CN106782498B - Voice information playing method and device and terminal - Google Patents

Voice information playing method and device and terminal Download PDF

Info

Publication number
CN106782498B
CN106782498B CN201611085036.XA CN201611085036A CN106782498B CN 106782498 B CN106782498 B CN 106782498B CN 201611085036 A CN201611085036 A CN 201611085036A CN 106782498 B CN106782498 B CN 106782498B
Authority
CN
China
Prior art keywords
voice information
voice
terminal
matching degree
communication terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611085036.XA
Other languages
Chinese (zh)
Other versions
CN106782498A (en
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611085036.XA priority Critical patent/CN106782498B/en
Publication of CN106782498A publication Critical patent/CN106782498A/en
Application granted granted Critical
Publication of CN106782498B publication Critical patent/CN106782498B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/02Feature extraction for speech recognition; Selection of recognition unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Human Computer Interaction (AREA)
  • Computational Linguistics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a voice information playing method, a device and a terminal, wherein the method sends first voice information to a communication terminal; receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information; acquiring the decrypted voiceprint characteristics of the current user; matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree; and when the matching degree is greater than or equal to the threshold value of the matching degree, playing the second voice message. According to the scheme, the second voice message is played only when the current user is judged to be a legal user according to the encrypted voiceprint features in the voice message and the decrypted voiceprint features of the current user, so that the illegal user can be prevented from acquiring the real content of the voice message, the privacy information of the user can be effectively prevented from being leaked, and the information security of the terminal can be improved.

Description

Voice information playing method and device and terminal
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, and a terminal for playing voice information.
background
With the development of terminal technology, terminals such as smart phones have more and more functions. Voice functions on terminals are also becoming increasingly popular with users. For example, chatting with others using voice information is increasingly becoming the choice for more people.
However, on the other hand, users often involve private information such as property, personal information, etc. in chatting with others using voice information. In the use process of the terminal, a plurality of people often can operate the terminal. For example, the user sometimes needs to lend the terminal to another person for use, and even the terminal may be lost. Currently, the terminal does not impose any restrictions on the listening of voice information. Anyone who can operate a terminal can listen to voice information on the terminal, thereby easily causing leakage of user privacy information.
Therefore, when the voice information relates to the personal privacy information, the current terminal cannot effectively protect the voice information, and the information security of the terminal is low.
Disclosure of Invention
the embodiment of the invention provides a voice information playing method, a voice information playing device and a terminal, which can improve the information security of the terminal.
the embodiment of the invention provides a voice information playing method, which comprises the following steps:
Sending the first voice information to a communication terminal;
receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information;
Acquiring the decrypted voiceprint characteristics of the current user;
Matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree;
And when the matching degree is greater than or equal to the threshold value of the matching degree, playing the second voice message.
Correspondingly, an embodiment of the present invention further provides a device for playing voice information, including:
The sending module is used for sending the first voice information to the communication terminal;
The receiving module is used for receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information;
The first acquisition module is used for acquiring the decrypted voiceprint characteristics of the current user;
The matching module is used for matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree;
And the playing module is used for playing the second voice message when the matching degree is greater than or equal to the threshold value of the matching degree.
Correspondingly, an embodiment of the present invention further provides a terminal, including:
The touch screen is used for receiving touch operation of a user;
A memory storing executable program code;
A processor coupled to the memory;
The processor calls the executable program code stored in the memory to execute the voice information playing method.
The embodiment of the invention sends the first voice information to the communication terminal; receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information; acquiring the decrypted voiceprint characteristics of the current user; matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree; and when the matching degree is greater than or equal to the threshold value of the matching degree, playing the second voice message. According to the scheme, the second voice message is played only when the current user is judged to be a legal user according to the encrypted voiceprint features in the voice message and the decrypted voiceprint features of the current user, so that the current user cannot know the real content of the voice message when the current user is not the legal user, the illegal user can be prevented from acquiring the real content of the voice message, the privacy information of the user can be effectively prevented from being leaked, and the information safety of the terminal can be improved.
