System and method for securing electronic devices

ABSTRACT

Embodiments disclosed herein include security systems and methods for securing an electronic device. In some embodiments, the security system may include an electronic device including surveillance components, including a microphone and a camera. The security device may be secured to the electronic device in a way that blocks or interferes with one or more of these surveillance components. Additionally, the security device may be placed near or on the electronic device. The security device may also include security components to distort sounds from a sound source to be detected by the microphone. As a result, this may prevent third parties from at least remotely streaming or recording live audio and/or video from various audio and video recording components present on the electronic device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 15/698,596, filed on Sep. 7, 2017, the contents of which areincorporated by reference herein.

TECHNICAL FIELD

The disclosed technology relates generally to securing electronicdevices. More specifically, in one embodiment, the disclosed technologyrelates generally to securing electronic devices that are connected tothe internet and commanded by voice control.

BACKGROUND

Electronic devices continue to provide an ever growing number offunctions, services, and applications as people continue to find ways tointegrate them into our daily lifestyle. Indeed, current consumerelectronic devices are available to instantly provide information andeven perform select automated tasks at any given notice. For example,such popular electronic devices are the intelligent automated assistantdevices that respond to voice commands and perform the recognizedcommands accordingly. Such examples of these intelligent automatedassistant device include the Amazon Echo® with the Alexa voice controlsystem, Google Home, Apple iPhone® with Siri voice system, Android phonewith the Cortana voice recognition system, and the like. Theseintelligent automated assistant devices may then be connected to andcontrol security systems (e.g., video, cameras, door locks, etc.),appliances, environment controls (e.g., heating and air conditioningcontrollers), and the like.

Due to their promise of convenience, these intelligent automatedassistant devices with voice control technology are growing inpopularity as they are now becoming a common item in many households,where some even have one placed in every room. More specifically, theseintelligent automated assistant devices may be coupled with Internettechnologies and even connected to other supported electronic devicesand systems, which may allow these intelligent automated assistant toperform a greater number of applications and functions. As such, theseintelligent automated assistant devices may then enable its users toverbally connect with the device and even control internet searches,entertainment systems, home appliances, environmental systems, securitysystems, and other electronic devices. However, while intelligentautomated assistants offer the convenience of controlling a plurality ofdevices and systems all with a single electronic device, they also posea serious potential threat to our personal privacy.

This is because most electronic assistants are always “listening” and onstandby to hear for recognized audio commands. As such, the intelligentautomated assistants may continuously and passively be gathering ormonitoring auditory and even visual data. Furthermore, if theintelligent automated assistant devices are connected to the Internet,as most intelligent automated assistant devices are, it is a possiblescenario that another person may remotely gain access and control of theintelligent automated assistant device without the owner's awareness orconsent. Thus, the person may be able to gain access to any of themicrophones and cameras located on the intelligent automated assistantdevice, which may then allow the person to stream or record live audioand visual feeds. Thus, the owner may be unaware that his or herintelligent automated assistant device has been compromised and that thearea immediately surrounding the intelligent automated assistant deviceis no longer safe or private. Thus, there is a real privacy threat posedby these intelligent automated assistant devices.

BRIEF SUMMARY OF EMBODIMENTS

According to various embodiments of the disclosed technology, disclosedare security systems and methods for securing an electronic device inaccordance to varying embodiments.

Some embodiments may include a security system which may include anelectronic device comprising at least one of a first microphone and asecurity device placed at, on, or near the electronic device, where thesecurity device includes security components configured to block soundsfrom a sound source being detected by the first microphone.

In some embodiments, the security device may be powered on, off and/orplaced in an active or inactive mode via voice activation control. Forexample, powering on and/or placing the security device into an activemode may enable one or more security components provided in the securitydevice to prevent the electronic device from collecting proper audio bythe first microphone.

Other features and aspects of the invention will become apparent fromthe following detailed description, taken in conjunction with theaccompanying drawings, which illustrate, by way of example, the featuresin accordance with embodiments of the invention. As such, the summary isnot intended to limit the scope of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The technology disclosed herein, in accordance with one or more variousembodiments, is described in detail with reference to the followingfigures. The drawings are provided for purposes of illustration only andmerely depict typical or example embodiments of the disclosedtechnology. These drawings are provided to facilitate the reader'sunderstanding of the disclosed technology and shall not be consideredlimiting of the breadth, scope, or applicability thereof. It should benoted that for clarity and ease of illustration these drawings are notnecessarily made to scale.

FIG. 1 is a schematic representation of a security system in accordancewith various embodiments.

FIGS. 2A-2D illustrates a security system for an intelligent automatedassistant device or any electronic device in accordance with oneembodiment.

FIGS. 3A-3B illustrates a security device placed over an intelligentautomated assistant device or any electronic device in accordance to oneembodiment.

FIG. 4 illustrates a security device having an aperture placed over anintelligent automated assistant device or any electronic device inaccordance with one embodiment.

FIG. 5 illustrates a security system that includes an intelligentautomated assistant device or any electronic device and a first securitydevice and a second security device in accordance with one embodiment.

FIG. 6 illustrates an exemplary process for securing an electronicdevice in accordance to varying embodiments.

FIG. 7 illustrates an example computing module that may be used inimplementing features of various embodiments.

