker byindicating which commands may be replayed and/or which commands may not.This may allow the blocker to avoid commands that have costs and/orimplications, such as ordering pizza.

Blocker Configurability and Logging

The blocker may be configurable by users in order to affect the blockerin a variety of ways. The blocker may accept configuration informationfrom the user that is used by the blocker to determine which type ortypes of triggers should be used by the blocker to determine thatblocking mode should be changed to pass-through mode; for example,configuration information may include a list including garage dooropens, female voice speaking, the word “command”, the word “privacy”,all of the wifi devices to detect, and whether each one is or is not anenabled trigger. The blocker may accept configuration parameters fortriggers; for example, configuration information may include multiplestart times and end times which form a schedule for the time and dateschedule triggers. The blocker may have storage to record a variety oflogging data about the usage of the blocker and/or the listening device;examples of what the logs may contain include the date, time, and typeof each trigger as well as who triggered it, a transcription of thewords spoken in pass-through mode, and a recording of the first 10seconds of each pass-through mode. Additional non-limiting examples ofconfigurable aspects of the blocker include default lengths of time tostay in pass-through mode after any given trigger, minimum volume levelsfor triggers, length of a silence before automatically returning toblocking mode, number of entries to record in the log, tolerance and/orminimum required probability of a trigger having occurred, selections ofwhat information to log, instructions for how to connect to wifi,whether or not the wifi electronics within the blocker should beenabled, which languages the blocker should use, setting the currenttime on the blocker's clock, and/or the maximum length of pass-throughmodes as an limiting override for other configuration.

The blocker may use one or more of a variety of mechanisms to receivethe configuration information and provide logging data. The blocker mayact as a Hypertext Transfer Protocol (HTTP) server end-point on a localwifi network; for example, visiting the blocker's assigned InternetProtocol (IP) address using a browser pointed to https://192.168.0.5 mayoffer the user a web browser interface that allows the user to interactin a manner similar to configuration systems for network printers. Theblocker may allow configuration and provide logging through a Bluetoothconnection to a Bluetooth-compatible device running a configurationapplication; for example, the blocker may allow configuration using asmartphone with a proprietary application designed to send configurationinformation to the blocker. The blocker may have a USB connector toreceive configuration information and send logs; for example, theblocker may behave as a portable file storage drive when plugged into acomputer and allow the computer to send a configuration file to theblocker which would then be parsed by the blocker to extra configurationinformation.

The blocker may have a type of trigger reserved for changing fromblocking mode to a configuration mode and/or a logging mode rather thanto pass-through mode; for example, saying “command configuration” maycause the blocker to enter configuration mode and/or pressing a physicalbutton may enter configuration mode. In configuration mode, the blockermay use language recognition to receive configuration information; forexample, saying “disable word hello” may cause saying the word “hello”to no longer be considered a trigger. The blocker may use a speaker tocommunicate to the user the existing communication information,configuration instructions, and/or the logging data. The blocker mayintegrate to the listening device's speaker to play sound, eitherthrough the listening device's processor and/or directly to thelistening device's speaker. The blocker may use audio processing that issimpler than language recognition; for example, the blocker may use aspeaker to communicate to the user “say something if you want the wordhello to be a trigger, stay silent otherwise”, and then determine if anysound over 50 db has occurred in the following 2 seconds whereby thepresence of a sound would enable the word hello to be a trigger and theabsence of a sound would indicate to disable that trigger. Rather thanentering configuration mode, a trigger may be assigned a specificconfiguration change; for example, a physical button may be used totoggle Bluetooth capability of the blocker.

The blocker may also be configurable by other automated systems; forexample, multiple blockers in a home may all receive configurationinformation to their individual application programming interfaces(APIs) from a centralized configuration server that automaticallycoordinates and/or synchronizes settings across multiple blockers andother devices.

The blocker may be trained to recognize a voice trigger. The voicetrigger may be initialized by a voice training mode. The voice trainingmode may be trained to recognize the voice trigger based on an initialpredetermined number of uses upon first use. The voice training mode maybe retrained in response to receiving a signal from the user. The voicetraining mode may also use any of the listening device responsedetection methods, as described herein, to flag voice triggeroccurrences from user's usages of the blocker as true positives or falsepositives. The voice training mode may provide additional data alongwith the trigger sound data, for example, as training data to the voicetrigger detection systems and/or to have such data affect the triggerconfiguration.

Limits on the maximum impact of the voice training may be placed. Forexample, after prolonged use of the blocker with numerous triggershaving occurred, the system may either stop making use of neweroccurrence for training, stop making use of newer occurrence untilretraining mode is indicated by the user, and/or the new occurrence willform a rolling window of training data that continues training theblocker but without cumulatively exceeding a determined threshold ofdeviation from the untrained trigger model and/or parameters.

The blocker may detect its own trigger detection quality in terms offalse negatives (e.g., missed triggers) by identifying trigger attemptsthat did not cause pass-through mode. The false negatives may havepreceded and/or had similarities to successful trigger attempts. Forexample, if a user attempts to say the trigger word “command” but it isnot successfully detected by the blocker, the user may try repeating thetrigger command until successful. The successful attempt may have beenbarely detected, but may be reliably the same user attempt as momentsbefore. The blocker may use this detection quality information, with orwithout accompanying sound data, to further train the blocker and/or tosignal to the user that additional training is recommended.

The blocker may have a training mode to be trained on what listeningdevice behavior is to be expected and/or required after enteringpass-through mode, which may allow the blocker to be compatible with abroader range of listening devices and/or to adapt to changes in thelistening device's behavior.

The blocker's time of day and/or date based triggers may be not onlyconfigurable, but may be trainable. The blocker's time of day and/ordate based trigger may be trained either explicitly or automaticallybased on usage trends. For example, the blocker may detect typical usagetimes and/or user preferences using any the same methods and/ortechniques used by smart home thermostats and/or learning water heaters.The blocker may use the time, date, and/or similar information to modifythe parameters, increase error tolerance of other triggers, and/ordecrease error tolerance of other triggers rather than being a directtrigger for pass-through mode.

The blocker may have very limited user interface capabilities, such aslacking a screen and/or button. The blocker may use gestures to entertraining mode and may use gestures to change configurations, where suchgestures can be one or more of the trigger methods. For example, theblocker may enter training mode when a user flips the listening device'sorientation a certain number of times, which may be a gesture that isunlikely to occur in regular usage of the listening device and thereforeunlikely to have false positives during detection. The blocker may thencount the number of gestures (such as flipping or spinning the listeningdevice) and such count may correspond to a mode and/or other numericalparameter value. As an example, the blocker may consider the countednumber of flips as corresponding to which orientation (such as upsidedown or counter-clockwise landscape) of a phone should be theorientation to indicate blocking mode. The blocker may or may notrequire a processor for this as more basic circuitry can detect atraining mode as well as store a value which is later compared totriggers.

Whether or not the blocker has indicators, the listening device mayprovide feedback to the user indicating whether the blocker is inblocking mode. This feedback may assist with user feedback duringtesting. For example, a software application on a mobile phone mayindicate whether the microphone is receiving any audio, so that a usercan test a blocker integrated on a phone and/or with no blocker feedbackindicators. The listening device may also monitor its input devicesand/or use its output components to provide instruction and/or feedbackto the user during gesture based configuration and/or training. Forexample, a software application on a mobile phone may enable the user tochoose from a list of configurations the user would like to perform, itmay then provide instructions for what gestures the user should performto achieve that configuration, and it may then provide feedback on thesuccess of each gesture being performed and guidance on each next step(such as, a phone flip has been placed in the correct direction (e.g.,counter-clockwise) and 3 more flips are required). This may or may notinvolve any communication by the listener to the blocker and may or maynot require any separate feedback to the user directly from the blocker.

Preventing the Listener Device being the Trigger (Self-Triggering)

The blocker may employ one or more methods to prevent the listenerdevice itself, and/or other unauthorized electronics, from triggeringthe blocker entering pass-through mode; for example, the listeningdevice would be prevented from using its speaker to instruct the blockerwith “command 1 hour” to perform unauthorized eavesdropping. The blockermay use direction-detecting microphones and disregard any sound triggersthat come from the direction of the listening device. Additionallyand/or alternatively, the blocker may use an additional microphone thatis placed in close proximity and/or focused on the listening device,such that instead of more complex general direction detection, theblocker may able to detect if the listening device is outputting audio(e.g., via one or more speakers of the listening device) and/or attemptsto trigger. This additional microphone may be a traditional airmicrophone, and/or it may be a vibration sensor that serves as amicrophone for sound traveling through solid objects, and the vibrationsensor may be affixed to the listening device directly or indirectly bybeing affixed to the blocker which is touching the listening device. Theblocker may also detect whether trigger sounds are produced by an actualperson and/or an artificial speaker; for example, the blocker may dospectral analysis of the trigger sound and determine that there is alack of expected high frequencies and therefore the trigger should beignored as it was generated by unauthorized electronics. The blocker mayalso make use of other types of triggers as a required combinationtrigger to ensure that there is at least a witness in the case thatunauthorized electronics and/or the listener device itself issues acommand; for example, the blocker may permit an artificial speaker beingthe source of a trigger, but only if a motion detector has detected thatpeople have been in the same room as the blocker within the past 2seconds.

The blocker may use more integrated methods of detecting what sound thelistening device is producing in order to prevent self-triggering; forexample, the blocker may be an intermediary between the listeningdevice's processor and the listening device's speaker such that theblocker is able to accurately monitor the sound information being sentby the listener's processor to the listening device's speaker.

The noise cancelling of the listening device's output sound, from thesound input that the blocker processes for listening for a trigger, toreduce the risk of self-activation or to reduce the impact of noise ontrigger detection, may not require the involvement of a processor.Instead, the noise cancelling of the listening device's output sound maybe implemented using circuitry that combines the sound input of theblocker with an inverted version of the signal from the interceptedlistener's signal to its speaker. The sound input of the blocker, withor without the inverted signal being combined, may be applied after abrief time delay to account for the travel time of the sound from thelistener's speaker to the blocker's microphone.

Any of the methods of preventing the self-triggering may also be used toprovide the blocker additional sound information to assist with noisecancelling or to distinguish user triggers from other sound beingproduced by the listening device.

Feedback to Users

The blocker may have a variety of ways of indicating to users theongoing status of the blocker, other state information, and/or activityinformation. The blocker may have a one or more lights that indicate themode of the blocker and/or other information to the user; for example,the blocker may have one small LED light that is unlit when in blockingmode, blinking when in pass-through mode for up to 15 seconds, and litcontinuously when in pass-through mode for longer than 15 seconds. Theblocker may use a speaker to provide feedback to users. For example, theblocker may cause a speaker to beep for 200 ms after a trigger isdetected that puts the blocker in pass-through mode. As another example,the blocker may say “blocking mode resumed” when pass-through mode hasended or say “still listening” every hour in pass-through mode. Theblocker may send a signal to another device, which in turn notifies theuser; for example, the blocker may send a wifi and/or Bluetooth messageto a smartphone every time pass-through mode is entered and thesmartphone would vibrate upon receiving such a message as well asprovide the user a visible log of the date and time of the most recentmessages.

Feedback to users, also referred to as indicators and/or blockerfeedback, may involve an entire component and/or one or more specificportions and/or specific behaviours of a component, which maycollectively be referred to as indicator components.

The blocker may use indicator components which are dedicated for thepurpose of indicating to the user that a listener's input device isactive and/or able to be active. The blocker may also use indicatorcomponents that have a purpose shared between the listener's operationand/or blocker feedback, but which the listener cannot disable theblocker from successfully providing feedback to the user.

The blocker may have indicator components on the same electrical circuitas the listening device's input devices, such that it may be impossiblefor the listening device to make use of its input devices withoutactivating the feedback indicator. For example, a light (e.g., an LEDlight) may be on the same circuit as a listener's microphone and maymake it impossible for the listener to use the microphone without theLED light indicating its usage to the user.

The blocker may detect an initial indicator, dedicated for this purposeor implicit to the listener's usage, of the usage of a listener's inputdevice, and may trigger one or more similar or different secondaryfeedback indicators to the user. The blocker may pre-process the initialindicator, for example—by evaluating various characteristics,determining if other triggers have occurred, and/or determining thelikelihood of the user already being aware of the listener's inputdevice usage, in order to determine whether or not and what type ofsecondary feedback to provide the user. For example, if the blockerdetermines that the user is on a phone call and the phone has indicatedsuch to the user by making sound, then visual feedback (e.g., an LEDlight) may be sufficient. However, if the blocker determines that thephone has been sitting flat, then the blocker may additionally select anaudible beep as feedback to the user.

The blocker may also provide feedback to the user by way of a vibrationof the listener device.

The blocker may have an output port and/or connector, dedicated orshared in purpose, which the blocker uses to send a signal to whichevercompatible device is plugged-in. That signal may contain informationabout whether the blocker is in pass-through mode. The compatible devicemay be as simple as an LED bulb or as complex as a cloud-enabled device,such as a phone. The compatible device may provide feedback to the userdirectly, or allow the blocker to indirectly communicate with anotherdevice and/or form of feedback. For example, the compatible device maycomprise an RF transmitter that transmits to the lights (e.g., lightbulbs) in a house such that the lights (e.g., lightbulbs) change colorwhenever a microphone, GPS, and/or other listening device is active. Theoutput port and/or connector may be limited to very low bandwidthcommunications to reduce privacy risks associated with data being sent(e.g. transmitted) by the blocker. The listener may itself be acompatible feedback device, which may be useful where feedback to theuser does not need to be trusted. For example, the blocker may selectfrom one or more indicators to provide feedback, directly or indirectly,based on a number of properties of the indicator. The properties of theindicator may include a presence of the indicator, a distance of theindicator from the listening device, and/or one or more configurationparameters that the indicator communicates to the blocker. For example,the blocker may select the nearest wearable device that was previouslypaired with the blocker to provide the feedback to the user for anevent, and such proximity may indicate which user is most likely to beable to confirm whether the event was intended or unintendedeavesdropping.