Drawings
in order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a schematic flow chart of a voice information playing method according to an embodiment of the present invention.
Fig. 2 is another schematic flow chart of a voice message playing method according to an embodiment of the present invention.
fig. 3 is a schematic flowchart of a voice information playing method according to an embodiment of the present invention.
Fig. 4 is a schematic flow chart of a voice message playing method according to an embodiment of the present invention.
fig. 5 is a schematic view of an application scenario of the voice information playing method according to the embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a voice information playing apparatus according to an embodiment of the present invention.
Fig. 7 is another schematic structural diagram of a voice information playing apparatus according to an embodiment of the present invention.
fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
fig. 9 is another schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
the technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
the terms "first," "second," "third," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the objects so described are interchangeable under appropriate circumstances. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, or apparatus, terminal, system comprising a list of steps is not necessarily limited to those steps or modules or elements expressly listed, and may include other steps or modules or elements not expressly listed, or inherent to such process, method, apparatus, terminal, or system.
the embodiment of the invention provides a voice information playing method, a voice information playing device and a terminal, which are respectively described in detail below.
a voice information playing method can be applied to a terminal, and the terminal can be a smart phone, a tablet personal computer and other devices.
As shown in fig. 1, the method for playing voice information may include the following steps:
S110, sending the first voice information to a communication terminal;
And S120, receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information.
In practical application, referring to fig. 5, fig. 5 is a schematic view of an application scenario of the voice information playing method provided in the embodiment of the present invention, where a terminal a is used as an executor of the voice information playing method. In the process of chatting between the user A and the user B through the voice information, the user A inputs first voice information to the terminal A, and the terminal A sends the first voice information input by the user A to the terminal B. The first voice information may be voice information input by the user a during a history chat with the user B. And the terminal B extracts the voiceprint characteristics from the received first voice information. The voiceprint feature is the voiceprint feature of user a. After the user B inputs the second voice information to the terminal B, the terminal B encrypts the second voice information by using the extracted voiceprint feature, that is, encrypts the second voice information by using the voiceprint feature of the user a, and then sends the encrypted second voice information to the terminal a. And after receiving the second voice message sent by the terminal B, the terminal A extracts the encrypted voiceprint characteristics from the second voice message and requests the user A to input the decrypted voice. After the user A inputs the decrypted voice to the terminal A, the terminal A extracts the decrypted voiceprint feature from the decrypted voice. The decrypted voiceprint feature is the voiceprint feature of user a.
the communication terminal is a communication opposite terminal of the terminal a, i.e. the terminal B. Voiceprint features refer to the characteristics of the voice of a person as it speaks. The voiceprint characteristics are different for each person and therefore may be used to distinguish between different users.
In fig. 5, the user a refers to the user of the terminal a, and the user who inputs the first speech information to the terminal a and the user who inputs the decrypted speech to the terminal a are not necessarily the same person. In practical applications, the user who inputs the most chat voice information to the terminal a is the owner (i.e., the owner of the terminal). The first voice message may be understood as a voice message input by the owner of the terminal a. The encrypted voiceprint feature used by terminal B can be understood as the voiceprint feature of the owner of terminal a.
S130, acquiring the decrypted voiceprint characteristics of the current user.
in practical application, after receiving the second voice message, the terminal requests the current user to input the decrypted voice. The decrypted voice may be a piece of voice information of any duration. And after receiving the decrypted voice input by the current user, the terminal analyzes and processes the decrypted voice to acquire the decrypted voiceprint characteristic of the current user from the decrypted voice. The decrypted voiceprint feature is used for decrypting the second voice message received by the terminal.