The figures are not intended to be exhaustive or to limit the inventionto the precise form disclosed. It should be understood that theinvention can be practiced with modification and alteration, and thatthe disclosed technology be limited only by the claims and theequivalents thereof.

DETAILED DESCRIPTION OF THE EMBODIMENTS

The following description is not to be taken in a limiting sense, but ismade merely for the purpose of describing the general principles of thedisclosed embodiments. The present embodiments address the problemsdescribed in the background while also addressing other additionalproblems as will be seen from the following detailed description.Numerous specific details are set forth to provide a full understandingof various aspects of the subject disclosure. It will be apparent,however, to one ordinarily skilled in the art that various aspects ofthe subject disclosure may be practiced without some of these specificdetails. In other instances, well-known structures and techniques havenot been shown in detail to avoid unnecessarily obscuring the subjectdisclosure.

As alluded to above, consumers utilize a number of intelligent automatedassistant devices that respond to voice commands and perform therecognized commands accordingly. Such examples of these intelligentautomated assistant device include the Amazon Echo® with the Alexa voicecontrol system, Google Home, Apple iPhone® and Apple® HomePod with Sirivoice system, Android phone with the Cortana voice recognition system,Facebook® Portal that has incorporated Alexa voice control system, andthe like. In some implementations, these intelligent automated assistantdevices may then be connected to and control security systems (e.g.,video, cameras, door locks, etc.), appliances, environment controls(e.g., heating and air conditioning controllers), and the like. Forexample, Philips® Hue, which uses Zigbee lighting protocol, may becontrolled via the Amazon, Apple, and/or Android devices describedabove. In some embodiments, intelligent automated assistant capabilitiesmay be incorporated into motor vehicles. For example, several automotivemanufacturers offer its drivers in-vehicle communications andentertainment systems which provides drivers with the ability to operateBluetooth-enabled mobile phones and digital media players in theirvehicles using voice commands, as well as the vehicle's steering wheeland/or radio controls (e.g., OnStar®, Ford Sync, Microsoft Auto, KiaUVO, and so on).

Additionally, a number of “smart”, internet-connected, electronicdevices (e.g., security systems, video doorbells, thermostatcontrollers, door locks, environmental monitors and the like) that donot require use of an intelligent automated assistant device arecurrently utilized by consumers. Nonetheless, these intelligent consumerdevices often continuously collect data via an on-board microphone orvideo camera. For example, home security or video doorbell devices, suchas Amazon Ring or Google Nest, not only monitor a homeowner's front doorby recording surveillance footage, they also allow users to communicatewith a visitor from outside their home (e.g., via a user mobile device).

Similarly, other common internet-connected consumer electronic devicesmay be operating in a way that requires continuous and passive auditoryand visual data collection. For example, televisions (e.g., Samsung,Sony), smartphones (e.g., Apple iPhone, Samsung Galaxy, Google Pixel),tablet computers (e.g., Apple iPad, Amazon Fire, Samsung Galaxy), laptopcomputers, and desktop computers equipped with webcams (e.g., Logitechwebcam) may be all accessed and without owner's consent or knowledge.

As alluded to above, both intelligent automated assistant devices andinternet-connected electronic devices, operating either with the help ofan intelligent automated assistant or on their own, are equipped withmeans to continuously and passively collect or monitor auditory andvisual data via one or more on-board device components (e.g., via amicrophone, a camera or a speaker). These device components maypotentially be accessed without owner's awareness knowledge or consent.

Accordingly, described herein is a device for securing any electronicdevice (e.g., an automated assistant device or an internet-connectedelectronic device) by preventing surveillance components within theelectronic device (e.g., a microphone or a camera) from being utilizedwithout owner's consent or knowledge. That is, the security deviceprevents third parties from collecting audio or video data generated bythe surveillance components within the operating range of any of thesecomponents.

FIG. 1 is a schematic representation of a security system 100 inaccordance with various embodiments. The security system 100 may includea security device 102 that is implemented to help provide increasedprivacy measures for an electronic device 104. For example, theelectronic device 104 may be an intelligent automated assistant deviceconfigured with the intelligent automated assistant program 114 (e.g.,Amazon Alexa). In some embodiments the electronic device 104 may be aninternet-connected electronic device operating without the intelligentautomated assistant program 114. For example, the electronic device 104may be a video doorbell, a thermostat controller, a door lock, and soon. In yet other embodiments, the electronic device 104 may be atelevision, a smartphone, a tablet computer, a laptop computer, and soon.

In some embodiments, the electronic device 104 may be configured toreceive one or more commands from a user. For example, electronic device104 may be configured to recognize and respond to voice commands andensure that the recognized commands are carried out and executedaccordingly. In some embodiments, the electronic device 104 may beconfigured to receive user input from one or more user operated devices(not shown) communicatively coupled to the electronic device. Forexample, a user may generate a command from a tablet computer wirelesslyconnected to a door bell. In some embodiments, the user operated devicemay be in communication with the electronic device 104 via a network 140through a wireless communication or wired communication. The wirelesscommunication may use at least one of, for example, Long Term Evolution(LTE), LTE-Advance (LTE-A), Code Division Multiple Access (CDMA),Wideband CDMA (WCDMA), Universal Mobile Telecommunications System(UMTS), WiBro (Wireless Broadband), and Global System for MobileCommunications (GSM) as a cellular communication protocol. The wirelesscommunication may also include at least one of, for example, WiFi,Bluetooth, BLE, Zigbee, Infrared (IR) communication, and ultrasoniccommunication as a short-range communication protocol.