The blocker may also provide feedback when not in pass-through mode.This may have the additional advantage of power loss defaulting tofeedback that notifies the user that privacy is not assured This may inturn ensure that a blocker that depends on a listener for power may notbe bypassed by the listener turning off power to the blocker. Theblocker may also have a small amount of energy storage capacity,sufficient for providing feedback to the user of a power interruption tothe blocker.

The indicator may be a light designed to appear as the shape of a “P”,indicating to the user that the light pertains to privacy.

In place of feedback as to the mode of the blocker, the blocker may haveindicators that are related to the length of time that the blocker hasbeen in pass-through mode and/or the length of time since the last timethe blocker has been in pass-through mode. For example, the indicatorcomponent may be a light slider that increases (e.g., appears longer) asthe length of time increases.

Containers for Blocker

The physical separation and/or combination of the blocker, listeningdevice, and either's various components, may vary. The blocker may belocated inside the listener, the listener inside the blocker, or theymay be separate. The microphone that the listener uses may be physicallylocated inside the listener, in the blocker, in the bypass and privacymodules which may be located inside the listener while installed, and/ora separate object. The speaker that the listener uses may be physicallylocated inside the listener, in the blocker, in the bypass and privacymodules which may be located inside the listener while installed, and/ora separate object. The microphone and speakers that the listener usesmay be physically located in the same components and/or may be bothlocated together but separate from the blocker and listener.

For example, the listener may have a permanently installed speaker, nopermanently installed microphone, and may be provided with a bypassmodule installed with a microphone but not a speaker. In this example,to make use of a blocker, the bypass module may be uninstalled and aprivacy module containing a microphone, but no speaker, may beinstalled, and the listener may then begin using this privacy microphonethrough the blocker that also resides in the privacy module. Continuingthis example, the privacy module may be uninstalled and a second privacymodule containing no microphone nor speaker but containing aBluetooth-compatible system capable of connecting to a stand-aloneBluetooth microphone, may be installed; the listener may then beginusing this stand-alone microphone through the privacy module's blocker.

As another example, the listener may have a permanently installedspeaker, but the listener may have the capability to connect to astand-alone Bluetooth microphone and speaker, and the blocker may haveno permanently installed microphone nor speaker but is able to not onlyconnect to one or more stand-alone Bluetooth microphones as input andspeakers as output, but may also able to act as if it was a Bluetoothmicrophone and/or speaker. In this example, the listener may connect tothe blocker as if it was a microphone and/or speaker, and the blockermay proceed to allow or disallow sound information to pass through,dependent on what mode the blocker is in and as outlined throughout thisdocument.

The blocker may be provided separately and may be installed, by theuser, into the listening device. The initial separation of the blockerand the listening device, particularly in the case of the blocker beinga different seller and/or even a different manufacturer than thelistening device, in many cases allows for increased trust and privacyassurance of the combined system. The blocker may also have a tamperresistant and/or tamper detecting processor, and/or the blocker may becontained in a tamper resistant and/or tamper evidencing object; thismay provide increased assurance that the blocker is an untamperedcomponent produced by a different manufacturer, even when the blocker ispackaged and sold together with the listening device. Tamper-relatedfeatures include breakage upon detection of penetration of securityencapsulation, zeroising data, tamper evident labels, tamper evidentpackaging intended to be opened only by the end user, and/or othersimilar methods.

Any number of components in the blocker may be part of the module, andvice versa. The module may be removable, the blocker may be removablefrom the module, both, or neither. A module may support multipleblockers with different input device capabilities, and/or a listener maysupport multiple modules with different capabilities. Differentcapabilities may include differences in types of triggers, types ofinput sensors, levels of processing power, and/or levels oftamper-proofing.

The blocker may be contained within a SIM card and/or match the shape ofa removable memory card. This may allow the blocker to fit inside of adevice, such as a phone, without impacting its external shape.

The blocker may be contained within a protective case around the device,such as a phone cover. The case with blocker may have a battery thatserves as additional battery power for the phone. Additionally oralternatively, the case with blocker may plug into the listening deviceit encloses to obtain power from the listening device.

Additional Integration Points Available on the Listening Device

The listening device may have an additional interface that either isintended to be integrated with and/or is intended for humans but is ableto be integrated with. The listening device may have a mute buttonand/or switch and may have a command button and/or switch. The blockermay have one or more robotic button pushers, similar to those commonlyfound in “smart buttons,” where the blocker switching modes betweenblocking mode and pass-through mode causes the button pusher to push thelistening device's mute and/or action buttons, thereby activating a mutefunctionality and/or a different functionality. Additionally and/oralternatively, the blocker may connect to the electrical circuit betweenthe listening device's mute/action buttons and the listening device'sprocessor and cause a bypass of the circuit (signal sent to listeningdevice) whenever the blocker switches modes. Additionally and/oralternatively, the blocker may serve as an intermediate device betweenthe listening device's buttons and the listening device's processorand/or replace the button component entirely with the blocker and/or areplacement component that is integrated to the blocker, such that thelistening device's processor receives a signal equivalent to the buttonbeing pushed whenever the blocker switches modes. The integration with abutton capable of muting the microphone may be a replacement to theblocker being an intermediary between the listening device's processorand the listening device's microphone.

The blocker may integrate to other physical interface components of thelistening device, such as buttons, switches, fingerprint scanners,touch-screen interfaces, gyroscopes, motion sensors, or the like, thatare not intended to be directly related to muting a microphone. Theblocker may integrate to these other interface components byintercepting and/or detecting the electrical circuits between the otherinterface components and the listening device's processor, and/or theblocker may be an intermediary. In combination with the blocker beingintegrated to the microphones by being an intermediary between themicrophones and listening device's processor, the blocker's integrationto the other interface components may allow the blocker to detect thatthe component has been used by the user, switch from blocking mode topass-through mode (therefore begin permitting the microphone to sendsound information to the listening device's processor), and switch backto blocking mode after an ending indicator. The blocker's integration toother interface components may only perform partial processing of theinformation from the component; for example, integration to afingerprint scanner may involve only monitoring whether the scanner wasused at all or not, and not data about what was scanned and/or whetherthe fingerprint was correct.

As an example of the listening device being a smart watch, the smartwatch has a built-in microphone and built-in accelerometer, the blockermay be located inside the smart watch, the blocker may consist of aclock and fairly simple circuitry without any of the complexity ofgeneral computing processors, the blocker may be integrated to passivelymonitor (without interference and/or modification) signals of theaccelerometer to the watch's processor, and the blocker is integrated asan intermediary between the microphone and the watch's processor. Inthis example, the blocker may allow only sound information to travelfrom the microphone to the watch's processor for 30 seconds after theaccelerometer detects the rotation of the user's wrist, and otherwisethe microphone may be effectively muted. An alternate example, where theblocker uses its own dedicated accelerometer rather than the smartwatch's built-in accelerometer, is also possible, but the above examplemay have the advantage of requiring fewer components due to increasedsharing of components in a configuration that prevents the processor ofthe listening device from overriding or bypassing the blocker's controlover when to enable or disable the flow of sound information from themicrophone. In both of these examples, the blocker and the listeningdevice need not share any CPUs, complex logic circuitry, software,and/or other general computing components; such separation of theblocker's processing and the listening device's processing may greatlyreduce the risk of the listening device being able to interfere with theblocker's logic to perform unauthorized eavesdropping.

The listening device may also have intentional integration points and/orcircuitry that may conveniently allow an external device, such as theblocker, to reliably intercept, restrict, and/or toggle, the signalbetween the listening device's microphones and the listening device'sprocessor; preferably, but not necessarily, using circuitry that wouldnot allow the listening device's processor to change the effects of theblocker switching modes. For example, the listening device may have theability to receive signals from a blocker using a simple USB port and/orBluetooth connection, where the signals would indicate to the listeningdevice to stop processing sound information from its microphones and/orto wake up.

Blocker as a Power Supply

The blocker may contain a battery which provides the listening device ora component of the listening device with power. The listener device mayhave this blocker with battery permanently installed, or the listenerdevice may allow interchangeable blockers with batteries; for example,some cell phones have the ability to swap batteries, and the blockerwith battery may be similarly swappable.

Cameras Instead of or in Addition to Microphones

The listening device may actually be a watching device, with cameras inplace of microphones, or both a listening and watching device, where anintegrated blocker may function very similarly within the context of thewatching device, as it does with a the listening device; such systemsmay be referred to as a watching system. Watching systems may share manycharacteristics with listening systems, and many of the techniquesdescribed throughout this description for listening systems may beequally applied to watching systems. The sections of this descriptionrelating to self-triggering and pass-through pre-processing are examplesof sections that need not be applied to such watching systems. Morespecifically, for watching systems, the blocker may have the samephysical integrations as is outlined throughout this description but, inplace of sound data through the connections, it may be video data,visual data, and/or audiovisual data. The components of the blocker andthe location of components may be the same as is outlined throughoutthis description, but with cameras in place of microphones. The sectionsof this description about the blocker's processor, types of triggers,ability to use lower accuracy trigger detection, logic for endingpass-through mode, blocker configurability, blocker logging, feedback tousers, containers, and additional integration points available on thelistening device, may all remain applicable.

In a watching system, the blocking device may intercept video datatransmitted from one or more cameras to one or more processors of awatching device, process such video data, and transmit the video data tothe watching device based on the processing. For example, and asdescribed in more detail below, the blocking device may obfuscate all orportions of the video data, may remove elements of the video data forprivacy (e.g., portions of the video data which may depict minors), orthe like.

Additionally and/or alternatively, in a watching system, in place of theblocking device acting as an intermediary between the camera and thewatching device's processor, the blocking device may cause the lens tobe closed and/or covered; for example, some cameras include the abilityto signal whether the lens should be closed and/or the lens closesautomatically when power is disconnected to the camera, in which casethe blocking device may cause the camera to lose power during blockingmode.

When the blocker is in pass-through mode of a watching system, it maypass-through all video from the camera, and/or it may pre-process and/ormodify the video images from the cameras before passing it on to thewatching device. The blocker may filter the video to only some locationsof the camera's field of view; for example, the blocker may modify thevideo stream to only show the top half of the field of view and/or onlyshow the portions of the field of view that have had movement recently,such that the watching device only receives some of the data from thecamera. This may result in increased privacy by reducing the ability forthe watching device to spy on activities not intended to be seen by thewatching device. The blocker may also filter all video during a periodof time where a particular audio volume threshold hasn't been reached,such that if the user is not speaking then the watching device does notreceive a video stream even though the blocker is in pass-through modeand the watching device is able to receive the sound information. Theblocker may integrate with and/or incorporate commercially-availabletools, such as the systems advertised on the website nudedetect.com, todetect nudity and/or other characteristics of the video, and upondetermination that inappropriate content is present, restrict the videofrom being received by the watching device's processor. The blocker mayperform such content appropriateness checks periodically, such as onlyone frame per 2 seconds. The blocker may delay the video stream reachingthe watching system by short amounts of time, such as 3 seconds. Forexample, if the blocker checks for appropriateness every 2 seconds, andthe video stream is delayed 3 seconds, then the blocker may require lesscomputing power than checking every frame but the blocker would be ableto block the video stream effective up to 3 seconds into the past due tothe delay, allowing the blocker to reduce processing power withoutrisking inappropriate content from reaching the watching system. Theblocker may accept a higher degree of false positives (falsely flaggedinappropriate) and a low degree of false negatives (missed inappropriatecontent), due to the potential importance of the censorship, andtherefore the blocker may employ simpler strategies for inappropriatecontent detection than some commercially-available tools. As an exampleof a simpler strategy, the blocker may be configured and/or trained forwhat the user's skin tone typically is, it may determine in real-timethe proportion of the frame that is determined to be of that skin tone,and if a threshold is reached it may censor either the entire frameand/or just all skin tone pixels together with all pixels within anygiven distance from any skin tone pixel.

Process for after-Market Modification of Listening Devices

A user may modify a listening device to interface with a blocker, andmay be based the modification on instructions provided with a blocker.For example, a user may purchase a listening device, such as acommercially-available smart speaker, and open and/or otherwise modifyone or more aspects of the listening device for use with a blocker byfollowing instructions provided with the blocker. The user may therebyinstall an after-market blocker on a listening device that the userpreviously purchased. Instructions provided with the blocker mayinstruct the user regarding one or more steps to install the blocker onthe listening device. For example, based on instructions (e.g., asprovided with the blocker), a user may cut a wire leading to amicrophone of a listening device and insert each cut end of the wireinto a portion of a blocker. As another example, a user may, based oninstructions, replace a portion of a listening device that includes amicrophone with the blocker, which may contain its own microphone. Asanother example, a user may, based on instructions, replace a portion ofa listening device that includes a camera with the blocker, which maycontain its own camera. As another example, a user may be instructed todisable (e.g., physically destroy) a microphone of a listening deviceand connect the blocker to the listening device as an externalmicrophone (e.g., such that the listening device may be forced to relyon the blocker).

The instructions may specify one or more steps to be taken by a user.For example, as indicated above, the instructions may instruct a user tocut a wire for a microphone and physically insert the ends of the cutwire into the blocker. Such one or more steps may be outlined ininstructions provided by the blocker in paper, digitally, or the like.For example, the blocker may be configured to, when first turned on by auser, guide the user through one or more steps to attach the blocker tothe listening device.

The instructions may instruct the user to replace, and/or modificationof the listening device may comprise replacing, all or portions of alistening device with an interface configured to allow the listeningdevice to communicate with the blocker. For example, the instructionsmay cause a user to install a network interface (e.g., an Ethernet port)on a listening device and use the network interface to connect thelistening device to the blocker. As another example, the listeningdevice may comprise one or more circuit boards, and the user may, inresponse to instructions, replace a preexisting circuit board with a newcircuit board which causes the listening device to use the functionalityof the blocker.