And S140, matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree.
in practical application, after receiving the second voice message, the terminal extracts the encrypted voiceprint feature in the second voice message. And then, after the terminal acquires the decrypted voiceprint characteristics of the current user, comparing the decrypted voiceprint characteristics with the extracted encrypted voiceprint characteristics to match the decrypted voiceprint characteristics with the encrypted voiceprint characteristics to obtain the matching degree. The matching degree is the similarity degree between the decrypted voiceprint characteristic and the encrypted voiceprint characteristic.
It should be noted that, theoretically, the matching degree between the voiceprint features extracted from two times of voice messages of the same user should be 100%. However, in practice, because there may be an error in the process of analyzing and processing the voice information by the terminal to extract the voiceprint features, and there may be a distortion in the voice information during transmission, the matching degree between the voiceprint features extracted from two times of voice information of the same user may be less than 100%. Therefore, the above-mentioned threshold value of the degree of matching should be less than 100%.
s150, when the matching degree is larger than or equal to the threshold value of the matching degree, the second voice message is played.
In practical application, after the terminal obtains the matching degree, the matching degree is compared with a matching degree threshold value to judge whether the matching degree is greater than or equal to the matching degree threshold value. The threshold of the degree of match may be a percentage that is preset. For example, the threshold of the degree of matching is 80%. And when the matching degree is greater than or equal to the threshold value of the matching degree, the terminal plays the received second voice message. When the matching degree is smaller than the threshold value of the matching degree, the terminal can refuse to play the received second voice message or play a section of noise information, so that the current user cannot know the real content of the second voice message.
In some embodiments, as shown in fig. 2, when the matching degree is greater than or equal to the matching degree threshold, before the second voice message is played, the voice message playing method may further include the following steps:
S160, obtaining the communication traffic communicated with the communication terminal through the voice information;
s170, obtaining a threshold value of the matching degree according to the traffic.
in practical application, after the terminal obtains the matching degree between the encrypted voiceprint feature and the decrypted voiceprint feature, the terminal obtains the communication traffic communicated with the communication terminal through the voice information. The communication amount may be a communication time period or a communication content of voice information communication with the communication terminal. For example, when a user chats with another person using WeChat, the terminal acquires voice information communication traffic with the counterpart WeChat application. After the terminal acquires the traffic volume, the matching threshold may be acquired according to the traffic volume and the correspondence between the traffic volume and the matching threshold.
the larger the voice information communication quantity between the user and other users, the more voice information sent to other users by the user is shown. The communication terminal can more accurately extract the voiceprint feature of the user from the voice information. Therefore, as the traffic volume increases, the matching degree threshold may gradually increase. That is, the greater the amount of voice information traffic between a user and other users, the higher the threshold of degree of matching that is required.
in some embodiments, as shown in fig. 3, acquiring the communication traffic communicated with the communication terminal through the voice information may include the steps of:
S161, obtaining the total duration of the voice information sent to the communication terminal;
And S162, determining the total time length as the communication volume communicated with the communication terminal through the voice information.
in practical applications, the terminal may obtain the total duration of the voice message sent to the communication terminal, and then determine the total duration as the communication traffic communicated with the communication terminal through the voice message. The total duration is the sum of the durations of all the historical voice messages sent to the communication terminal, and not only refers to the duration of the voice message sent in the single voice message communication process. For example, since user a and user B established voice information communication using WeChat, user a sent a total of 100 pieces of voice information to user B within 5 days. The total duration of the 100 pieces of speech information is 10 minutes. The total length of time may be 10 minutes as the amount of communication for voice information communication with the user B.
In some embodiments, as shown in fig. 4, acquiring the communication traffic communicated with the communication terminal through the voice information may include the steps of:
s163, acquiring the number of times of sending voice information to the communication terminal;
S164, the number of times is determined as the amount of communication with the communication terminal by voice information.