In some embodiments, as alluded to earlier, the electronic device 104may include the intelligent automated assistant program 114 configuredto control many features and operations of the electronic device 104 onwhich it is installed. Additionally, the intelligent automated assistantdevice 104 may also be connected to compatible auxiliary devices 120(e.g., hand held devices, Bluetooth speakers, wireless appliances,etc.), thus allowing the electronic device 104 to also control thoseconnected auxiliary devices 120. Thus, the intelligent automatedassistant program 114 may be able to provide external services thatinterface with functionality and application available on the electronicdevice 104 itself or those from the auxiliary devices 120. For example,such functions and operations may include, for example, setting analarm, making a telephone call, sending a text message or email message,adding a calendar event, lowering the thermostat, turning on the light,and the like.

In some embodiments, the intelligent automated assistant program 114 maybe in communication with the auxiliary devices 120 via a network 140through a wireless communication or wired communication. The wirelesscommunication may use at least one of, for example, Long Term Evolution(LTE), LTE-Advance (LTE-A), Code Division Multiple Access (CDMA),Wideband CDMA (WCDMA), Universal Mobile Telecommunications System(UMTS), WiBro (Wireless Broadband), and Global System for MobileCommunications (GSM) as a cellular communication protocol. The wirelesscommunication may also include at least one of, for example, WiFi,Bluetooth, BLE, Zigbee, Infrared (IR) communication, and ultrasoniccommunication as a short-range communication protocol.

The intelligent automated assistant program 114 may also perform userrequested functions and operations based on the verbal communicationswith the electronic device 104 via voice control or voice recognition.The microphone 112 may receive speech input signals, which may then beanalyzed against a recognition set to detect and analyze the audiocontents.

In some embodiments the electronic device 104 may include a controller110 which may also be coupled to the switch 108, where the switch 108may turn off or turn on a power supply 106. Furthermore, the controller110 may regulate the amount of power from the power supply 106 isdistributed to the electronic device 104. For example, when theelectronic device 104 is in a sleep mode or standby mode, low or minimalpower may be distributed to the electronic device 104. In otherinstances, when the electronic device 104 is in the active mode, normalpower may be distributed to the electronic device at full capacity.

In some embodiments, the electronic device 104 may also include a videorecording component. For example, the electronic device 104 may includea camera 116. By way of example, the camera 116 may provide livestreaming of images and video feeds of the areas immediately surroundingthe electronic device 104. In some instances, the camera 116 may providecontinuous streaming of images and video feeds, which may then beuploaded onto a network or in a memory storage device. In otherinstances, the camera 116 may record images and video feeds upon userrequest for a select duration. In some embodiments, the camera 116 maybe selectively activated. For example, the camera 116 may be activatedby one or more recognized voice commands or by motion. However, itshould be noted that the electronic device 104 may or may not have acamera 116 and that the camera 116 is an optional feature.

In some embodiments, the security device 102 may be secured to theelectronic device 104 via a fastening means 151. For example, thefastening means, described in greater detail below, may include a numberof mechanism and/or components such as notch connectors, screw-inconnectors, magnetic connectors, and so on, configured to securely holdthe security device 102 to the electronic device 104. Conversely, insome embodiments, security system 100 may include a security device 102that is not secured to the electronic device 104. Rather, as describedin detail below, the security device 102 may be placed at or near theelectronic device 104.

In some embodiments, the security device 102 may be configured to allowit to be connected or disconnected from the internet. By virtue ofhaving the capability to disconnect the security device 102 from theinternet, ensures that any potentially hacked or compromised electronicdevices 104 caused by unauthorized third parties cannot cause potentialhacking into the security device 102 itself. Rather, the security device102 may include its own independent processor and software to employ thesecurity measures against any potential privacy threats as described infurther detail below.

By way of example, the security device 102 may include its own computingcomponent 122, which may include bus, a processor, a memory, storagedevices, input/output interface, and a communication interface. Thesecurity device 102 may also include its own independent power supply124. In some instances, similar to the electronic device 104, thesecurity device 102 may also be triggered to recognize and executeactions based on identification of recognized voice commands. Thus,similar to the electronic device 104, the security device 102 mayinclude its own microphone 132 coupled to a speech recognizer 130. Themicrophone 132 may receive speech input signals, which may then beanalyzed against a recognition set within the speech recognizer 130 todetect and analyze the audio contents. The speech recognizer 130 may becoupled to the controller 134, which may control the operations of thesecurity device 102 based on the recognition results of the identifiedverbal commands. As a result, the microphone 132 and the speechrecognizer 130 may allow a user to command the security device 102 andenable or disable security components 136 based on the recognized usercommands. By way of example, the speech recognizer 130 may recognizevoice commands that may enable powering on or off the securitycomponents of the security device 102. More information regarding thesecurity components 136 are further described below in detail.

The controller 134 may also be coupled to the switch 126, where theswitch 126 may turn off or turn on the power supply 124. Furthermore,the controller 134 may regulate the amount of power distributed from thepower supply 124 to the security device 102. For example, when thesecurity device 102 is in a sleep mode or standby mode, low or minimalpower may be distributed to the security device 102. In other instances,when the security device 102 is in the active mode, normal power may bedistributed to the security device 102 at full capacity.