Modification of the listening device may comprise modifying and/oraltering software executing on or with respect to the listening device.For example, a listening device may be flashed with new software whichremoves restrictions on using a blocker. As another example, a listeningdevice may be configured to permit access, by the blocker, tofunctionality of the listening device. As another example, if thelistening device is part of a controlled ecosystem (e.g., a family ofproducts that only work with other products in the family sold by thesame company), software on the listening device may be modified to trustthe blocker and/or associate the blocker with a trusted part of theecosystem. The modification and/or alteration of the software on thelistening device may comprise physically connecting a blocker to thelistening device, executing instructions on a second computing deviceconnected to a network that the listening device is also connected on,or the like. For example, a user of the listening device with asmartphone may first install first software specific to the listeningdevice on the smartphone, establish a connection with the listeningdevice via the first software, and then execute second software that,via the connection, modifies third software executing on the listeningdevice.

Additional Listener Input Devices and Listeners

The one or more input devices on the listener, which are blocked by theblocker, need not only be a microphone. The input devices may includecomponents that are intended for the listener to receive informationabout the environment of the listener, such as a microphone, camera,GPS, accelerometer, proximity sensor, light sensor, or otherwise. Theinput devices may also include components that are not observing theenvironment, but rather are communication components, such as aBluetooth chipset or wifi chipset, and/or a cellular SIM card, which mayor may not indirectly provide the listener with information about theenvironment of the listener.

The blocker may determine modes selectively and/or specifically for eachof multiple connected input devices, or multiple listeners entirely. Theblocker may be selective in terms of which one or more input devices toenable, and may be selective in terms of which one of one or morelisteners or components of the listeners is able to receive informationfrom the one or more input devices. For example, the blocker maydetermine that the position of a phone is a trigger for a phone call andmay only allow a microphone signal to go directly to a SIM card, whereasa different position of a phone is a different trigger and may allow themicrophone signal to go to both the SIM card as well as the phone'sprimary microprocessor. This may allow the blocker to block theoperating system on a smart phone from eavesdropping on phone calls.

The blocker may determine modes selectively for each capability of aprotocol of an input device. For example, the blocker may allow aBluetooth connection between a listener and Bluetooth endpoint to sendsound out from the listener but not allow microphone information back tothe listener. The blocker may do this by limiting the amount of databack from the Bluetooth endpoint to allow, for example, basic commandssuch as play and pause to be received but not microphone data, bylimiting the characteristics of data back from the Bluetooth endpoint,and/or otherwise.

The listening devices may be kitchen cabinet-mounted tablets as well asmobile home assistant robots.

Multi-Blocker Management

Trigger detection may have methods of distinguishing which of the one ormore listeners a user is intending to interact with. The blocker mayhave a multi-word trigger intended for multiple devices to differentiatewhich listener the user is intending to interact with. For example, ageneral trigger “command” may be followed by the trigger word “phone,”which may indicate that only blockers attached to phones are to continuein pass-through mode. The blocker may enter pass-through mode upon aportion of the trigger being detected and then go back to blocking modeif another portion of the trigger is not detected, and a second portionmay be simultaneously used by the blocker as a trigger but also used bythe listener as a wakeword and/or a command. For example, “command hellobrand A” may be an entire trigger and the word “command” allows allblockers to enter pass-through such that whichever device brand isultimately desired, it was able to have receive “hello brand A” withoutthe user repeating it twice and if the blockers for “brand B” go back toblocking mode then privacy implications may be minimized. A givenblocker may default to remaining in pass-through mode, unless itaffirmatively confirms that a different listener is intended alternateto negatively confirming that the given blocker is the one intended, andthis may allow the blocker to reduce false negatives (e.g., missedtriggers).

The blocker may also analyze the signals from the input device to thelistener and determine that they are not compatible with the blocker'scorresponding listener. The blocker may cause blocking mode to resume.For example, if the command “lights on” is detected, the blocker for astereo that has no lights may go back to blocking mode.

Benefit of Permission Granularity

The blocker being in blocking mode and/or preventing the one or morelistener's processors from accessing data from the listener's inputdevices may have the benefit of providing the user with more granularpermissions for the listener and/or the listener's softwareapplications, as compared to the configuration options the listenerincludes for the user. For example, the listener may have a singlesoftware permission setting for each application indicating whether theapplication can make use of a camera input device and/or the associatedcamera flashlight. However with the blocker, the user may be able togive a software application operating system defined permissions for thecamera and flashlight pair, but the application would only be able tosignal the flashlight to flash and not be able to access the camerawhile in blocking mode. As another example, a user would be able toenable location services on a phone's operating system for a softwareapplication that needs Bluetooth beacons to operate and which may beused to track positions of the user and therefore requires locationservices, and still block the application from using the GPSpositioning.

Additional Examples of Combinations

The following are intended to be non-limiting examples that combinevarious embodiments and/or features as described herein.

As a first example, a stationary smart speaker with a microphone and amute button, has a voice activated blocker. The blocker may be poweredby USB, contains a microphone, has an LED light that is turned onanytime the blocker is in pass-through mode, automatically presses thesmart speaker's mute button anytime the mode switches to pass-throughmode as a result of the user saying a wakeword, automatically processesthe smart speaker's mute button to switch back to blocking mode after aperiod of time has elapsed, and/or requires that a light sensor (whichis positioned to detect whether the smart speaker has indicated to theuser it has received a command) is activate and if not the blockerterminates pass-through mode sooner.

As a second example, a user-handled phone with input devices ofmicrophone and/or GPS may have a voice activated blocker. The blockermay draw power from a circuit on the phone, intercept signals betweenthe phone's input devices and the phone's processor while in blockingmode, monitor the microphone signal for a wakeword, switch topass-through mode upon a user saying that wakeword, and go back toblocking mode upon a terminating trigger being spoken and/or a period oftime having elapsed.

As a third example, a user-handled phone with a microphone and camera asinput components may have a gesture activated blocker. The blocker maydraw power from the phone's battery, have no microprocessor, interceptsignals between the phone's input devices and the circuits that go tothe phone's processing, and have at least an accelerometer. The blockermay stay in blocking mode while the phone is stationary, is on anapproximately level surface face up or down for a minimum of 2 seconds,while the phone is upside down whether stationary or moving, and/orwhile the phone was recently upside down but is now sideways and/oranother position but has not (since being upside down) been at leastwithin 10 degrees of right side up. As an extension of this example butwith the blocker having a microprocessor, the blocker may also use thephone's microphone to determine if a voice trigger is overriding thegesture triggers, the blocker may detect a 2 second prolonged shake toforce pass-through mode for a predetermined and/or predefined amount oftime (e.g., 2 hours) from the time of each shake, and, if the phone isupside down, it is has a more sensitive threshold for each shake.

Inspection of a Listener Device

A listening device may undergo an inspection determine what privacydesignation to associate with the listener. Such inspection may bethrough physical inspection of a listener and/or inspection of alistener's schematics. The steps of the inspection need not be performedin the order listed here. A inspector may inspect the listening designto determine if specific pins of a processor go to one or more inputdevices (sensors) directly and/or have a path to one or more sensorsthat can be examined the entire length and without unexamined gaps. Aninspector may examine that the circuitry that is directly or indirectlyconnected to the sensors is sufficiently isolated such that certaincomponents in between the sensor and processor cannot be bypassed. Aninspector may examine that the certain in between components provide theuser sufficient feedback at any point that the sensor is providing asignal to the processor. An inspector may examine that a blocker'smicroprocessor, separate to the listening device's primary processor, isunable to be reprogrammed or have software updated through any of thecircuitry that is connected to the blocker's microprocessor. If all ofthe above are true, the listening device may be assigned a high privacymetric.

Miscellaneous

The robotic button pusher that may push a listening device's mutebutton, may also be a robotic toggle switcher, a camera-shutter slider,and/or a variety of equivalent physical manipulators that correspond tothe manipulated controls on a listening device.

The blocker's processor and listener's processor both may or may not beon the same shared circuit board.

The blocker's processor and listener's processor may have otherprotections and/or separations to ensure the listener is not able toaffect the blocker's operation.

DESCRIPTION OF FIGURES

FIGS. 1-6, as provided below, may be used to implement the featuresdescribed above. FIG. 1 depicts an illustrative system where a blockerdevice 101 is integrated to the listening device 102. FIG. 1 may, forexample, implement the features described above with respect to a deviceintegrated into a listening device, and may implement the featuresdescribed in other sections herein. The listening device 102 may includea processor 103, a power supply connection 107, one or more microphones106, among other components. The processor 103, and other elements ofthe listening device 102, may be different than similar elements of theblocker device 101. For example, the listening device 102 and theblocker device 101 may both have processors, albeit differentprocessors. The listening device may connect to a listening deviceserver 109 via a WAN. The listening device 102 may provide the blockerdevice 101 with power through a power connection 108. The blocker mayhave one or more microphones 104, which may be used by the blocker whilein both pass-through mode as well as in blocking mode. The one or moremicrophones 106 may have one or more connections 105 to the processor103 through the blocker device 101 as an intermediary and which theprocessor 103 can only utilize when the blocker device 101 is inpass-through mode. The one or more microphones 106 may, e.g., beconnected by two wires 105, and the blocker device 101 may only need tobe in-line with one segment (the output segment, which may also be knownas the signal wire) of the circuit between the processor 103 and the oneor more microphones 106, while the other wire may go directly to theprocessor 103 but is not able to independently provide the processor 103with sound information.

FIG. 2 depicts an illustrative system where a blocker 201 is able to beintegrated with the listening device 202. The blocker 201 may generallycorrespond to integrated forms of the blocker, as discussed above, andmay implement the features described in other sections herein. Thelistening device 202 may include a processor 203, a power supplyconnection 207, and one or more microphones 206 (e.g., a set ofmicrophones), among other components. The listening device 202 may alsohave module socket that can accept a bypass module 210 and/or a privacymodule 211. The listening device 202 may connect to a listening deviceserver 209 via a WAN. The listening device 202 may provide the blocker201 with power through power supply connectors 208 of the listeningdevice 202 that connect to power receiving connectors 212 of the bypassmodule 210, which contains the blocker 201. The power supply connectors208 may connect to nothing in the case that the privacy module 411 isinstalled. The one or more microphones 206 may have one or moreconnections 205, shown as two wires in FIG. 2, which may go toconnectors of the module socket, which would connect to the respectiveconnectors on the bypass module 210 and/or privacy module 211. Themodule socket may also have one or more additional connections betweentwo more connectors of the module socket to the processor 203. Thebypass module 210 and privacy module 211 may have protrusions 213 whichmay aid a clip 204 in fastening the module into the module socket of thelistening device 202. If the bypass module 210 is installed in themodule socket, then the one or more microphones 206 and listeningdevice's processor 203 may be connected to each other without anyintermediary. If the privacy module 211 is installed in the modulesocket, then both of the wires from the one or more microphones 206 havethe blocker 201 as an intermediary to their connection to the listeningdevice's processor 203.

FIG. 3 depicts an illustrative system where a blocker device 301 is nottightly integrated with the listening device 302. The blocker 301 maygenerally correspond to non-integrated forms of the blocker, discussedabove, and may implement the features described in other sectionsherein. The listening device 302 may include a processor 303, a powersupply connection 307, and one or more microphones 306, among othercomponents. The listening device 302 may connect to a listening deviceserver 309 via a wide area network. The blocker device may include oneor more microphones 304, which may be set of microphones or the like,one or more speakers 305, and a power supply 308. The blocker device 301may play noise through its speaker 305 to jam the one or moremicrophones 306 from receiving sound from the environment, and may stopplaying noise when it detects a trigger using the one or moremicrophones 304.

FIG. 4 shows a different way in which a blocker 401 may be integrated toa listening device 402. The blocker 401 may generally correspond tointegrated forms of the blocker, discussed above, and may implement thefeatures described in other sections herein. The listening device 402may include a processor 403, a power supply connection 407, and one ormore microphones 406, among other components. The listening device mayalso have module socket that can accept a bypass module 410 and/or aprivacy module 411. The listening device 402 may connect to a listeningdevice server 409 via a WAN. The listening device 402 may provide theblocker 401 with power through the power supply connectors 408 of thelistening device 402 that connect to power receiving connectors 412 ofthe privacy module 411, which contains the blocker 401. The power supplyconnectors 408 may connect to nothing in the case that the bypass module410 is installed. The one or more microphones 406 may have one or moreconnections 405, in this case a one wire connection, which go to aconnector of the module socket and connect to the respective connectoron the bypass module 410 and/or the privacy module 411. One or morespeakers of the listening device 402 may have a connection 414, in thiscase shown as a one wire connection, which goes to a connector of themodule socket, which would connect to the respective connector on thebypass module 410 and/or privacy module 411. The module socket may alsohave connections between two more connectors of the module socket to theprocessor 403. The bypass module 410 and privacy module 411 may haveprotrusions 413 which may, in conjunction with the clip 404, fasten themodule into the module socket of the listening device 402. If the bypassmodule 410 is installed in the module socket, then the one or moremicrophones 406 and speakers may be connected to the listening device'sprocessor 403 without any intermediary. If the privacy module 411 isinstalled in the module socket, then both the one or more microphones406 and speakers have the blocker 401 as an intermediary to theirconnection to the listening device's processor 403. The privacy module411, and/or the blocker 401 within it, may connect via a wirelessconnection 417, such a Bluetooth connection, to the one or moremicrophones 416; the one or more microphones 416 may assist with triggerdetection while the blocker is in blocking mode, and/or alternativelythe privacy module may use its connection to the one or more microphones416 to replace the need to connect to the listening device's one or moremicrophones 406. The privacy module 411 and/or the blocker 401 may lackthe ability to connect 415 to a WAN.