In practical applications, the terminal may acquire the number of times of voice information transmitted to the communication terminal, and then determine the number of times as the amount of communication with the communication terminal through the voice information. The number of times is the total number of times of all the historical voice information transmitted to the communication terminal, and does not only refer to the number of times of the voice information transmitted in a single voice information communication process. For example, since user a and user B established voice information communication using WeChat, user a sent a total of 100 pieces of voice information to user B within 5 days. The total number of times of 100 times can be used as the amount of communication for voice information communication with the user B.
in some embodiments, referring to fig. 3 and 4, obtaining the threshold of the matching degree according to the traffic may include the following steps:
s171, determining a traffic interval where the traffic is located;
s172, obtaining a matching threshold according to the traffic interval and a preset corresponding relationship, where the preset corresponding relationship is a corresponding relationship between the traffic interval and the matching threshold.
In practice, traffic may have many values. The traffic volume can be divided into a plurality of intervals, and a corresponding matching degree threshold value is set for each interval, so that the matching degree threshold value is gradually increased along with the increase of the traffic volume.
Taking the traffic as the total duration, the traffic can be divided into the following intervals (the unit of traffic is minutes): (0, 5], (5, 10], (10, 15], (15, ∞.) and one matching degree threshold is set for each section, for example, the matching degree threshold corresponding to the section (0, 5%) is 80%, (5, 10%) is 85%, (10, 15%) is 90%, and (15, ∞%) is 95%.
after the terminal acquires the traffic, the interval where the traffic is located is determined, and then the matching degree threshold is acquired according to the interval and the preset corresponding relation. For example, when the traffic volume is 12 minutes, the interval corresponding to 12 minutes is determined to be (10, 15), and then the matching degree threshold is determined to be 90% from the correspondence.
In particular, the present invention is not limited by the execution sequence of the steps, and some steps may be performed in other sequences or simultaneously without conflict.
as can be seen from the above, the voice information playing method provided in the embodiment of the present invention sends the first voice information to the communication terminal; receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information; acquiring the decrypted voiceprint characteristics of the current user; matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree; and when the matching degree is greater than or equal to the threshold value of the matching degree, playing the second voice message. According to the scheme, the second voice message is played only when the current user is judged to be a legal user according to the encrypted voiceprint features in the voice message and the decrypted voiceprint features of the current user, so that the current user cannot know the real content of the voice message when the current user is not the legal user, the illegal user can be prevented from acquiring the real content of the voice message, the privacy information of the user can be effectively prevented from being leaked, and the information safety of the terminal can be improved.
The embodiment of the invention also provides a voice information playing device, which can be integrated in a terminal, wherein the terminal can be a smart phone, a tablet computer and other equipment.
As shown in fig. 6, the voice information playing apparatus 200 may include: the device comprises a sending module 201, a receiving module 202, a first obtaining module 203, a matching module 204 and a playing module 205.
The sending module 201 is configured to send a first voice message to a communication terminal;
The receiving module 202 is configured to receive second voice information encrypted by the communication terminal according to the voiceprint feature in the first voice information.
The communication terminal is a communication opposite terminal which communicates with the terminal. The sending module 201 in the terminal sends the first voice message to the communication terminal. The communication terminal extracts the voiceprint feature from the first voice message and encrypts the second voice message sent to the terminal using the voiceprint feature. Subsequently, the communication terminal transmits the encrypted second voice information to the terminal. The receiving module 202 in the terminal receives the second voice message.
wherein, the voiceprint feature refers to the voice feature when a person speaks. The voiceprint characteristics are different for each person and therefore may be used to distinguish between different users.
the first obtaining module 203 is configured to obtain a decrypted voiceprint feature of the current user.
In practical application, after the receiving module 202 receives the second voice message, the terminal requests the current user to input the decrypted voice. The decrypted voice may be a piece of voice information of any duration. After the terminal receives the decrypted voice input by the current user, the first obtaining module 203 analyzes and processes the decrypted voice to obtain the decrypted voiceprint feature of the current user from the decrypted voice. The decrypted voiceprint feature is used for decrypting the second voice message received by the terminal.