Additionally, in some embodiments, the security device 102 may alsoinclude one or more security components 136. The security components 136may include security features that ensure the privacy of the user of theelectronic device 104 is not jeopardized by unwarranted third partiesseeking to spy or monitor on an unsuspecting user via unapproved remoteaccess to the microphone 112 and camera 116 on the electronic device104. By way of example, the security components 136 may include aspeaker or white noise component for generating and emitting white noisedirected to the electronic device 104. By emitting white noise, themicrophone 112 on the electronic device 104 may not be able to pick upand decipher conversations or other sounds from the room. As a result,the microphone 112 may then only be able to pick up these distorted ormuffled noises.

By way of example, the white noise component may include adigital/analog converter coupled to a memory with prerecorded whitenoise sounds. The analog output with a digital/analog converter may beamplified with an audio amplifier and played through the speaker on thesecurity device 102 in order to emit the white noise. It should be notedthat the white noise components may include any of the standardcomponents used to emit white noise as typically used and appreciated byany one of ordinary skill in the art.

Additionally, the security components 136 may also include a noisecancelling component for cancelling sounds and noises generated fromconversations and objects. This may further prevent and disrupt theelectronic device 104 from picking up any clear audio. By way ofexample, the noise cancelling component may include detecting sounds andemitting sounds waves with the same amplitude but with inverted phase,also known as the antiphase to the original sound. By emitting suchsound waves, this may then result in destructive interference with theoriginal sound so that the microphone 112 from the electronic device 104will not pick up clear audio from the sound source.

By way of example, the noise cancelling component may include atransducer to pick up any detected noises or sounds. The noise may befiltered through an amplifier and pass through a digital audio filter,where the noise signal may be analyzed. The noise signal may be brokendown into its fundamental harmonics, which can result in one or moreanalyzed audio signals. The signals may then be passed onto the mixercircuit so that the signals are analyzed to then emit a sound wave thatis inverted from the original sound signal. When the inverted sound waveis emitted from the security device 102, the electronic device 104 mayreceive both the sound signals of the original sound and that of theinverted sound wave, which may then result in the destructive inferenceso that the original sounds are no longer recognized. It should be notedthat the noise cancelling components may include any of the standardcomponents used to cancel or alter sounds as typically used andappreciated by any one of ordinary skill in the art.

FIGS. 2A-2D illustrates a security system 200 that includes anelectronic device 210 and a security device 220 in accordance with oneembodiment. As illustrated in FIGS. 2A-2B, the electronic device 210 isan intelligent automated assistant device. The security device 220illustrated in FIG. 2A is being placed on top of the electronic device210, as indicated by an arrow 215 resulting in the security device 220being secured to the electronic device 210, as illustrated in FIG. 2B.As alluded to earlier, by virtue of the security device 220 beingsecured to the electronic device 210 may provide the necessary securitymeasures that prevent third parties from recording or streaming liveconversations picked up by a microphone 230 of the electronic device 210(in this case, intelligent automated assistant device). As a result, thesecurity device 220 may include one or more security componentsassociated with the security device 220 that distort, muffle, andconceal the conversations to prevent the microphone 230 associated withthe electronic device 210 from detecting or receiving clear soundsignals from a sound source.

In some embodiments, the security components may include emitting whitenoise and noise cancelling signals towards the electronic device 210. Asa result, even if a third party were to remotely access the electronicdevice 210 and its microphone 230, the security device 220 will ensurethat any recorded or streamed audio feed picked up by the microphone 230of the electronic device 210 will be distorted, muffled, or jammed.Thus, the user's privacy may be maintained even if a third party were toremotely access the electronic device 210.

In some embodiments, the electronic device 210 may be powered on or off.By way of example, the electronic device 210 may be powered on and offvia recognized voice commands. When the electronic device 210 is poweredon to be used by a user, the security device 220 may be turned off inorder to ensure proper operation of the electronic device 210. By way ofexample, the security device 220 may also be appropriately turned on orturned off via one or more recognized voice commands. For example, amicrophone 240 on the security device 220 may continuously detect foraudible noise and analyze such noises for recognized voice commands.

As illustrated in FIG. 2B, the security device 220, placed overelectronic device 210, may have a shape corresponding to that of theelectronic device 210. For example, the security device 220 may haveapproximately the same dimensions as the electronic device 210. In someembodiments, the security device 220 may be dimensioned to be largerthan the electronic device 210. For example, as illustrated in FIG. 2C,the security device 220 may be cone shaped, so that it may be easilyplaced over electronic devices of various sizes and shapes. In someinstances, the cone-shaped security device 220 may be balanced on top ofthe electronic device 210 without any additional structural support.However, it should be noted that the security device 220 is not limitedto any particular shape of any particular dimensions. Instead, thesecurity device 220 may come in any shape or size as needed to cover orenvelope certain areas of the electronic device 210, such as the areaswhere a video camera 250 associated with the electronic device 210 islocated. In some embodiments, the shape of the security device 220 mayinclude a square prism, rectangular prism, a cylinder, a sphere, apyramid, and the like.

Additionally, the security device 220 may also include the abovementioned security components that will allow the emittance of whitenoise and noise cancelling signals at the electronic device 210. Thus,the security device 220 may also be able to ensure that any recorded orstreamed audio feed picked up by the microphone 230 will be distorted,muffled, or jammed.