FIG. 5 shows hardware elements of a computing device 500 that may beused to implement any of the devices shown in FIGS. 1-4. For example, alistening device may, but need not, comprise a computing device.Similarly, the blocker may, but need not, be implemented as a computingdevice, such that the processors discussed above with respect to theblocker may be the same or similar as processors described with respectto FIG. 5, and/or the blocker's processor as shown in FIGS. 1-4 may be,but need not, comprise a computer device. The computing device 500 maycomprise one or more processors 501, which may execute instructions of acomputer program to perform any of the functions described herein. Theinstructions may be stored in a read-only memory (ROM) 502, randomaccess memory (RAM) 503, removable media 504 (e.g., a USB drive, acompact disk (CD), a digital versatile disk (DVD)), and/or in any othertype of computer-readable medium or memory. Instructions may also bestored in an attached (or internal) hard drive 505 and/or other types ofstorage media. The computing device 500 may comprise one or more outputdevices, such as a display device 506 (e.g., an external televisionand/or other external or internal display device) and a speaker 514, andmay comprise one or more output device controllers 507, such as a videoprocessor. One or more user input devices 508 may comprise a remotecontrol, a keyboard, a mouse, a touch screen (which may be integratedwith the display device 506), microphone, etc. The computing device 500may also comprise one or more network interfaces, such as a networkinput/output (I/O) interface 510 (e.g., a network card) to communicatewith an external network 509. The network I/O interface 510 may be awired interface (e.g., electrical, radio frequency (RF), optical (viafiber)), a wireless interface, or a combination of the two. The networkI/O interface 510 may comprise a modem configured to communicate via theexternal network 509. The external network 509 may comprisecommunication links to, e.g., the external network 509, an in-homenetwork, a network provider's wireless, coaxial, fiber, or hybridfiber/coaxial distribution system, or any other desired network. Thecomputing device 500 may comprise a location-detecting device, such as aglobal positioning system (GPS) microprocessor 511, which may beconfigured to receive and process global positioning signals anddetermine, with possible assistance from an external server and antenna,a geographic position of the computing device 500.

Although FIG. 5 shows an example hardware configuration, one or more ofthe elements of the computing device 500 may be implemented as softwareor a combination of hardware and software. Modifications may be made toadd, remove, combine, divide, etc. components of the computing device500. Additionally, the elements shown in FIGS. 1-4 may be implementedusing basic computing devices and components that have been configuredto perform operations such as are described herein. For example, amemory of the computing device 500 may store computer-executableinstructions that, when executed by the processor 501 and/or one or moreother processors of the computing device 500, cause the computing device500 to perform one, some, or all of the operations described herein.Such memory and processor(s) may also or alternatively be implementedthrough one or more Integrated Circuits (ICs). An IC may be, forexample, a microprocessor that accesses programming instructions orother data stored in a ROM and/or hardwired into the IC. For example, anIC may comprise an Application Specific Integrated Circuit (ASIC) havinggates and/or other logic dedicated to the calculations and otheroperations described herein. An IC may perform some operations based onexecution of programming instructions read from ROM or RAM, with otheroperations hardwired into gates or other logic. Further, an IC may beconfigured to output image data to a display buffer.

Additionally or alternatively, the blocker device may be implementedusing circuitry (e.g., special-purpose circuitry) configured to performthe features described herein. For example, the blocker may comprise anApplication-Specific Integrated Circuit (ASIC) specially configured todetect and process one or more sounds. As another example, the blockermay comprise low-level circuitry configured to detect the presence ofsounds. The blocker may be configured without memory in order to preventmodification of the memory by, for example, unauthorized parties. Inother words, while FIG. 5 depicts a computing device, neither theblocker device nor the listening device need be a computing device. Forexample, the blocker device may be entirely configured using circuitrysuch that users of the blocker device are reassured that the blockerdevice cannot store and transmit audio data to third parties.

As noted above, a blocking device may be installed to preventcommunications (e.g., signals) from reaching a listening device. FIG. 6shows a flow chart of a process 600 for intercepting signals intendedfor a listening device. Some or all of the steps of process 600 may beperformed using one or more computing devices described herein, such asblocking device 101.

In step 610, a blocking device, such as blocking device 101, may receivea first signal. The first signal may be audio data, video data, or someother communication received from a microphone. The microphone may bepart of a module installed in the listening device. In some instances,the module may be a blocking device installed between the microphone anda processor of the listening device. Additionally or alternatively, themicrophone may be part of the listening device. Alternatively, themicrophone may be a microphone of the blocking device configuredintercept the signal intended for the listening device. In this regard,the microphone may replace a microphone associated with the blockingdevice. Intercepting the signal intended for the listening device mayinclude preventing one or more signals from the first microphone frombeing received by the listening device. In this regard, the blockingdevice may be configured to intercept the signals by interrupting one ormore wires of the listening device.

In step 620, the blocking device may determine whether the signalmatches a trigger. As noted above, the trigger may be an audio commandrecognized by the blocking device. The trigger may be used to activate ablocking mode of the blocking device, which may prevent signals fromreaching the listening device. Similarly, the trigger may be used todeactivate the blocking mode. With the blocking mode deactivated, theblocking device may permit signals to pass-through the blocking deviceand on to the listening device. Determining whether the signal matchesthe trigger may comprise detecting one or more sounds associated with anaudio trigger using one or more of the techniques described above. Insome instances, the audio trigger corresponds to a command for thelistening device. In preferred embodiments, the command may be one ormore spoken words. If the signal does not match the trigger, theblocking device may prevent the signal from reaching a listening devicein step 625. The blocking device may use any of the blocking techniquesdescribed above, such as active blocking, passive blocking, etc. In someinstances, preventing the signal from reaching the listening device maycomprise preventing the listening device from receiving the entiresignal. In this regard, the blocking device may be configured to removea portion of the one or more signals from the first microphone beforetransmitting the one or more signals to the listening device. When thesignal does match the trigger, the blocking device may deactivate theblocking mode.

In step 630, the blocking device may receive a second signal from themicrophone. The second signal may be received after the blocking devicehas been deactivated. Much like the first signal, the second signal maybe audio data, video data, and/or some other communication received fromthe microphone. In step 640, the blocking device may determine whetherthe second signal matches the trigger. If so, the computing device mayre-activate the blocking mode and return to step 625. Accordingly, thesecond signal may be prevented, in whole or in part, from reaching thelistening device. The blocking device may begin monitoring for thetrigger again.

However, when the second signal does not match the trigger, the blockingdevice may send the second signal to the listening device in step 650.Sending the second signal to the listening device may comprisepermitting one or more second signals to be received by the listeningdevice. As shown in FIG. 6, process 600 may continue to allow signals topass to the listening device until the blocking device receives thetrigger to reactivate blocking mode. In some examples, the blockingdevice may permit one or more second signals to be received by thelistening device for a temporary period of time. At the conclusion ofthe period of time, the blocking device may reactivate blocking mode tointercept and prevent any signals from reaching the listening device.

FIG. 7 shows an example for intercepting signals intended for alistening device. Some or all of the steps of process 700 may beperformed using one or more computing devices described herein, such asblocking device 101.

In step 710, blocking circuitry may receive a first signal. The blockingcircuitry may be located in the same housing as one or more processorsof a smart device. The blocking circuitry may ground each communicationpath between at least one microphone and the one or more processors ofthe smart device while in an untriggered state. In some embodiments, theblocking circuitry may indicate when electrical activity associated withthe at least one microphone is detected. Additionally or alternatively,the blocking circuitry may indicate when the blocking circuitry is inthe triggered state. The block circuitry may be incapable ofcommunication over a network used by the smart device. In otherembodiments, the blocking circuitry may be a removable device adapted toconnect to the smart device via one or more interfaces. The first signalfirst signal may be generated by at least one microphone of a smartdevice. As discussed above, the first signal may include may be audiodata, video data, or some other communication received from a microphonethat is part of a blocking module installed in the listening deviceand/or part of the module installed in the listening device. Theblocking circuitry may be between the at least one microphone and theone or more processors of a smart device.

In step 720, blocking circuitry may determine whether it is in anuntriggered state. When the blocking circuitry is not in an untriggeredstate, the blocking circuitry may allow the first signal to pass to thelistening device in step 725. However, the blocking circuitry mayprevent the first signals from being received by one or more processorsof the smart device in step 730. Preventing receipt of the first signalmay comprise grounding at least a portion of a circuit associated withthe at least one microphone. Additionally or alternatively, preventingreceipt of the first signal may comprise outputting third signal to theone or more processors of the smart device. The third signal maycomprise one or more first sounds configured to emulate one or moresecond sounds from an environment associated with the smart device. Afirst volume of the one or more first sounds may be based on a secondvolume of the one or more second sounds. The blocking circuitry maydetermine the one or more first sounds by recording, for a period oftime in the untriggered state, the one or more second sounds.

In step 740, the blocking circuitry may detect a first triggerassociated with activating the blocking circuitry. The first trigger maybe detected using an input device of the blocking circuitry. The firsttrigger may be different from a second trigger associated withactivating the smart device. The first trigger may be an audio triggerreceived from at least one microphone. The audio trigger may be acommand spoken by a user. The command may be spoken within apredetermined distance of the smart device. The first trigger may beconfigurable by a user. The smart device may comprise the at least onemicrophone. The blocking circuitry may process the audio trigger, forexample, using a speech recognition algorithm. The blocking circuitrymay determine that one or more words in the audio trigger are associatedwith the triggered state, for example, based on the processing. In someembodiments, the first trigger may correspond to a movement detected byan optical sensor of the blocking circuitry. Additionally oralternatively, the first trigger may correspond to a movement detectedby a wearable device.

In step 750, the blocking circuitry may temporarily enter a triggeredstate based on detecting the first trigger. The blocking circuitry maybe configured to temporarily enter the triggered state and allow receiptof the second signals by determining that the smart device did notoutput the first trigger, for example, based on processing the firsttrigger to determine an origin of the first trigger. The blockingcircuitry may be configured to temporarily enter the triggered state andallow receipt of the second signals by processing the second signal toobscure an identity of at least one user, and outputting the processedsecond signals to the one or more processors of the smart device. Instep 760, the blocking circuitry may allow one or more processors of thesmart device to receive the second signals generated by the at least onemicrophone. After a time period associated with the triggered state haselapsed, the blocking circuitry may return to the untriggered state.

FIG. 8 shows an example for intercepting signals intended for alistening device. Some or all of the steps of process 800 may beperformed using one or more computing devices described herein, such asblocking device 101.

In step 810, a blocking device may receive a first signal. The firstsignal may be received via at least one first microphone of a blockingdevice. The blocking device may ground each communication path betweenat least one microphone and the one or more processors of the smartdevice while in an untriggered state. In some embodiments, the blockingcircuitry may indicate when electrical activity associated with the atleast one microphone is detected. Additionally or alternatively, theblocking circuitry may indicate when the blocking circuitry is in thetriggered state. The block circuitry may be incapable of communicationover a network used by the smart device. In other embodiments, theblocking circuitry may be a removable device adapted to connect to thesmart device via one or more interfaces. The first signal first signalmay be generated by at least one microphone of a smart device.

In step 820, the blocking device may determine that the first signalcorresponds to one or more sounds of an environment associated with asmart device. A first volume of the o configured to be greater than thevolume of the one or more sounds. The blocking device may record thefirst signal for a period of time, for example, if the blocking deviceis in an untriggered state.

In step 830, the blocking device may output the first signal to at leastone second microphone of the smart device. The blocking device mayoutput the first signal using an output device of the blocking device. Afirst volume of the first outputted signal may be configured to begreater than the volume of the one or more environmental sounds. Theblocking may select the one or more first signals to output based on thevolume of the one or more first signals satisfying a threshold. Thefirst signal may be based on the one or more sounds of the environmentassociated with the smart device. In some embodiments, the firstoutputted signal may be configured to emulate speech by one or moreusers of the smart device. The first signal may be configured to impedereceipt, by the at least one second microphone, of environmental audiowhile the blocking device is in an untriggered state. Impeding receiptof the environmental audio may comprise shielding at least a portion ofthe at least one first microphone.

In step 840, the blocking device may detect a first trigger associatedwith activating the blocking device. The first trigger may be detectedusing an input device of the blocking device. The first trigger may bedifferent from a second trigger associated with activating the smartdevice. The first trigger may be an audio trigger received from at leastone microphone. The audio trigger may be a command spoken by a user. Thecommand may be spoken within a predetermined distance of the smartdevice. The first trigger may be configurable by a user. The smartdevice may comprise at least one microphone. The blocking device mayprocess the audio trigger, for example, using a speech recognitionalgorithm. The blocking device may determine that one or more words inthe audio trigger are associated with the triggered state, for example,based on the processing. In some embodiments, the first trigger maycorrespond to a movement detected by an optical sensor of the blockingcircuitry. Additionally or alternatively, the first trigger maycorrespond to a movement detected by a wearable device.

In step 850, the blocking device may temporarily enter a triggered statebased on detecting the first trigger. The blocking device may beconfigured to temporarily enter the triggered state and allow receipt ofthe second signals by determining that the smart device did not outputthe first trigger, for example, based on processing the first trigger todetermine an origin of the first trigger. The blocking device may beconfigured to temporarily enter the triggered state and allow receipt ofthe second signals by processing the second signal to obscure anidentity of at least one user, and outputting the processed secondsignals to the one or more processors of the smart device. In step 860,the blocking device may allow one or more processors of the smart deviceto receive the second signals generated by the at least one microphone.After a time period associated with the triggered state has elapsed, theblocking circuitry may return to the untriggered state.

FIG. 9 shows an example for intercepting signals intended for alistening device. Some or all of the steps of process 900 may beperformed using one or more computing devices described herein, such asblocking device 101.