The matching module 204 is configured to match the decrypted voiceprint feature with the encrypted voiceprint feature in the second speech information to obtain a matching degree.
In practical application, after the receiving module 202 receives the second voice message, the terminal extracts the encrypted voiceprint feature in the second voice message. After the first obtaining module 203 obtains the decrypted voiceprint feature of the current user, the matching module 204 compares the decrypted voiceprint feature with the extracted encrypted voiceprint feature to match the decrypted voiceprint feature with the encrypted voiceprint feature, so as to obtain a matching degree. The matching degree is the similarity degree between the decrypted voiceprint characteristic and the encrypted voiceprint characteristic.
It should be noted that, theoretically, the matching degree between the voiceprint features extracted from two times of voice messages of the same user should be 100%. However, in practice, because there may be an error in the process of analyzing and processing the voice information by the terminal to extract the voiceprint features, and there may be a distortion in the voice information during transmission, the matching degree between the voiceprint features extracted from two times of voice information of the same user may be less than 100%. Therefore, the above-mentioned threshold value of the degree of matching should be less than 100%.
The playing module 205 is configured to play the second voice message when the matching degree is greater than or equal to a threshold matching degree.
in practical applications, after the matching module 204 obtains the matching degree, the playing module 205 compares the matching degree with the threshold of the matching degree to determine whether the matching degree is greater than or equal to the threshold of the matching degree. The threshold of the degree of match may be a percentage that is preset. For example, the threshold of the degree of matching is 80%. When the matching degree is greater than or equal to the threshold value of the matching degree, the playing module 205 plays the received voice message. When the matching degree is smaller than the threshold value of the matching degree, the playing module 205 may refuse to play the received voice message, or play a piece of noise information, so that the current user cannot know the real content of the voice message.
In some embodiments, as shown in fig. 7, the voice information playing apparatus 200 may further include: a second obtaining module 206 and a third obtaining module 207.
The second obtaining module 206, configured to obtain a communication traffic communicated with the communication terminal through the voice information;
the third obtaining module 207 is configured to obtain a threshold of the matching degree according to the traffic.
in practical application, after the terminal obtains the matching degree between the encrypted voiceprint feature and the decrypted voiceprint feature, the terminal obtains the communication traffic communicated with the communication terminal through the voice information. The communication amount may be a communication time period or a communication content of voice information communication with the communication terminal. For example, when a user chats with another person using WeChat, the terminal acquires voice information communication traffic with the counterpart WeChat application. After the terminal acquires the traffic volume, the matching threshold may be acquired according to the traffic volume and the correspondence between the traffic volume and the matching threshold.
the larger the voice information communication quantity between the user and other users, the more voice information sent to other users by the user is shown. The communication terminal can more accurately extract the voiceprint feature of the user from the voice information. Therefore, as the traffic volume increases, the matching degree threshold may gradually increase. That is, the greater the amount of voice information traffic between a user and other users, the higher the threshold of degree of matching that is required.
In some embodiments, the second obtaining module 206 is configured to perform the following steps:
Acquiring the total duration of voice information sent to a communication terminal;
The total duration is determined as a communication volume communicated with the communication terminal through voice information.
in practical applications, the second obtaining module 206 may obtain the total duration of the voice message sent to the communication terminal, and then determine the total duration as the communication traffic communicated with the communication terminal through the voice message. The total duration is the sum of the durations of all the historical voice messages sent to the communication terminal, and not only refers to the duration of the voice message sent in the single voice message communication process. For example, since user a and user B established voice information communication using WeChat, user a sent a total of 100 pieces of voice information to user B within 5 days. The total duration of the 100 pieces of speech information is 10 minutes. The total length of time may be 10 minutes as the amount of communication for voice information communication with the user B.
in some embodiments, the second obtaining module 206 is configured to perform the following steps:
acquiring the frequency of sending voice information to a communication terminal;
the number of times is determined as the amount of communication with the communication terminal by voice information.
in practical applications, the second obtaining module 206 may obtain the number of times of sending voice information to the communication terminal, and then determine the number of times as the communication traffic with the communication terminal through the voice information. The number of times is the total number of times of all the historical voice information transmitted to the communication terminal, and does not only refer to the number of times of the voice information transmitted in a single voice information communication process. For example, since user a and user B established voice information communication using WeChat, user a sent a total of 100 pieces of voice information to user B within 5 days. The total number of times of 100 times can be used as the amount of communication for voice information communication with the user B.