In some embodiments, the security device 220 may be supported bystructural elements to allow the security device 220 to be elevatedabove the electronic device 210 without removing it. In some Forexample, as illustrated in FIG. 2D, the security device may includestructural elements 226, 228 configured to elevate the security device220 above the electronic device 210 in order to permit the functioningof the electronic device without removing the security device 220.

FIG. 3A illustrates a security device 320 in an active mode placed overan electronic device 310 in accordance with one embodiment.Additionally, FIG. 3B illustrates a security device 320 in a non-activemodes placed over electronic device 310 in accordance with oneembodiment. FIGS. 3A-3B will be explained herein together in detail.

In FIG. 3A, the active mode may be designated when the security device320 is appropriately enveloped to completely surround or cover selectareas of the electronic device 310. The components of the securitydevice 320 may include those as described above with reference to FIGS.2A-2B. By way of example, the security device 320 in the closed mode maycompletely cover the top portions of the electronic device 310,especially in areas where the camera 350 may be located. Byappropriately placing the security device 320 over the camera 350, thecamera 350 will no longer be able to take images or videos of theimmediately surrounding space or area where the electronic device 310 islocated. Thus, even in the instance where a third party may gainunapproved remote access to the camera 350 of the electronic device 310,the security device 320 may effectively block the third party fromstreaming or recording images/video feed of the surrounding areas.Instead, the third party will only be able to view a blacked out imageor video feed as a result of the security device 320 effectivelycovering the camera 350.

In some instances, the security device 320 may also be composed ofsectionalized pieces 340, where the sectionalized pieces overlap,physically fold, slide, lift up, flip, or rotate in order to provideopenings of the security device 320 itself. By doing so, this may alsoexpose the areas of the electronic device 310 that were once covered, asfurther depicted in FIG. 3B.

As illustrated in FIG. 3B, the sectionalized pieces 340 of the securitydevice 320 may be overlapped to provide openings within the securitydevice 320. When the openings are created, this may indicate that thesecurity device 320 is now in the non-active mode, where one or more ofthe security features or components are deactivated and thus allowcontinued full operation of the electronic device 310. Morespecifically, the openings may now allow the camera 350 to be exposed tothe environment. Additionally, in the non-active mode, this may furtherexpose the microphone 330 to the environment, which may allow themicrophone 330 to more readily pick up and recognize the voice commandand record sounds. Similarly, as illustrated in FIG. 4, the securitydevice 320 may include an aperture 345 that can be exposed. For example,the top portion of the security device 320 may include sectionalizedpieces 342 which may be moved so as to expose the aperture within thesecurity device 320, thereby allowing the electronic device 310 to befully functional. In some embodiments, the sectionalized pieces 342,illustrated in FIG. 4, may lift up, flip, or rotate

Furthermore, in the non-active mode, some or all of the securitycomponents featured within the security device 320 may be disengaged.For example, some of the security components featured in the securitydevice 320 may include emitting white noise and/or noise cancellingsignals. Because employing the white noise and noise cancelling signalsmay effectively interfere with the original sounds, such securitycomponents may hinder and interfere with the microphone's 330 ability topick up and/or record distinct audible conversations from the room. As aresult, when in the non-active mode, the security components may bedisengaged so that the electronic device 310 is able to resume operationand be able to properly detect for audio and voice commands without anyinterference.

However, when the user no longer is engaged with the electronic device310, the user may revert the security device 320 to active mode so thatthe security components may be engaged and operational. This may thengive the user peace of mind that the electronic device 310 cannot listenor record the user's conversations or take images and videos of thesurrounding areas.

To revert from active mode to non-active mode and vice versa, by way ofexample, the user may fold, slide, lift up, flip, or rotate thesectionalized pieces 340. In some instances, when the sectionalizedpieces 340 are folded or rotated to expose openings the electronicdevice 320 this may trigger the powering off the security device 320 orat least deactivating the security components. On the contrary, when thesectionalized pieces 340 are expanded to eliminate any gaps or openings,this may trigger the turning on the security device 320 and at leastactivating one or more of the security components.

In other instances, the security device 320 may be triggered to be inthe active or non-active mode based upon voice commands. For example, inthe instance that the user seeks to place the security device 320 in theactive mode, the security device 320 may be configured so that thesliding and rotating of the sectionalized pieces 342 is automated. Thesecurity device 320 may detect and recognize the voice commands from theuser via the microphone 360 and the speech recognizer within thesecurity device 320 itself. When the voice commands are recognized, thesecurity device 320 may physically fold, slide, lift up, flip, or rotatethe sectionalized pieces 342 accordingly, which may then trigger thepowering on or off the security device 320.

FIG. 5 illustrates a security system 500 that includes an electronicdevice 510, a first security device 520, and a second security device530 in accordance with one embodiment. The electronic device 510 in thiscase is an intelligent automated assistant device. The components of thefirst security device 520 and the second security device 530 may includethose as described above with reference to FIGS. 2A-2D and 3A-3B.