In step 910, a blocking device may detect a first signal. Detecting thefirst signal may comprise detecting first electrical signals associatedwith a communications path between at least one microphone of a smartdevice and one or more processors of the smart device. Additionally oralternatively, detecting the first signal may comprise monitoring one ormore circuits of the smart device. In some embodiments, detecting thefirst signal may comprise monitoring a power use of the smart device.

In step 920, the block device may determine that blocking circuitryprevents receipt of first signal while the blocking circuitry is in anuntriggered state. Preventing receipt of the first signal may compriseeach communication path between the at least one microphone and the oneor more processors being conducted via the blocking circuitry.Preventing receipt of the first signal may comprise grounding at least aportion of a circuit associated with the at least one microphone.

In step 930, the blocking device may detect a second signal. The secondsignal may be one or more electrical signals associated with thecommunications path between the at least one microphone of the smartdevice and the one or more processors of the smart device.

In step 940, the blocking device may detect a first trigger based on thesecond signal. Detecting the first trigger based on the second signalmay comprise determining that the blocking circuitry detects a firsttrigger, for example, based on the second signal. The second signals maybe detected using an input device of the blocking circuitry. The firsttrigger may be associated with activating the blocking circuitry. Thefirst trigger may be different from a second trigger associated withactivating the smart device. The first trigger may comprise an audiotrigger received from at least one second microphone, an optical sensorof the blocking circuitry, and/or a movement detected by a wearabledevice.

In step 950, the blocking device may enter a triggered state based ondetecting the first trigger. The blocking device may be configured totemporarily enter the triggered state. The blocking device may beconfigured to temporarily enter the triggered state and allow receipt ofthe second signals by processing the second signal to obscure anidentity of at least one user, and outputting the processed secondsignals to the one or more processors of the smart device. In step 960,the blocking device may receive a third signal. In step 970, theblocking device may allow one or more processors of the smart device toreceive the third signal. In some instances, the blocking device mayassign, a privacy level to the blocking circuitry, for example, based onthe first signal, the second signal, and/or the third signal. After atime period associated with the triggered state has elapsed, theblocking may resume and process 900 may start over again.

FIG. 10 shows an example for intercepting signals intended for a mobiledevice. Some or all of the steps of process 1000 may be performed usingone or more computing devices described herein, such as blocking device101 and/or device 500.

In step 1010, a device, such as blocking device 101, may detect aposition and/or orientation of a device, such as a mobile device (e.g.,smart phone, cellular phone, tablet, laptop, etc.). As discussed above,the position and/or orientation of the device may be determined usingone or more sensors, such as an accelerometer located on the device. Insome instances, detecting the position and/or orientation of the devicemay include determining whether the device has been stationary for apredetermined amount of time and/or which way the device is facing(e.g., face up, face down, on its side, at an angle, etc.). In furtherexamples, detecting a position and/or orientation of the device mayinclude determining a first orientation and a second orientation of thedevice. The device may determine whether the second orientation of themobile device satisfies a threshold, such as the device being held at apredetermined angle (e.g., ≥10 degrees). If the second orientation doesnot satisfy the threshold, the device may remain in blocking mode.However, if the second orientation does satisfy the threshold, thedevice may enter a triggered state, such as a pass-through mode.

In step 1020, the device (e.g., blocking device 101) may receive one ormore first signals. The one or more first signals may be received via atleast one first microphone of a blocking device. Additionally oralternatively, the one or more first signals may be received via amicrophone of a device, such as device 500 (e.g., a mobile device). Insome instances, the one or more first signals may be obtained by animage capture device of the mobile device. In step 1030, the device(e.g., block device 101) may determine whether the device is in ablocking mode. As discussed above, the blocking mode may be a defaultoperation of the blocking device. Additionally or alternatively, theblocking mode may be entered in response to one or more user inputs. Ifthe device (e.g., blocking device 101) is not in blocking mode, theblocking device may allow the one or more signals to be received by aprocessor of the mobile device in step 1035.

However, when the blocking device is in a blocking mode, the blockingdevice may intercept the one or more first signals in step 1040.Intercepting the one or more signals may include preventing receipt ofthe one or more first signals by one or more processors of the mobiledevice. The one or more signals may be prevented from reaching the oneor more processors by interrupting a transmission medium of the mobiledevice, interrupting one or more wires of the mobile device, and/orgrounding at least a portion of a circuit associated with the via one ormore inputs of the mobile device. In some embodiments, the blockingcircuitry may indicate when electrical activity associated with the atleast one microphone is detected.

In step 1050, the blocking device may detect a trigger associated with atriggered state. The trigger may comprise a gesture input, such as ashaking movement and/or other repetitive motions. Additionally oralternatively, the gesture input may be a series and/or sequence ofpositions and/or orientations of the mobile device. In further examples,the trigger may also comprise an audio trigger. The audio trigger may bereceived via one or more inputs of the blocking device and/or the mobiledevice. The audio trigger may comprise a command spoken by a user withina predetermined distance of the mobile device. In some instances, theaudio trigger may override one or more of the gesture inputs. If nottrigger is detected in step 1050, process 1000 may return to step 1020.However, when a trigger is detected in step 1050, process 1000 mayproceed to step 1060.

In step 1060, the blocking device may enter a triggered state. Asmentioned above, the triggered state may be a pass-through mode thatallows one or more signals to be transmitted to one or more processorsof the mobile device. In some instances, the blocking device may beconfigured to temporarily enter the triggered state to allow receipt ofone or more second signals. In step 1060, the blocking device mayreceive one or more second signals. Much like the one or more firstsignals discussed above, the one or more second signals may be receivedvia at least one microphone of the blocking device and/or the mobiledevice. Additionally or alternatively, the one or more second signalsmay be obtained by an image capture device of the mobile device. In step1070, the blocking device may allow one or more processors of the mobiledevice to receive the one or more second signals received via one ormore inputs. After a time period associated with the triggered state haselapsed, the blocking device may return to the untriggered state andprocessing may begin again at step 1010.

By using the devices, processes, and techniques discussed herein, agreater level of privacy may be obtained from in-home listening devices,such as smart speakers, personal assistants, and the like.

While the term “blocking device,” “listening device,” processorsthereof, and microphones thereof have been described herein such that,e.g., the blocking device is described as having a processor and thelistening device is also described as having a different processor, thedevices described herein may be modified. For example, phrases hereinrelating to the blocker's processor may relate to the blocking device asa whole, or vice versa. Similarly, as another example, phrases hereinrelating to the listening device's processor may relate to the listeningdevice as a whole, and vice versa. The one or more microphones and/orthe one or more cameras described herein may be inside, attached to, orremote from any of the devices herein. For example, as noted above, oneor more of the microphones may be wireless.

Example Embodiments

Hereinafter, various characteristics will be highlighted in a set ofnumbered clauses or paragraphs. These characteristics are not to beinterpreted as being limiting on the invention or inventive concept, butare provided merely as a highlighting of some characteristics asdescribed herein, without suggesting a particular order of importance orrelevancy of such characteristics.

Clause 1. A blocking device comprising intercept circuitry configured toprevent environmental audio from being transmitted from a microphone toa listening device; listening circuitry configured to determine, usingthe microphone, an audio trigger in the environmental audio; and outputcircuitry configured to allow, based on the audio trigger, secondenvironmental audio to be received by the listening device.

Clause 2. The blocking device of clause 1, wherein the interceptcircuitry is configured to prevent the environmental audio from beingtransmitted from the microphone to the listening device by interceptinga signal from the microphone to the listening device.

Clause 3. The blocking device of any one of clauses 1-2, whereinintercepting the signal comprises interrupting a transmission medium ofthe listening device.

Clause 4. The blocking device of any one of clauses 1-3, wherein thedevice is configured to, when installed in the second computing device,prevent the environmental audio from being transmitted from themicrophone to the listening device.

Clause 5. The blocking device of any one of clauses 1-4, wherein theintercept circuitry is further configured to prevent, after apredetermined time period and after allowing the second environmentalaudio to be received by the listening device, third environmental audiofrom being received by the listening device.

Clause 6. The blocking device of any one of clauses 1-5, wherein thelistening device is connected to a network, and wherein the blockingdevice is not connected to the network.

Clause 7. The blocking device of any one of clauses 1-6, wherein thelistening circuitry is configured to ignore audio originating from thelistening device.

Clause 8. The blocking device of any one of clauses 1-7, wherein theaudio trigger comprises a spoken command.

Clause 9. The blocking device of any one of clauses 1-8, wherein thelistening circuitry is configured to use a speech recognition algorithmon the spoken command to determine the audio trigger.

Clause 10. A computing device comprising one or more processors andmemory storing instructions that, when executed by the one or moreprocessors, cause the computing device to prevent one or more soundsfrom being transmitted from a microphone to a second computing device;monitor the one or more sounds via the microphone; determine that theone or more sounds are associated with an audio trigger; and allow,based on the audio trigger, one or more second sounds to be received bythe second computing device via the microphone.

Clause 11. The computing device of clause 10, wherein the instructions,when executed by the one or more processors, cause the computing deviceto monitor the one or more sounds via the microphone by interceptingsignals transmitted from the microphone to the second computing device.

Clause 12. The computing device of any one of clauses 10-11, wherein thecomputing device is connected to the second computing device via awireless network, and wherein the computing device is configured toappear, to the second computing device, as a second microphone.

Clause 13. The computing device of any one of clauses 10-12, wherein thecomputing device is a module installed into the second computing device.

Clause 14. The computing device of any one of clauses 10-13, wherein theinstructions, when executed by the one or more processors, further causethe computing device to: ignore, based on determining that one or moresecond sounds originated from the second computing device, the one ormore second sounds.

Clause 15. The computing device of any one of clauses 10-14, wherein theinstructions, when executed by the one or more processors, cause thecomputing device to allow the one or more second sounds to be receivedby the second computing device by causing the computing device to:transmit, via one or more speakers, the one or more second sounds to asecond microphone associated with the second computing device.

Clause 16. The computing device of any one of clauses 10-15, wherein theinstructions, when executed by the one or more processors, cause thecomputing device to allow the one or more second sounds to be receivedafter one or more third sounds are received by the microphone.

Clause 17. The computing device of any one of clauses 10-16, wherein theinstructions, when executed by the one or more processors, cause thecomputing device to allow the one or more second sounds to be receivedby the second computing device by transmitting, based on the one or moresecond sounds, one or more third sounds to the second computing device.

Clause 18. The computing device of any one of clauses 10-17, wherein theone or more third sounds comprise text-to-speech data generated based onthe one or more second sounds.

Clause 19. The computing device of any one of clauses 10-18, wherein theinstructions, when executed by the one or more processors, cause thecomputing device to allow the one or more second sounds to be receivedby the second computing device by excluding a portion of the one or moresecond sounds associated with the audio trigger.

Clause 20. A system comprising: a first computing device comprising afirst microphone; one or more first processors; and first memory storinginstructions that, when executed by the one or more first processors,cause the first computing device to receive audio content via the firstmicrophone; and a second computing device comprising: a secondmicrophone; one or more second processors; and second memory storinginstructions that, when executed by the one or more second processors,cause the second computing device to: intercept signals from the firstmicrophone to the first computing device; detect, using the secondmicrophone, one or more second sounds associated with an audio trigger;and permit, based on the audio trigger, the first computing device toreceive one or more third sounds.

Clause 21. The system of clause 20, wherein permitting the firstcomputing device to receive the one or more third sounds comprises:generating, based on the one or more second sounds, the one or morethird sounds.

Clause 22. The system of any one of clauses 20-21, wherein the secondcomputing device is installed into the first computing device, andwherein the first microphone and the second microphone are the same.

Clause 23. The system of any one of clauses 20-22, wherein interceptingthe signals from the first microphone to the first computing devicecomprises: transmitting, to the first computing device, one or morefourth sounds.

Clause 24. The system of any one of clauses 20-23, wherein the one ormore fourth sounds are based on sounds recorded by the second computingdevice.

Clause 25. The system of any one of clauses 20-24, wherein interceptingthe signals from the first microphone to the first computing devicecomprises: activating a mute functionality of the first computingdevice.

Clause 26. The system of any one of clauses 20-25, wherein the one ormore second sounds are spoken by a user, and wherein the audio triggeris defined by the user.

Clause 27. The system of any one of clauses 20-26, wherein permittingthe first computing device to receive the one or more third sounds isbased on determining that the one or more third sounds did not originatefrom a speaker associated with the first computing device.

Clause 28. The system of any one of clauses 20-27, wherein interceptingthe signals from the first microphone to the first computing devicecomprises disabling the first microphone.

Clause 29. A method comprising intercepting, by a blocking device,communications between a first microphone and a listening device,wherein the blocking device is configured intercept the communicationsby preventing one or more signals from the first microphone from beingreceived by the listening device; detecting, using the first microphoneand by the blocking device, one or more sounds associated with an audiotrigger; and permitting, based on detecting the one or more soundsassociated with the audio trigger, one or more second signals to bereceived by the listening device.

Clause 30. The method of clause 29, wherein the blocking device and thefirst microphone are part of a module installed in the listening device.

Clause 31. The method of any one of clauses 29-30, wherein a user isinstructed to install the module in the listening device viainstructions accompanying the blocking device.

Clause 32. The method of any one of clauses 29-31, wherein thepermitting the one or more second signals to be received by thelistening device is for a temporary period of time.

Clause 33. The method of any one of clauses 29-32, wherein the blockingdevice is configured to intercept the communications by interrupting oneor more wires of the listening device.

Clause 34. The method of any one of clauses 29-33, wherein the firstmicrophone replaces a second microphone associated with the listeningdevice.

Clause 35. The method of any one of clauses 29-34, further comprising:preventing communications between the second microphone and thelistening device.

Clause 36. The method of any one of clauses 29-35, wherein the audiotrigger corresponds to a command for the listening device.

Clause 37. The method of any one of clauses 29-36, wherein the commandis one or more spoken words.

Clause 38. The method of any one of clauses 29-37, wherein the blockingdevice comprises circuitry configured to detect the one or more sounds.