In some embodiments, the third obtaining module 207 is configured to perform the following steps:
determining a traffic interval in which the traffic is located;
and acquiring a matching degree threshold according to the communication volume interval and a preset corresponding relation, wherein the preset corresponding relation is the corresponding relation between the communication volume interval and the matching degree threshold.
In practice, traffic may have many values. The traffic volume can be divided into a plurality of intervals, and a corresponding matching degree threshold value is set for each interval, so that the matching degree threshold value is gradually increased along with the increase of the traffic volume.
Taking the traffic as the total duration, the traffic can be divided into the following intervals (the unit of traffic is minutes): (0, 5], (5, 10], (10, 15], (15, ∞.) and one matching degree threshold is set for each section, for example, the matching degree threshold corresponding to the section (0, 5%) is 80%, (5, 10%) is 85%, (10, 15%) is 90%, and (15, ∞%) is 95%.
After the terminal acquires the traffic, the interval where the traffic is located is determined, and then the matching degree threshold is acquired according to the interval and the preset corresponding relation. For example, when the traffic volume is 12 minutes, the interval corresponding to 12 minutes is determined to be (10, 15), and then the matching degree threshold is determined to be 90% from the correspondence.
In specific implementation, the modules may be implemented as independent entities, or may be combined arbitrarily and implemented as one or several entities.
As can be seen from the above, the voice information playing apparatus provided in the embodiment of the present invention sends the first voice information to the communication terminal through the sending module 201; the receiving module 202 receives second voice information encrypted by the communication terminal according to the voiceprint feature in the first voice information; the first obtaining module 203 obtains the decrypted voiceprint characteristics of the current user; the matching module 204 matches the decrypted voiceprint feature with the encrypted voiceprint feature in the second voice message to obtain a matching degree; the playing module 205 plays the second voice message when the matching degree is greater than or equal to the threshold value of the matching degree. According to the scheme, the second voice message is played only when the current user is judged to be a legal user according to the encrypted voiceprint features in the voice message and the decrypted voiceprint features of the current user, so that the current user cannot know the real content of the voice message when the current user is not the legal user, the illegal user can be prevented from acquiring the real content of the voice message, the privacy information of the user can be effectively prevented from being leaked, and the information safety of the terminal can be improved.
the embodiment of the invention also provides a terminal which can be equipment such as a smart phone and a tablet personal computer.
As shown in fig. 8, the terminal 300 may include: a sending module 301, a receiving module 302, a first obtaining module 303, a matching module 304, and a playing module 305.
The sending module 301 is configured to send a first voice message to a communication terminal;
the receiving module 302 is configured to receive second voice information encrypted by the communication terminal according to the voiceprint feature in the first voice information;
The first obtaining module 303 is configured to obtain a decrypted voiceprint feature of a current user;
the matching module 304 is configured to match the decrypted voiceprint feature with an encrypted voiceprint feature in the second voice message to obtain a matching degree;
The playing module 305 is configured to play the second voice message when the matching degree is greater than or equal to a threshold matching degree.
in some embodiments, the terminal 300 may further include: the device comprises a second acquisition module and a third acquisition module.
the second acquisition module is used for acquiring the communication traffic communicated with the communication terminal through the voice information;
the third obtaining module is configured to obtain a threshold of the matching degree according to the traffic.
In some embodiments, the second obtaining module is to:
Acquiring the total duration of voice information sent to a communication terminal;
The total duration is determined as a communication volume communicated with the communication terminal through voice information.
