Feeds

Holy f**k, Microsoft covers up ‘undesired’ words

Patents new audio censoring software

Boost IT visibility and business value

Microsoft has gained patent rights to a technology for censoring speech.

An automatic censoring filter, available in real-time mode or a batch mode, processes an input audio data stream containing speech and then alters “undesired words or phrases” to make them “unintelligible or inaudible”.

The software giant was awarded patent number 7,437,290 by the US Patent and Trademark Office last Tuesday (14 October).

Presumably the tech is intended to soothe the ears of sensitive souls who prefer a beep to a word such as ‘fuck’ slipping out during a live broadcast. Or in call centres, if a shirty employee goes off the rails and starts swearing at the customer, the software could censor anything deemed offensive or to not be toeing the company line.

This tech in fact moves on from the crude beep sloppily employed to mask what Microsoft repeatedly refers to as “undesired words” heard in live recordings.

Instead, the auto censoring filter uses a lattice comprising either phonemes and/or words derived from phonemes for comparison against corresponding phonemes or words included in undesired speech data.

“If the probability that a phoneme or word in the input audio data stream matches a corresponding phoneme or word in the undesired speech data is greater than a probability threshold, the input audio data stream is altered so that the undesired word or a phrase comprising a plurality of such words is unintelligible or inaudible,” said MS in the USPTO filing for the new patent.

It's not entirely clear where Microsoft's interest in this technology lies. But such a move could be looked upon favourably by the Chinese government, which consistently attempts to censor much of the web.

Indeed, in August 2007 the company, alongside Yahoo!, inked a web pact with the People's Republic government in which it agreed to record the identities of bloggers and censor content. ®

Boost IT visibility and business value

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.