Clause 39. The method of any one of clauses 29-38, wherein the blockingdevice is configured to remove a portion of the one or more signals fromthe first microphone before transmitting the one or more signals to thelistening device.

Clause 40. The method of any one of clauses 29-30, wherein the blockingdevice is installed via an interface of the listening device.

Clause 41. A smart device comprising: at least one microphone; one ormore processors; and blocking circuitry configured to: prevent receipt,by the one or more processors, of first signals generated by the atleast one microphone while the blocking circuitry is in an untriggeredstate, wherein each communication path between the at least onemicrophone and the one or more processors is conducted via the blockingcircuitry; detect, using an input device of the blocking circuitry, afirst trigger associated with activating the blocking circuitry, whereinthe first trigger is different from a second trigger associated withactivating the smart device; and based on detecting the first trigger,temporarily enter a triggered state and allow receipt, by the one ormore processors, of second signals generated by the at least onemicrophone.

Clause 42. The smart device of clause 41, wherein the first triggercomprises an audio trigger received from at least one second microphone.

Clause 43. The smart device of any one of clauses 41-42, wherein theaudio trigger comprises a command spoken by a user within apredetermined distance of the smart device.

Clause 44. The smart device of any one of clauses 41-43 claim 2, whereinthe blocking circuitry further comprises the at least one secondmicrophone.

Clause 45. The smart device of any one of clauses 41-44, wherein theblocking circuitry is configured to detect the first trigger associatedwith activating the blocking circuitry by: processing, using a speechrecognition algorithm, the audio trigger; and determining, based on theprocessing, that one or more words in the audio trigger are associatedwith the triggered state.

Clause 46. The smart device of any one of clauses 41-45, wherein thefirst trigger corresponds to a movement detected by an optical sensor ofthe blocking circuitry.

Clause 47. The smart device of any one of clauses 41-46, wherein thefirst trigger corresponds to a movement detected by a wearable device.

Clause 48. The smart device of any one of clauses 41-47, whereinpreventing receipt of the first signals comprises grounding at least aportion of a circuit associated with the at least one microphone.

Clause 49. The smart device of any one of clauses 41-48, furthercomprising: returning, based on determining that a time periodassociated with the triggered state has elapsed, to the untriggeredstate.

Clause 50. The smart device of any one of clauses 41-49, wherein theblocking circuitry is configured to temporarily enter the triggeredstate and allow receipt of the second signals by: determining, based onprocessing the first trigger to determine an origin of the firsttrigger, that the smart device did not output the first trigger.

Clause 51. The smart device of any one of clauses 41-50, whereinpreventing receipt of signals from the at least one microphone comprisesoutputting, to the one or more processors, third signals comprising oneor more first sounds configured to emulate one or more second soundsfrom an environment associated with the smart device.

Clause 52. The smart device of any one of clauses 41-51, wherein a firstvolume of the one or more first sounds is based on a second volume ofthe one or more second sounds.

Clause 53. The smart device of any one of clauses 41-52, furthercomprising: determining the one or more first sounds by recording, for aperiod of time while the blocking circuitry is in the untriggered state,the one or more second sounds.

Clause 54. The smart device of any one of clauses 41-53, wherein theblocking circuitry is configured to temporarily enter the triggeredstate and allow receipt of the second signals by: processing the secondsignals to obscure an identity of at least one user; and outputting, tothe one or more processors, the processed second signals.

Clause 55. The smart device of any one of clauses 41-54, wherein theblocking circuitry and the one or more processors are located within thesame housing.

Clause 56. The smart device of any one of clauses 51-55, wherein, whenthe blocking circuitry is in the untriggered state, each communicationpath between the at least one microphone and the one or more processorsis grounded.

Clause 57. The smart device of any one of clauses 51-56, wherein theblocking circuitry is further configured to indicate when electricalactivity associated with the at least one microphone is detected.

Clause 58. The smart device of any one of clauses 51-57, wherein theblocking circuitry is further configured to indicate when the blockingcircuitry is in the triggered state.

Clause 59. The smart device of any one of clauses 51-58, wherein theblocking circuitry is incapable of communication over a network used bythe smart device.

Clause 60. The smart device of any one of clauses 51-59, wherein thefirst trigger is configurable by a user.

Clause 61. A method comprising: preventing, by blocking circuitry,receipt, by one or more processors of a smart device, of first signalsgenerated by at least one microphone of the smart device while theblocking circuitry is in an untriggered state, wherein eachcommunication path between the at least one microphone and the one ormore processors is conducted via the blocking circuitry; detecting, bythe blocking circuitry and using an input device of the blockingcircuitry, a first trigger associated with activating the blockingcircuitry, wherein the first trigger is different from a second triggerassociated with activating the smart device; and based on detecting thefirst trigger, temporarily entering, by the blocking device, a triggeredstate and allowing receipt, by the one or more processors, of secondsignals generated by the at least one microphone.

Clause 62. The method of clause 61, wherein the first trigger comprisesan audio trigger received from at least one second microphone.

Clause 63. The method of any one of clauses 61-62, wherein the audiotrigger comprises a command spoken by a user within a predetermineddistance of the smart device.

Clause 64. The method of any one of clauses 61-63, wherein the smartdevice further comprises the at least one second microphone.

Clause 65. The method of any one of clauses 61-64, wherein detecting thefirst trigger comprises: processing, using a speech recognitionalgorithm, the audio trigger; and determining, based on the processing,that one or more words in the audio trigger are associated with thetriggered state.

Clause 66. Blocking circuitry comprising an input device, wherein theblocking circuitry is configured to: prevent receipt, by one or moreprocessors of a smart device, of first signals generated by at least onemicrophone of the smart device while the blocking circuitry is in anuntriggered state, wherein each communication path between the at leastone microphone and the one or more processors is conducted via theblocking circuitry; detect, using the input device of the blockingcircuitry, a first trigger associated with activating the blockingcircuitry, wherein the first trigger is different from a second triggerassociated with activating the smart device; and based on detecting thetrigger, temporarily enter a triggered state and allow receipt, by theone or more processors, of second signals generated by the at least onemicrophone.

Clause 67. The blocking circuitry of clause 66, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 68. The blocking circuitry of any one of clauses 66-67, whereinthe audio trigger comprises a command spoken by a user within apredetermined distance of the smart device.

Clause 69. The blocking circuitry of any one of clauses 66-68, whereinthe smart device further comprises the at least one second microphone.

Clause 70. The blocking circuitry of any one of clauses 66-69, whereinthe blocking circuitry is configured to detect the first triggerassociated with activating the blocking circuitry by: processing, usinga speech recognition algorithm, the audio trigger; and determining,based on the processing, that one or more words in the audio trigger areassociated with the triggered state.

Clause 71. A system comprising: a smart device comprising: at least onemicrophone; one or more processors; and a blocking module interface; anda removable blocking device adapted to connect to the smart device viathe blocking module interface; wherein the removable blocking device isconfigured to, when connected to the blocking module interface: preventreceipt, by the one or more processors, of first signals generated bythe at least one microphone while the removable blocking device is in anuntriggered state, wherein each communication path between the at leastone microphone and the one or more processors is conducted via theblocking module interface; detect, using an input device of theremovable blocking device, a first trigger associated with activatingthe removable blocking device, wherein the first trigger is differentfrom a second trigger associated with activating the smart device; andbased on detecting the first trigger, temporarily enter a triggeredstate and allow receipt, by the one or more processors and via theblocking module interface, of second signals generated by the at leastone microphone.

Clause 72. The system of clause 71, wherein, when the removable blockingdevice is disconnected from the blocking module interface, the one ormore processors receive third signals from the at least one microphoneand via the blocking module interface.

Clause 73. The system of any one of clauses 71-72, wherein connection ofthe removable blocking device to the blocking module interface preventsthe one or more processors from receiving the third signals.

Clause 74. The system of any one of clauses 71-73, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 75. The system of any one of clauses 71-74, wherein the audiotrigger comprises a command spoken by a user within a predetermineddistance of the smart device.

Clause 76. The system of any one of clauses 71-75, wherein the removableblocking device comprises the at least one second microphone.

Clause 77. The system of any one of clauses 71-76, wherein the removableblocking device is configured to detect the first trigger associatedwith activating the removable blocking device by: determining, based onprocessing, using a speech recognition algorithm, the audio trigger,that one or more words in the audio trigger are associated with thetriggered state.

Clause 78. The system of any one of clauses 71-77, wherein the firsttrigger corresponds to a movement detected by an optical sensor of theremovable blocking device.

Clause 79. The system of any one of clauses 71-78, wherein the firsttrigger corresponds to a movement detected by a wearable device.

Clause 80. The system of any one of clauses 71-79, wherein preventingreceipt of the first signals comprises grounding at least a portion of acircuit associated with the at least one microphone.

Clause 81. The system of any one of clauses 71-80, wherein the removableblocking device is further configured to: return, based on determiningthat a time period associated with the triggered state has elapsed, tothe untriggered state.

Clause 82. The system of any one of clauses 71-81, wherein the removableblocking device is configured to temporarily enter the triggered stateand allow receipt of the second signals by: determining, based onprocessing the first trigger to determine an origin of the firsttrigger, that the smart device did not output the first trigger.

Clause 83. The system of any one of clauses 71-82, wherein preventingreceipt of signals from the at least one microphone comprisesoutputting, to the one or more processors, third signals comprising oneor more first sounds configured to emulate one or more second soundsfrom an environment associated with the smart device.

Clause 84. The system of any one of clauses 71-83, wherein a firstvolume of the one or more first sounds is based on a second volume ofthe one or more second sounds.

Clause 85. The system of any one of clauses 71-84 claim 1, wherein theremovable blocking device is configured to temporarily enter thetriggered state and allow receipt of the second signals by: processingthe second signals to obscure an identity of at least one user; andoutput, to the one or more processors, the processed second signals.

Clause 86. The system of any one of clauses 71-85, wherein, when theremovable blocking device is in the untriggered state, eachcommunication path between the at least one microphone and the one ormore processors is grounded.

Clause 87. The system of any one of clauses 71-86, wherein the removableblocking device is further configured to indicate when electricalactivity associated with the at least one microphone is detected.

Clause 88. The system of any one of clauses 71-87, wherein the removableblocking device is further configured to indicate when the removableblocking device is in the triggered state.

Clause 89. The system of any one of clauses 71-88, wherein the removableblocking device is incapable of communication over a network used by thesmart device.

Clause 90. The system of any one of clauses 71-89, wherein the firsttrigger is configurable by a user.

Clause 91. A method comprising: preventing, by a removable blockingdevice physically connected to a blocking module interface of a smartdevice, receipt, by one or more processors of the smart device, of firstsignals generated by at least one microphone of the smart device whilethe removable blocking device is in an untriggered state, wherein eachcommunication path between the at least one microphone and the one ormore processors is conducted via the blocking module interface;detecting, using an input device of the removable blocking device, afirst trigger associated with activating the removable blocking device,wherein the first trigger is different from a second trigger associatedwith activating the smart device; and based on detecting the firsttrigger, temporarily entering, by the removable blocking device, atriggered state and allowing receipt, by the one or more processors andvia the blocking module interface, of second signals generated by the atleast one microphone.

Clause 92. The method of clause 91, further comprising: connecting, viathe blocking module interface, the removable blocking device to thesmart device, wherein connecting the removable blocking device preventsreceipt, by the one or more processors, of third signals from the atleast one microphone.

Clause 93. The method of any one of clauses 91-92, further comprising:disconnecting, via the blocking module interface, the removable blockingdevice from the smart device, wherein disconnecting the removableblocking device allows receipt, by the one or more processors, of thirdsignals from the at least one microphone.

Clause 94. The method of any one of clauses 91-93, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 95. The method of any one of clauses 91-94, wherein the removableblocking device is configured to detect the first trigger associatedwith activating the removable blocking device by: determining, based onprocessing, using a speech recognition algorithm, the audio trigger,that one or more words in the audio trigger are associated with thetriggered state.

Clause 96. A removable blocking device, wherein the removable blockingdevice is configured to, when connected to a blocking module interfaceof a smart device: prevent receipt, by one or more processors of thesmart device, of first signals generated by at least one microphone ofthe smart device while the removable blocking device is in anuntriggered state, wherein each communication path between the at leastone microphone and the one or more processors is conducted via theblocking module interface; detect, using an input device of theremovable blocking device, a first trigger associated with activatingthe removable blocking device, wherein the first trigger is differentfrom a second trigger associated with activating the smart device; andbased on detecting the first trigger, temporarily enter a triggeredstate and allow receipt, by the one or more processors and via theblocking module interface, of second signals generated by the at leastone microphone.

Clause 97. The removable blocking device of clause 96, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 98. The removable blocking device of any one of clauses 96-97,wherein the audio trigger comprises a command spoken by a user within apredetermined distance of the smart device.

Clause 99. The removable blocking device of any one of clauses 96-98,wherein the removable blocking device comprises the at least one secondmicrophone.

Clause 100. The removable blocking device of any one of clauses 96-99,wherein the removable blocking device is configured to detect the firsttrigger associated with activating the removable blocking device by:determining, based on processing, using a speech recognition algorithm,the audio trigger, that one or more words in the audio trigger areassociated with the triggered state.

Clause 101. A system comprising: a smart device comprising at least onefirst microphone; and a blocking device comprising at least one secondmicrophone and an output device, wherein the blocking device isconfigured to: determine, using the at least one second microphone, oneor more sounds corresponding to an environment associated with the smartdevice; output, using the output device, first audio to the at least onefirst microphone, wherein the first audio is generated based on a volumeof the one or more sounds and is configured to impede receipt, by the atleast one first microphone, of environmental audio while the blockingdevice is in an untriggered state; detect, using the at least one secondmicrophone, a first trigger associated with activating the blockingdevice, wherein the first trigger is different from a second triggerassociated with activating the smart device; and based on detecting thefirst trigger, temporarily enter a triggered state and output, to the atleast one first microphone and using the output device, the secondtrigger.

