-
公开(公告)号:US20230360641A1
公开(公告)日:2023-11-09
申请号:US17736959
申请日:2022-05-04
申请人: Apple Inc.
摘要: The subject disclosure provides systems and methods for generating and storing learned embeddings of audio inputs to an electronic device. The electronic device may generate and store encoded versions of audio inputs and learned embeddings of the audio inputs. When a new audio input is obtained, the electronic device can generate an encoded version of the new audio input, compare the encoded version of the new audio input to the stored encoded versions of prior audio inputs, and if the encoded version of the new audio input matches one of the stored encoded versions of the prior audio inputs, the electronic device can provide a stored learned embedding that corresponds to the one of the stored encoded versions of the prior audio inputs to a detection model at the electronic device. The cached embeddings can be provided to locally trained models for detecting individual sounds using electronic devices.
-
公开(公告)号:US20180337911A1
公开(公告)日:2018-11-22
申请号:US15721301
申请日:2017-09-29
申请人: Apple Inc.
发明人: Jay S. COGGIN , Daniel C. KLINGLER , Kyle C. BROGLE , Johannes P. SCHMIDT , Eric A. ALLAMANCHE , Thomas ALSINA , Bob BRADLEY , Alex T. NELSON , Rudolph VAN DER MERWE , Joseph M. TRISCARI , Keun Sup LEE , Pedro MARI , Aaron M. ELDER , Richard M. POWELL
CPC分类号: H04L63/083 , G06F21/45 , H04L63/18 , H04W12/003 , H04W12/06
摘要: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US20200076788A1
公开(公告)日:2020-03-05
申请号:US16579712
申请日:2019-09-23
申请人: Apple Inc.
发明人: Jay S. COGGIN , Daniel C. KLINGLER , Kyle C. BROGLE , Johannes P. SCHMIDT , Eric A. ALLAMANCHE , Thomas ALSINA , Bob BRADLEY , Alex T. NELSON , Rudolph VAN DER MERWE , Joseph M. TRISCARI , Keun Sup LEE , Pedro MARI , Aaron M. ELDER , Richard M. POWELL
摘要: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
公开(公告)号:US20230177942A1
公开(公告)日:2023-06-08
申请号:US18103486
申请日:2023-01-30
申请人: Apple Inc.
CPC分类号: G08B21/182 , G01H3/005 , G08B7/06 , G10L25/51 , G06N20/00
摘要: An electronic device includes a processor, and a memory containing instructions that, when executed by the processor, cause the electronic device to learn a sound emitted by a legacy device and to issue an output when the electronic device subsequently hears the sound. For example, the electronic device can receive a training input and extract a compact representation of a sound in the training input, which the device stores. The device can receive an audio signal corresponding to an observed acoustic scene and extract a representation of the observed acoustic scene from the audio signal. The electronic device can determine whether the sound is present in the observed acoustic scene at least in part from a comparison of the representation of the observed acoustic scene with the representation of the sound. The electronic device emits a selected output responsive to determining that the sound is present in the acoustic scene.
-
公开(公告)号:US20220391758A1
公开(公告)日:2022-12-08
申请号:US17737017
申请日:2022-05-04
申请人: Apple Inc.
发明人: Jonathan HUANG , Miquel ESPI MARQUES , Carlos M. AVENDANO , Kevin M. DURAND , David FINDLAY , Vasudha KOWTHA , Daniel C. KLINGLER , Yichi ZHANG
摘要: The subject disclosure provides systems and methods for providing locally trained models for detecting individual sounds using electronic devices. Local detection of individual sounds with a detection model at an electronic device can be provided by obtaining training samples for the detection model with the electronic device, and generating additional negative and positive training samples based on the obtained training samples. A two-stage detection process may be provided, in which a trigger model at a device compares an audio input to a reference sound to trigger a detection model at the device. The detection of individual sounds with a detection model at an electronic device can also leverage audio capture capabilities of multiple devices in an acoustic scene to capture multiple concurrent training samples.
-
公开(公告)号:US20210392129A1
公开(公告)日:2021-12-16
申请号:US17356487
申请日:2021-06-23
申请人: Apple Inc.
发明人: Jay S. COGGIN , Daniel C. KLINGLER , Kyle C. BROGLE , Johannes P. SCHMIDT , Eric A. ALLAMANCHE , Thomas ALSINA , Bob BRADLEY , Alex T. NELSON , Rudolph VAN DER MERWE , Joseph M. TRISCARI , Keun Sup LEE , Pedro MARI , Aaron M. ELDER , Richard M. POWELL
摘要: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
-
-
-
-