In some embodiments, the security devices may include one or morecomponents configured to transmit and receive instructions wirelessly.For example, the second security device 530 may include one or more of atransmitter, a receiver, and/or other such electronic components (notshown) configured to transmit and receive wireless signal. In someembodiments, the second security device 530 may be configured to enablethe first security device 520 to operate in the active mode and in thenon-active mode. For example, the second security device 530 maytransmit a signal to a receiver in the first security device 520,wherein the signal provides instructions as to whether the firstsecurity device 520 is to operate in the active mode or in thenon-active mode.

In some instances, the second security device 530 may direct the mode ofoperation of the first security device 520 in response to audio commandsfrom the user. For example, the second security device 530 may include aspeech recognizer software where it can detect for audio commands pickedup by the microphone 540. Thus, in the instance that the user requeststhe active mode of the first security device 520, the second securitydevice 530 may detect the recognized commands via the microphone 540 andtransmit a signal to the first security device 520 directing it tooperate in the active mode, as alluded to above.

Furthermore, when the user has finished utilizing the electronic device510 for the time being, the user may then activate the security featuresof the second security device 530 to prevent potential third partiesfrom recording or streaming live conversations picked up by themicrophone 550 or camera 560 of the electronic device 510. To poweron/off the second security device 530, the user may manually do so withthe push of the power button on the second security device 530 itself.In other instances, powering on and powering off of the second securitydevice 530 may be automated. For example, the second security device 530may include a speech recognizer software where it can detect for audiocommands picked up by the microphone 540. Upon recognized commands, thesecond security device 530 may then power on/off based on the user'scommunicated request.

Additionally, the first security device 520 and the second securitydevice 530 may include security features that may be activated only whenthe user has input the proper password or authentication credentials.For example, the first security device 520 and the second securitydevice 530 may request that the user audibly dictate the combination ofwords, letters, phrases, numbers, etc. In further embodiments, the firstsecurity device 520 and the second security device 530 may have an inputdevice, such a keyboard or screen, for the user to manually input thekey word or password. The first security device 520 and the secondsecurity device 530 may be locked until the proper password is entered.The password may be stored in the memory or data storage of the firstsecurity device 520 and the second security device 530, respectively.

In some instances, the first security device 520 and the second securitydevice 530 may have different passwords, thus requiring the user tounlock the first security device 520 and the second security device 530separately. In other instances, both the first security device 520 andthe second security device 530 may share the same password, and thus maybe unlocked simultaneously. However, it should be noted that otherauthentication methods may also be used, such as biometricauthentication and other methods as would be appreciated by any one ofordinary skill in the art. It should be noted that first security device520 and the second security device 530 individually may each have itsown security password. Thus, the first security device 520 and thesecond security device 530 disclosed in FIGS. 2A-2D and 3A-3B may alsoeach have their own password protection security as described here withrespect to FIG. 5.

FIG. 6 illustrates an exemplary process for securing an electronic inaccordance to varying embodiments. The exemplary process 600 may beginat step 610, where the security device may be placed on or near theelectronic device. In this instance, the term “near” may be used todefine any determined distance where the signal or sound waves from thesecurity device is able to reach the electronic device.

In some instances, the security device may be composed of one component(e.g., one device total) or a total of two or more components (e.g. twoor more devices in total). In the instance that the security device iscomposed of one component, the first component may be configured to atleast distort, muffle, and conceal the sounds to be picked up by themicrophone of the electronic device. As such, the first component may beplaced near the electronic device to emit the white noise and noisecancelling signals towards the microphone of the electronic device.

In the instance that the security device is composed of at least twocomponents, the first component is placed near the electronic device toat least distort, muffle, and conceal the sounds to be picked up by themicrophone of the electronic device and the second component may be atleast be a physical covering that shields the camera located on theelectronic device. In such instances, the second component may be placedon top of the electronic device itself to at least shield or cover thecamera located on the electronic device. However, it should be notedthat the second component may also include the security componentsfeatured in the first component, such as those to distort, muffle, andconceal the sounds to be picked up by the microphone of the electronicdevice.

Next, the process 600 may proceed to step 620, where the security devicemay be powered on by voice activation to activate the security measures.In some instances, the security device may be password protected.

Next, the process 600 may proceed to step 630, where the securityfeatures or components of the security device may be implemented in theelectronic device. These security features may prevent the camera and/ormicrophone from electronic device from collecting proper audio andvisual feed. By way of example, one of the security components may be tophysically cover the camera of the electronic device. In otherinstances, the other security features may be to emit the white noiseand noise cancelling signals towards the microphone of the electronicdevice, and thus effectively distorting, muffling, and concealing thesounds to be picked up by the microphone so that clear audio is nottransmitted.

Various embodiments have been described with reference to specificexample features thereof. It will, however, be evident that variousmodifications and changes may be made thereto without departing from thebroader spirit and scope of the various embodiments as set forth in theappended claims. The specification and figures are, accordingly, to beregarded in an illustrative rather than a restrictive sense.

Although described above in terms of various example embodiments andimplementations, it should be understood that the various features,aspects and functionality described in one or more of the individualembodiments are not limited in their applicability to the particularembodiment with which they are described, but instead may be applied,alone or in various combinations, to one or more of the otherembodiments of the present application, whether or not such embodimentsare described and whether or not such features are presented as being apart of a described embodiment. Thus, the breadth and scope of thepresent application should not be limited by any of the above-describedexample embodiments.