Clause 102. The system of clause 101, wherein a first volume of thefirst audio is configured to be greater than the volume of the one ormore sounds.

Clause 103. The system of any one of clauses 101-102, furthercomprising: selecting the one or more sounds based on the volume of theone or more sounds satisfying a threshold.

Clause 104. The system of any one of clauses 101-103, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 105. The system of any one of clauses 101-104, wherein the audiotrigger comprises a command spoken by a user within a predetermineddistance of the smart device.

Clause 106. The system of any one of clauses 101-105, wherein one ormore first words associated with the first trigger are different thanone or more second words associated with the second trigger.

Clause 107. The system of any one of clauses 101-106, wherein theblocking device is configured to detect the first trigger associatedwith activating the blocking device by: determining, based onprocessing, using a speech recognition algorithm, the audio trigger,that one or more words in the audio trigger are associated with thetriggered state.

Clause 108. The system of any one of clauses 101-107, wherein the firsttrigger corresponds to a movement detected by an optical sensor of theblocking device.

Clause 109. The system of any one of clauses 101-108, wherein the firsttrigger corresponds to a movement detected by a wearable device.

Clause 110. The system of any one of clauses 101-109, wherein impedingreceipt of the environmental audio comprises shielding at least aportion of the at least one first microphone.

Clause 111. The system of any one of clauses 101-110, wherein theblocking device is further configured to: return, based on determiningthat a time period associated with the triggered state has elapsed, tothe untriggered state.

Clause 112. The system of any one of clauses 101-111, wherein theblocking device is configured to temporarily enter the triggered stateand output the second trigger by: determining, based on processing thefirst trigger to determine an origin of the first trigger, that thesmart device did not output the first trigger.

Clause 113. The system of any one of clauses 101-112, wherein the firstaudio is configured to emulate speech by one or more users of the smartdevice.

Clause 114. The system of any one of clauses 101-113, wherein theblocking device is further configured to determine the one or moresounds by: recording, for a period of time while the blocking device isin the untriggered state, the one or more sounds.

Clause 115. The system of any one of clauses 101-114, wherein the secondtrigger is configured to obscure an identity of at least one user.

Clause 116. The system of any one of clauses 101-115, wherein theblocking device is configured to attach to at least a portion of ahousing of the smart device.

Clause 117. The system of any one of clauses 101-116, wherein theblocking device is configured to impede the at least one firstmicrophone from receiving any audio other than audio originating fromthe output device.

Clause 118. The system of any one of clauses 101-117, wherein theblocking device is further configured to indicate when the blockingdevice is in the triggered state.

Clause 119. The system of any one of clauses 101-118, wherein theblocking device is incapable of communication over a network used by thesmart device.

Clause 120. The system of any one of clauses 101-119, wherein the firsttrigger is configurable by a user.

Clause 121. A method comprising: determining, using at least one firstmicrophone of a blocking device, one or more sounds corresponding to anenvironment associated with a smart device; outputting, using an outputdevice of the blocking device, first audio to at least one secondmicrophone of the smart device, wherein the first audio is based on theone or more sounds and is configured to impede receipt, by the at leastone second microphone, of environmental audio while the blocking deviceis in an untriggered state; detecting, using the at least one firstmicrophone, a first trigger associated with activating the blockingdevice, wherein the first trigger is different from a second triggerassociated with activating the smart device; and based on detecting thefirst trigger, temporarily entering a triggered state and outputting, tothe at least one second microphone and using the output device, thesecond trigger.

Clause 122. The method of clause 121, wherein the first triggercomprises an audio trigger received from at least one first microphone.

Clause 123. The method of any one of clauses 121-122, wherein the audiotrigger comprises a command spoken by a user within a predetermineddistance of the smart device.

Clause 124. The method of any one of clauses 121-123, wherein one ormore first words associated with the first trigger are different thanone or more second words associated with the second trigger.

Clause 125. The method of any one of clauses 121-124, wherein theblocking device is configured to detect the first trigger associatedwith activating the blocking device by: determining, based onprocessing, using a speech recognition algorithm, the audio trigger,that one or more words in the audio trigger are associated with thetriggered state.

Clause 126. A blocking device comprising at least one first microphoneand an output device, wherein the blocking device is configured to:determine, using the at least one first microphone, one or more soundscorresponding to an environment associated with a smart device; output,using the output device, first audio to at least one second microphoneof the smart device, wherein the first audio is based on the one or moresounds and is configured to impede receipt, by the at least one secondmicrophone, of environmental audio while the blocking device is in anuntriggered state; detect, using the at least one first microphone, afirst trigger associated with activating the blocking device, whereinthe first trigger is different from a second trigger associated withactivating the smart device; and based on detecting the first trigger,temporarily enter a triggered state and output, to the at least onesecond microphone and using the output device, the second trigger.

Clause 127. The blocking device of clause 126, wherein the first triggercomprises an audio trigger received from at least one first microphone.

Clause 128. The blocking device of any one of clauses 126-127, whereinthe audio trigger comprises a command spoken by a user within apredetermined distance of the smart device.

Clause 129. The blocking device of any one of clauses 126-128, whereinone or more first words associated with the first trigger are differentthan one or more second words associated with the second trigger.

Clause 130. The blocking device of any one of clauses 126-129, whereinthe blocking device is configured to detect the first trigger associatedwith activating the blocking device by: determining, based onprocessing, using a speech recognition algorithm, the audio trigger,that one or more words in the audio trigger are associated with thetriggered state.

Clause 131. A method comprising: detecting first electrical signalsassociated with a communications path between at least one microphone ofa smart device and one or more processors of the smart device;determining, based on the first electrical signals, that blockingcircuitry prevents receipt, by the one or more processors, of firstsignals generated by the at least one microphone while the blockingcircuitry is in an untriggered state, wherein each communication pathbetween the at least one microphone and the one or more processors isconducted via the blocking circuitry; detecting second electricalsignals associated with the communications path between the at least onemicrophone of the smart device and the one or more processors of thesmart device; determining, based on the second electrical signals, thatthe blocking circuitry detects, using an input device of the blockingcircuitry, a first trigger associated with activating the blockingcircuitry, wherein the first trigger is different from a second triggerassociated with activating the smart device; detecting third electricalsignals associated with the communications path between the at least onemicrophone of the smart device and the one or more processors of thesmart device; and determining, based on the third electrical signals,that, based on detecting the first trigger, the blocking circuitrytemporarily enters a triggered state and allows receipt, by the one ormore processors, of second signals generated by the at least onemicrophone.

Clause 132. The method of clause 131, wherein detecting the firstelectrical signals comprises monitoring one or more circuits of thesmart device.

Clause 133. The method of any one of clauses 131-132, wherein detectingthe first electrical signals comprises monitoring a power use of thesmart device.

Clause 134. The method of claim 1, further comprising: assigning, basedon the first electrical signals, the second electrical signals, and thethird electrical signals, a privacy level to the blocking circuitry.

Clause 135. The method of any one of clauses 131-134, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 136. The method of any one of clauses 131-135, wherein the firsttrigger corresponds to a movement detected by an optical sensor of theblocking circuitry.

Clause 137. The method of any one of clauses 131-136, wherein the firsttrigger corresponds to a movement detected by a wearable device.

Clause 138. The method of any one of clauses 131-137, wherein preventingreceipt of the first signals comprises grounding at least a portion of acircuit associated with the at least one microphone.

Clause 139. The method of any one of clauses 131-138, further comprisingdetermining, based on fourth electrical signals, that the blockingcircuitry returns, based on determining that a time period associatedwith the triggered state has elapsed, to the untriggered state.

Clause 140. The method of any one of clauses 131-139, further comprisingdetermining, based on the third electrical signals, that the blockingcircuitry is configured to temporarily enter the triggered state andallow receipt of the second signals by: determining, based on processingthe first trigger to determine an origin of the first trigger, that thesmart device did not output the first trigger.

Clause 141. The method of any one of clauses 131-140, wherein preventingreceipt of signals from the at least one microphone comprisesoutputting, to the one or more processors, third signals comprising oneor more first sounds configured to emulate one or more second soundsfrom an environment associated with the smart device.

Clause 142. The method of any one of clauses 131-141, wherein a firstvolume of the one or more first sounds is based on a second volume ofthe one or more second sounds.

Clause 143. The method of any one of clauses 131-142, further comprisingdetermining, based on the first electrical signals, that the blockingcircuitry determines the one or more first sounds by recording, for aperiod of time while the blocking circuitry is in the untriggered state,the one or more second sounds.

Clause 144. The method of any one of clauses 131-143, further comprisingdetermining, based on the third electrical signals, that the blockingcircuitry is configured to temporarily enter the triggered state andallow receipt of the second signals by: processing the second signals toobscure an identity of at least one user; and outputting, to the one ormore processors, the processed second signals.

Clause 145. A method comprising: detecting first electrical signalsassociated with a communications path between at least one microphone ofa smart device and one or more processors of the smart device;determining, based on the first electrical signals, that a removableblocking device, connected to the smart device via a blocking moduleinterface, prevents receipt, by the one or more processors of the smartdevice, of first signals generated by the at least one microphone of thesmart device while the removable blocking device is in an untriggeredstate, wherein each communication path between the at least onemicrophone and the one or more processors is conducted via the blockingmodule interface; detecting second electrical signals associated withthe communications path between the at least one microphone of the smartdevice and the one or more processors of the smart device; determining,based on the second electrical signals, that the removable blockingdevice detects, using an input device of the removable blocking device,a first trigger associated with activating the removable blockingdevice, wherein the first trigger is different from a second triggerassociated with activating the smart device; detecting third electricalsignals associated with the communications path between the at least onemicrophone of the smart device and the one or more processors of thesmart device; and determining, based on the third electrical signals,that, based on detecting the first trigger, the removable blockingdevice temporarily enters a triggered state and allows receipt, by theone or more processors and via the blocking module interface, of secondsignals generated by the at least one microphone.

Clause 146. The method of clause 145, wherein detecting the firstelectrical signals comprises monitoring one or more circuits of thesmart device.

Clause 147. The method of any one of clauses 145-146, wherein detectingthe first electrical signals comprises monitoring a power use of thesmart device.

Clause 148. The method of any one of clauses 145-147, furthercomprising: assigning, based on the first electrical signals, the secondelectrical signals, and the third electrical signals, a privacy level tothe removable blocking device.

Clause 149. The method of any one of clauses 145-148, wherein the firsttrigger comprises an audio trigger received from at least one secondmicrophone.

Clause 150. The method of any one of clauses 145-149, wherein the firsttrigger corresponds to a movement detected by an optical sensor of theremovable blocking device.

Clause 151. The method of any one of clauses 145-150, wherein the firsttrigger corresponds to a movement detected by a wearable device.

Clause 152. The method of any one of clauses 145-151, wherein preventingreceipt of the first signals comprises grounding at least a portion of acircuit associated with the at least one microphone.

Clause 153. The method of any one of clauses 145-152, further comprisingdetermining, based on fourth electrical signals, that the removableblocking device returns, based on determining that a time periodassociated with the triggered state has elapsed, to the untriggeredstate.

Clause 154. The method of any one of clauses 145-153, further comprisingdetermining, based on the third electrical signals, that the removableblocking device is configured to temporarily enter the triggered stateand allow receipt of the second signals by: determining, based onprocessing the first trigger to determine an origin of the firsttrigger, that the smart device did not output the first trigger.

Clause 155. The method of any one of clauses 145-154, wherein preventingreceipt of signals from the at least one microphone comprisesoutputting, to the one or more processors, third signals comprising oneor more first sounds configured to emulate one or more second soundsfrom an environment associated with the smart device.

Clause 156. The method of any one of clauses 145-155, wherein a firstvolume of the one or more first sounds is based on a second volume ofthe one or more second sounds.

Clause 157. The method of any one of clauses 145-156, further comprisingdetermining, based on the first electrical signals, that the removableblocking device is configured to determine the one or more first soundsby recording, for a period of time while the removable blocking deviceis in the untriggered state, the one or more second sounds.

Clause 158. The method of any one of clauses 145-157, further comprisingdetermining, based on the third electrical signals, that the removableblocking device is configured to temporarily enter the triggered stateand allow receipt of the second signals by: processing the secondsignals to obscure an identity of at least one user; and output, to theone or more processors, the processed second signals.

Clause 159. A method comprising: detecting first electrical signalsassociated with a communications path between at least one firstmicrophone of a smart device and one or more processors of the smartdevice; determining, based on the first electrical signals, that ablocking device determines, using at least one second microphone of theblocking device, one or more sounds corresponding to an environmentassociated with the smart device; detecting second electrical signalsassociated with the communications path between the at least onemicrophone of the smart device and the one or more processors of thesmart device; determining, based on the second electrical signals, thatthe blocking device is configured to output, using an output device ofthe blocking device, first audio to the at least one first microphone ofthe smart device, wherein the first audio is based on the one or moresounds and is configured to impede receipt, by the at least one firstmicrophone, of environmental audio while the blocking device is in anuntriggered state; detecting third electrical signals associated withthe communications path between the at least one microphone of the smartdevice and the one or more processors of the smart device; determining,based on the third electrical signals, that the blocking device isconfigured to detect, using the at least one second microphone of theblocking device, a first trigger associated with activating the blockingdevice, wherein the first trigger is different from a second triggerassociated with activating the smart device; detecting fourth electricalsignals associated with the communications path between the at least onemicrophone of the smart device and the one or more processors of thesmart device; and determining, based on the fourth electrical signals,that the blocking device is configured to, based on detecting the firsttrigger, temporarily enter a triggered state and output, to the at leastone first microphone and using the output device, the second trigger.

Clause 160. The method of clause 159, wherein detecting the firstelectrical signals comprises monitoring a power use of the smart device.