FIG. 7 depicts a block diagram of an example computer system in whichany of the embodiments described herein may be implemented. The variouscomponents illustrated in FIGS. 1-6 may be implemented according to thecomputer system 700. The computer system 700 includes a bus 702 or othercommunication mechanism for communicating information, one or morehardware processors 704 coupled with bus 702 for processing information.Hardware processor(s) 704 may be, for example, one or more generalpurpose microprocessors.

The computer system 700 also includes a main memory 706, such as arandom access memory (RAM), cache and/or other dynamic storage devices,coupled to bus 702 for storing information and instructions to beexecuted by processor 704. Main memory 706 also may be used for storingtemporary variables or other intermediate information during executionof instructions to be executed by processor 704. Such instructions, whenstored in storage media accessible to processor 704, render computersystem 700 into a special-purpose machine that is customized to performthe operations specified in the instructions.

The computer system 700 further includes a read only memory (ROM) 708 orother static storage device coupled to bus 702 for storing staticinformation and instructions for processor 704. A storage device 710,such as a magnetic disk, optical disk, or USB thumb drive (Flash drive),etc., is provided and coupled to bus 702 for storing information andinstructions.

The computer system 700 may be coupled via bus 702 to a display 712,such as a cathode ray tube (CRT) or LCD display (or touch screen), fordisplaying information to a computer user. An input device 714,including alphanumeric and other keys, is coupled to bus 702 forcommunicating information and command selections to processor 704.Another type of user input device is cursor control 716, such as amouse, a trackball, or cursor direction keys for communicating directioninformation and command selections to processor 704 and for controllingcursor movement on display 712. This input device typically has twodegrees of freedom in two axes, a first axis (e.g., x) and a second axis(e.g., y), that allows the device to specify positions in a plane. Insome embodiments, the same direction information and command selectionsas cursor control may be implemented via receiving touches on a touchscreen without a cursor.

The computing system 700 may include a user interface component toimplement a GUI that may be stored in a mass storage device asexecutable software codes that are executed by the computing device(s).This and other components may include, by way of example, components,such as software components, object-oriented software components, classcomponents and task components, processes, functions, attributes,procedures, subroutines, segments of program code, drivers, firmware,microcode, circuitry, data, databases, data structures, tables, arrays,and variables.

The computer system 700 may implement the techniques described hereinusing customized hard-wired logic, one or more ASICs or FPGAs, firmwareand/or program logic which in combination with the computer systemcauses or programs computer system 700 to be a special-purpose machine.According to one embodiment, the techniques herein are performed bycomputer system 700 in response to processor(s) 704 executing one ormore sequences of one or more instructions contained in main memory 706.Such instructions may be read into main memory 706 from another storagemedium, such as storage device 710. Execution of the sequences ofinstructions contained in main memory 706 causes processor(s) 704 toperform the process steps described herein. In alternative embodiments,hard-wired circuitry may be used in place of or in combination withsoftware instructions.

The term “non-transitory media,” and similar terms, as used hereinrefers to any media that store data and/or instructions that cause amachine to operate in a specific fashion. Such non-transitory media maycomprise non-volatile media and/or volatile media. Non-volatile mediaincludes, for example, optical or magnetic disks, such as storage device710. Volatile media includes dynamic memory, such as main memory 706.Common forms of non-transitory media include, for example, a floppydisk, a flexible disk, hard disk, solid state drive, magnetic tape, orany other magnetic data storage medium, a CD-ROM, any other optical datastorage medium, any physical medium with patterns of holes, a RAM, aPROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip orcartridge, and networked versions of the same.

Non-transitory media is distinct from but may be used in conjunctionwith transmission media. Transmission media participates in transferringinformation between non-transitory media. For example, transmissionmedia includes coaxial cables, copper wire and fiber optics, includingthe wires that comprise bus 702. Transmission media can also take theform of acoustic or light waves, such as those generated duringradio-wave and infra-red data communications.

Various forms of media may be involved in carrying one or more sequencesof one or more instructions to processor 704 for execution. For example,the instructions may initially be carried on a magnetic disk or solidstate drive of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 700 canreceive the data on the telephone line and use an infra-red transmitterto convert the dat to an infra-red signal. An infra-red detector canreceive the data carried in the infra-red signal and appropriatecircuitry can place the data on bus 702. Bus 702 carries the data tomain memory 706, from which processor 704 retrieves and executes theinstructions. The instructions received by main memory 706 mayoptionally be stored on storage device 710 either before or afterexecution by processor 704.

The computer system 700 also includes a communication interface 718coupled to bus 702. Communication interface 718 provides a two-way datacommunication coupling to one or more network links that are connectedto one or more local networks. For example, communication interface 718may be an integrated services digital network (ISDN) card, cable modem,satellite modem, or a modem to provide a data communication connectionto a corresponding type of telephone line. As another example,communication interface 718 may be a local area network (LAN) card toprovide a data communication connection to a compatible LAN (or WANcomponent to communicate with a WAN). Wireless links may also beimplemented. In any such implementation, communication interface 718sends and receives electrical, electromagnetic or optical signals thatcarry digital data streams representing various types of information.

A network link 720 typically provides data communication through one ormore networks to other data devices. For example, a network link mayprovide a connection through local network to a host computer 724 or todata equipment operated by an Internet Service Provider (ISP) 726. TheISP 726 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the“Internet” 728. Local network 722 and Internet 728 both use electrical,electromagnetic or optical signals that carry digital data streams. Thesignals through the various networks and the signals on network link andthrough communication interface 718, which carry the digital data to andfrom computer system 700, are example forms of transmission media.