Clause 161. A method comprising: detecting, by a blocker, at least oneof a position and orientation of a mobile device; determining, based onthe at least one of the position and orientation of the mobile device,that the mobile device is in blocking mode; intercepting, based on adetermination that the mobile device is in blocking mode, one or moresignals received via one or more inputs of the mobile device; detectinga trigger associated with a triggered state; and entering, based ondetecting the trigger, the triggered state that allows one or moreprocessors of the mobile device to receive one or more signals from theone or more inputs of the mobile device.

Clause 162. The method of clause 161, wherein detecting at least one ofa position and orientation of a mobile device further comprises:determining that the mobile device has been stationary for apredetermined amount of time.

Clause 163. The method of any one of clauses 161-162, wherein detectingat least one of a position and orientation of a mobile device furthercomprises: determining which way the mobile device is facing.

Clause 164. The method of any one of clauses 161-163, wherein detectingat least one of a position and orientation of a mobile device furthercomprises: determining a first orientation of the mobile device;determining a second orientation of the mobile device; determiningwhether the second orientation of the mobile device satisfies a firstthreshold; and determining, based on a determination that the secondorientation does not satisfy the first threshold, that the mobile deviceis in blocking mode.

Clause 165. The method of any one of clauses 161-164, whereinintercepting the one or more signals comprises: interrupting atransmission medium of the mobile device.

Clause 166. The method of any one of clauses 161-165, whereinintercepting the one or more signals comprises: interrupting one or morewires of the mobile device.

Clause 167. The method of any one of clause 161-166, whereinintercepting the one or more signals comprises: grounding at least aportion of a circuit associated with the via one or more inputs of themobile device.

Clause 168. The method of any one of clauses 161-167, wherein thetrigger comprises a gesture input.

Clause 169. The method of any one of clauses 161-168, wherein thegesture input comprises a shaking movement.

Clause 170. The method of any one of clauses 161-169, wherein detectingthe trigger further comprises: receiving an audio trigger via the one ormore inputs of the mobile device.

Clause 171. The method of any one of clauses 161-170, wherein the audiotrigger comprises a command spoken by a user within a predetermineddistance of the mobile device.

Clause 172. The method of claim 10, wherein the audio trigger overridesone or more gesture inputs.

Clause 173. A computing device comprising: one or more processors; andmemory storing instructions that, when executed by the one or moreprocessors, cause the computing device to: detect at least one of aposition and orientation of the computing device; determine, based onthe at least one of the position and orientation of the computingdevice, that the computing device is in blocking mode; intercept, basedon a determination that the computing device is in blocking mode, one ormore signals received via one or more inputs of the computing device;detect a trigger associated with a triggered state; and enter, based ondetecting the trigger, the triggered state that allows the one or moreprocessors to receive one or more signals from the one or more inputs.

Clause 174. The computing device of clause 173, wherein the instructionsfurther cause the computing device to: determine that the computingdevice has been stationary for a predetermined amount of time.

Clause 175. The computing device of any one of clauses 173-174, whereinthe instructions further cause the computing device to: determine whichway the computing device is facing.

Clause 176. The computing device of any one of clauses 173-175, whereinthe instructions further cause the computing device to: determine afirst orientation of the computing device; determining a secondorientation of the computing device; determining whether the secondorientation of the computing device satisfies a first threshold; anddetermining, based on a determination that the second orientation doesnot satisfy the first threshold, that the computing device is inblocking mode.

Clause 177. The computing device of any one of clauses 173-176, whereinthe instructions further cause the computing device to: interrupt atransmission medium of the computing device.

Clause 178. The computing device of any one of clauses 173-177, whereinthe instructions further cause the computing device to: interrupt one ormore wires of the computing device.

Clause 179. The computing device of any one of clauses 173-178, whereinintercepting the one or more signals comprises grounding at least aportion of a circuit associated with the via one or more inputs.

Clause 180. The computing device of any one of clauses 173-179, whereinthe trigger comprises a gesture input.

Clause 181. The computing device of any one of clauses 173-180, whereinthe gesture input comprises a shaking movement.

Clause 182. The computing device of any one of clauses 173-181, whereinthe instructions further cause the computing device to: receive an audiotrigger via the one or more inputs.

Clause 183. The computing device of any one of clauses 173-182, whereinthe audio trigger comprises a command spoken by a user within apredetermined distance of the computing device.

Clause 184. The computing device of any one of clauses 173-183, whereinthe audio trigger overrides one or more gesture inputs.

Clause 185. A blocking device comprising: intercept circuitry configuredto prevent one or more signals from being transmitted from one or moreinputs to a processor of a mobile device; an accelerometer configured todetect a gesture input; and output circuitry configured to allow, basedon the gesture input, one or more second signals to be received by theprocessor of the mobile device.

Clause 186. The blocking device of clause 185, further comprising:listening circuitry configured to determine, using the microphone, anaudio trigger, wherein the audio trigger causes the output circuitry toallow the one or more second signals to be received by the processor ofthe mobile device.

Clause 187. The blocking device of any one of clauses 185-186, whereinthe blocking device draws power from the mobile device.

Clause 188. The blocking device of any one of clauses 185-187, whereinthe blocking device does not comprise a processor.

Clause 189. A system comprising: a mobile device comprising: one or moreinputs, wherein the one or more inputs comprise at least one microphoneand at least one image capture device; one or more processors; and ablocking device adapted to connect to the mobile device, wherein theblocking device is configured to, when connected to the mobile device:detect at least one of a position and orientation of the mobile device;determine, based on the at least one of the position and orientation ofthe mobile device, that the mobile device is in blocking mode;intercept, based on a determination that the mobile device is inblocking mode, one or more signals received via one or more inputs ofthe mobile device; detect a trigger associated with a triggered state;and enter, based on detecting the trigger, the triggered state thatallows the one or more processors of the mobile device to receive one ormore signals from the one or more inputs of the mobile device.

Clause 190. The system of clause 189, wherein the trigger comprises arepetitive motion of the mobile device.

Although examples are described above, features and/or steps of thoseexamples may be combined, divided, omitted, rearranged, revised, and/oraugmented in any desired manner. Various alterations, modifications, andimprovements will readily occur to those skilled in the art. Suchalterations, modifications, and improvements are intended to be part ofthis description, though not expressly stated herein, and are intendedto be within the spirit and scope of the disclosure. Accordingly, theforegoing description is by way of example only, and is not limiting.

What is claimed is:
 1. A blocking device, wherein the blocking device isconfigured to be installed in a listening device by cutting acommunication path between a microphone of the listening device and aprocessor of the listening device and inserting the blocking device intoone or more severed portions of the communication path, comprising:intercept circuitry configured to: prevent first environmental audiofrom being transmitted from the microphone to the processor bydisrupting the communication path; cease disrupting the communicationpath between the microphone and the processor based on determiningwhether the first environmental audio comprises an audio trigger; andresume disrupting the communication path between the microphone and theprocessor; listening circuitry configured to determine, using themicrophone, whether the first environmental audio comprises the audiotrigger; output circuitry configured to allow, based on the audiotrigger, second environmental audio to be received by the processor; andan indicator configured to provide an indication of when thecommunication path is being disrupted.
 2. The blocking device of claim1, wherein the intercept circuitry is further configured to: resume,after a predetermined time period and after allowing the secondenvironmental audio to be received by the listening device, disruptingthe communication path between the microphone and the processor toprevent third environmental audio from being received by the processor.3. The blocking device of claim 1, wherein the listening device isconnected to a network, and wherein the blocking device is not connectedto the network.
 4. The blocking device of claim 1, wherein the listeningcircuitry is configured to ignore audio originating from the listeningdevice.
 5. The blocking device of claim 1, wherein the audio triggercomprises a spoken command.
 6. The blocking device of claim 5, whereinthe listening circuitry is configured to use a speech recognitionalgorithm on the spoken command to determine the audio trigger.
 7. Theblocking device of claim 1, wherein the indicator comprises a lightemitting diode (LED).
 8. The blocking device of claim 1, wherein theindicator is further configured to indicate a length of time thecommunication path has been disrupted.
 9. A first computing device,wherein the first computing device is configured to be installed in asecond computing device by cutting a communication path between a secondmicrophone of the second computing device and a second processor of thesecond computing device and inserting the first computing device intoone or more severed portions of the communication path, comprising: afirst microphone; one or more first processors; and memory storinginstructions that, when executed by the one or more first processors,cause the first computing device to: intercept one or more first soundsbetween the second microphone and the second processor; prevent one ormore first signals associated with the one or more first sounds frombeing transmitted from the second microphone to the second processor bydisrupting the communication path; provide an indication that thecommunication path between the second microphone and the secondprocessor is disrupted; detect, using the first microphone, one or moresecond sounds; determine that the one or more second sounds areassociated with an audio trigger; based on a determination that the oneor more second sounds are associated with the audio trigger: ceasedisrupting the communication path between the second microphone and thesecond processor; disable the indication that the communication pathbetween the second microphone and the second processor is disrupted;allow one or more second signals associated with one or more thirdsounds to be received by the second processor via the second microphone;resume disrupting the communication path between the second microphoneand the second processor; and re-enable the indication that thecommunication path between the second microphone and the secondprocessor is disrupted.
 10. The first computing device of claim 9,wherein the instructions, when executed by the one or more firstprocessors, further cause the first computing device to: ignore, basedon determining that the one or more second sounds originated from thesecond computing device, the one or more second sounds.
 11. The firstcomputing device of claim 9, wherein the instructions, when executed bythe one or more first processors, cause the first computing device toallow the one or more second signals associated with the one or morethird sounds to be received after the one or more third sounds arereceived by the second microphone.
 12. The first computing device ofclaim 9, wherein the instructions, when executed by the one or morefirst processors, cause the first computing device to allow the one ormore second signals associated with the one or more third sounds to bereceived by the second processor by transmitting, based on the one ormore second sounds being associated with the audio trigger, the one ormore third sounds to the second processor.
 13. The first computingdevice of claim 12, wherein the one or more second signals associatedwith the one or more third sounds comprise text-to-speech data generatedbased on the one or more third sounds.
 14. The first computing device ofclaim 9, wherein the instructions, when executed by the one or morefirst processors, cause the first computing device to allow the one ormore second signals associated with the one or more third sounds to bereceived by the second processor by excluding a portion of the one ormore second sounds associated with the audio trigger.
 15. The computingdevice of claim 9, wherein the indication comprises at least one of avisual indication, an auditory indication, or a tactile indication. 16.A system comprising: a first computing device comprising: a firstmicrophone; one or more first processors; and first memory storinginstructions that, when executed by the one or more first processors,cause the first computing device to receive audio content via the firstmicrophone; and a second computing device, wherein the second computingdevice is configured to be installed in the first computing device bycutting a communication path between the first microphone and the one ormore first processors and inserting the second computing device into oneor more severed portions of the communication path, the second computingdevice comprising: a second microphone; one or more second processors;and second memory storing instructions that, when executed by the one ormore second processors, cause the second computing device to: interceptfirst signals from the first microphone to the one or more firstprocessors; prevent the first signals from being received by the one ormore first processors by disrupting the communication path; provide anindication that the communication path between the first microphone andthe one or more first processors is disrupted; detect, using the secondmicrophone, one or more second sounds associated with an audio trigger;based on detecting the audio trigger: cease disrupting the communicationpath between the first microphone and the one or more first processors;disable the indication that the communication path between the firstmicrophone and the one or more first processors is disrupted; permit theone or more first processors to receive one or more third sounds fromthe first microphone; resume disrupting the communication path betweenthe first microphone and the one or more first processors; and re-enablethe indication that the communication path between the first microphoneand the one or more first processors is disrupted.
 17. The system ofclaim 16, wherein permitting the first computing device to receive theone or more third sounds comprises: generating, based on the one or moresecond sounds, the one or more third sounds.
 18. The system of claim 16,wherein the one or more second sounds are spoken by a user, and whereinthe audio trigger is defined by the user.
 19. The system of claim 16,wherein permitting the first computing device to receive the one or morethird sounds is based on determining that the one or more third soundsdid not originate from a speaker associated with the first computingdevice.
 20. The system of claim 16, wherein the instructions, whenexecuted by the one or more second processors, cause the secondcomputing device to provide the indication in response to the firstmicrophone receiving one or more signals.
 21. A method comprising:intercepting, by a blocking device configured to be installed in alistening device by cutting a communication path between a microphone ofthe listening device and a processor of the listening device andinserting the blocking device into one or more severed portion of thecommunication path, first communications between the microphone and theprocessor; preventing, by the blocking device, all signals correspondingto the first communications from being received by the processor bydisrupting the communication path; providing an indication that thecommunication path is disrupted; intercepting, by the blocking device,second communications between the microphone and the processor;determining, by the blocking device, whether the second communicationsare associated with an audio trigger; based on a determination that thesecond communications are associated with the audio trigger: ceasing, bythe blocking device, disrupting the communications path; disabling theindication that the communication path is disrupted; permitting, by theblocking device, one or more signals associated with thirdcommunications to be received for processing by the processor of thelistening device; resuming disrupting, by the blocking device, thecommunication path; and re-enabling the indication that thecommunication path is disrupted.
 22. The method of claim 21, wherein theindication further comprises one or more configuration parameters. 23.The method of claim 21, wherein the indication comprises changing acolor of one or more lightbulbs in a room.
 24. The method of claim 21,wherein providing the indication that the communication path between thefirst microphone and the listening device is disrupted further comprisessending feedback to a user device.
 25. The method of claim 24, whereinthe user device comprises a wearable device.
 26. The method of claim 21,further comprising: outputting, by the blocking device and while thecommunication path is being disrupted, one or more second signals to theprocessor to emulate environmental noise.
 27. The method of claim 21,further comprising: monitoring third communications to determine whethera conversation with the listening device is occurring, wherein theresuming disrupting is based on a determination that the conversationwith the listening device has stopped.