The computer system 700 can send messages and receive data, includingprogram code, through the network(s), network link and communicationinterface 718. In the Internet example, a server 730 might transmit arequested code for an application program through the Internet 728, theISP 726, the local network 722 and the communication interface 718. Thereceived code may be executed by processor 704 as it is received, and/orstored in storage device 710, or other non-volatile storage for laterexecution.

As used herein, the term module might describe a given unit offunctionality that can be performed in accordance with one or moreembodiments of the present application. As used herein, a module mightbe implemented utilizing any form of hardware, software, or acombination thereof. For example, one or more processors, controllers,ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routinesor other mechanisms might be implemented to make up a module. Inimplementation, the various modules described herein might beimplemented as discrete modules or the functions and features describedcan be shared in part or in total among one or more modules. In otherwords, as would be apparent to one of ordinary skill in the art afterreading this description, the various features and functionalitydescribed herein may be implemented in any given application and can beimplemented in one or more separate or shared modules in variouscombinations and permutations. Even though various features or elementsof functionality may be individually described or claimed as separatemodules, one of ordinary skill in the art will understand that thesefeatures and functionality can be shared among one or more commonsoftware and hardware elements, and such description shall not requireor imply that separate hardware or software components are used toimplement such features or functionality.

Where components or modules of the application are implemented in wholeor in part using software, in one embodiment, these software elementscan be implemented to operate with a computing or processing modulecapable of carrying out the functionality described with respectthereto. One such example computing module is shown in FIG. 7. Variousembodiments are described in terms of this example-computing module 700.After reading this description, it will become apparent to a personskilled in the relevant art how to implement the application using othercomputing modules or architectures.

Various embodiments have been described with reference to specificexemplary features thereof. It will, however, be evident that variousmodifications and changes may be made thereto without departing from thebroader spirit and scope of the various embodiments as set forth in theappended claims. The specification and figures are, accordingly, to beregarded in an illustrative rather than a restrictive sense.

Terms and phrases used in the present application, and variationsthereof, unless otherwise expressly stated, should be construed as openended as opposed to limiting. As examples of the foregoing: the term“including” should be read as meaning “including, without limitation” orthe like; the term “example” is used to provide exemplary instances ofthe item in discussion, not an exhaustive or limiting list thereof; theterms “a” or “an” should be read as meaning “at least one,” “one ormore” or the like; and adjectives such as “conventional,” “traditional,”“normal,” “standard,” “known” and terms of similar meaning should not beconstrued as limiting the item described to a given time period or to anitem available as of a given time, but instead should be read toencompass conventional, traditional, normal, or standard technologiesthat may be available or known now or at any time in the future.Likewise, where this document refers to technologies that would beapparent or known to one of ordinary skill in the art, such technologiesencompass those apparent or known to the skilled artisan now or at anytime in the future.

The presence of broadening words and phrases such as “one or more,” “atleast,” “but not limited to” or other like phrases in some instancesshall not be read to mean that the narrower case is intended or requiredin instances where such broadening phrases may be absent. The use of theterm “module” does not imply that the components or functionalitydescribed or claimed as part of the module are all configured in acommon package. Indeed, any or all of the various components of amodule, whether control logic or other components, can be combined in asingle package or separately maintained and can further be distributedin multiple groupings or packages or across multiple locations.

Additionally, the various embodiments set forth herein are described interms of exemplary block diagrams, flow charts and other illustrations.As will become apparent to one of ordinary skill in the art afterreading this document, the illustrated embodiments and their variousalternatives can be implemented without confinement to the illustratedexamples. For example, block diagrams and their accompanying descriptionshould not be construed as mandating a particular architecture orconfiguration.

What is claimed is:
 1. A security system for securing an electronicdevice comprising a first device component, the security systemcomprising: a security device secured to the electronic device; whereinthe security device comprises security components configured to preventthe first device component from receiving input.
 2. The security systemof claim 1, wherein the electronic device comprises at least one of anintelligent automated assistant device, a wireless phone device, atablet computer, a computer configured with a webcam, a doorbell device,a thermostat device, a video recording device, a television, and a voicerecorder; wherein the electronic device is connected to an internet. 3.The security system of claim 1, wherein the first device componentcomprises a first microphone.
 4. The security system of claim 3, whereinthe security components distort sounds from a sound source to bedetected by the first microphone.
 5. The security system of claim 3,wherein the security device comprises a second microphone and speechrecognition software to enable voice activation control.
 6. The securitysystem of claim 5, wherein the security device is configured to disablethe first microphone of the electronic device upon detecting a firstvoice command via the second microphone of the security device.
 7. Thesecurity system of claim 1, wherein the electronic devices comprises avideo recording component.
 8. The security system of claim 7, whereinthe security device is configured to block the video recording componentof the electronic device upon detecting a first voice command via thesecond microphone of the security device.
 9. The security system ofclaim 6, wherein the security device is configured to enable the firstmicrophone of the electronic upon detecting a second voice command viathe second microphone.
 10. The security system of claim 6, wherein thefirst voice command comprises a voice command to enable the securitysystem.
 11. The security system of claim 9, wherein the second voicecommand comprises a voice command to disable the security system.