In some embodiments, the second obtaining module is to:
Acquiring the frequency of sending voice information to a communication terminal;
The number of times is determined as the amount of communication with the communication terminal by voice information.
In some embodiments, the third obtaining module is to:
determining a traffic interval in which the traffic is located;
and acquiring a matching degree threshold according to the communication volume interval and a preset corresponding relation, wherein the preset corresponding relation is the corresponding relation between the communication volume interval and the matching degree threshold.
As shown in fig. 9, the terminal 400 may include a Radio Frequency (RF) circuit 401, a memory 402 including one or more computer-readable storage media, an input unit 403, a display unit 404, a sensor 405, an audio circuit 406, a Wireless Fidelity (WiFi) module 407, a processor 408 including one or more processing cores, and a power supply 409. Those skilled in the art will appreciate that the terminal structure shown in fig. 9 does not constitute a limitation of the terminal, and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The radio frequency circuit 401 may communicate with a network device or other electronic devices through wireless communication, and complete information transceiving with the network device or other electronic devices.
The memory 402 may be used to store applications and data. The memory 402 stores applications containing executable program code. The application programs may constitute various functional modules. The processor 408 executes various functional applications and data processing by running application programs stored in the memory 402.
The input unit 403 may be used to receive input numbers, character information, or user characteristic information, such as a fingerprint, and generate a keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control. The input unit 403 may include a fingerprint recognition module. In some embodiments, the input unit 403 may also include a touch-sensitive surface. The touch-sensitive surface, also referred to as a touch screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a predetermined program.
The display unit 404 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal, which may be made up of graphics, text, icons, video, and any combination thereof.
The terminal may also include at least one sensor 405, such as a light sensor, motion sensor, and other sensors.
The audio circuitry 406 may provide an audio interface between the user and the terminal through a speaker, microphone. The audio circuit 406 may convert the received audio data into an electrical signal, transmit the electrical signal to a speaker, and convert the electrical signal to an audio signal for output by the speaker. On the other hand, the microphone converts the collected sound signal into an electric signal, and the electric signal is received by the audio circuit 406 and converted into audio data, and the audio data is output to the processor 408 for processing.
Wireless fidelity (WiFi) belongs to short-distance wireless transmission technology, and the terminal can communicate with other terminals or servers through the wireless fidelity module 407.
the processor 408 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal and processes data by running or executing an application program stored in the memory 402 and calling data stored in the memory 402, thereby monitoring the terminal as a whole.
The terminal also includes a power source 409 (such as a battery) to power the various components. In some embodiments, the power source may be logically coupled to the processor 408 through a power management system, such that the power management system may manage charging, discharging, and power consumption management functions
Although not shown in fig. 9, the terminal may further include a camera, a bluetooth module, and the like, which are not described in detail herein.
in this embodiment, the processor 408 in the terminal loads the executable program code corresponding to the process of one or more application programs into the memory 402 according to the following instructions, and the processor 408 runs the application programs stored in the memory 402, thereby implementing various functions:
sending the first voice information to a communication terminal;
Receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information;
Acquiring the decrypted voiceprint characteristics of the current user;
Matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree;
And when the matching degree is greater than or equal to the threshold value of the matching degree, playing the second voice message.
in some embodiments, when the matching degree is greater than or equal to the threshold matching degree, before playing the second voice message, the processor 408 is further configured to: acquiring communication traffic communicated with a communication terminal through voice information; and obtaining a matching degree threshold according to the traffic.
In some embodiments, when obtaining the communication traffic with the communication terminal through the voice information, the processor 408 is configured to perform the following steps: acquiring the total duration of voice information sent to a communication terminal; the total duration is determined as a communication volume communicated with the communication terminal through voice information.
in some embodiments, when obtaining the communication traffic with the communication terminal through the voice information, the processor 408 is configured to perform the following steps: acquiring the frequency of sending voice information to a communication terminal; the number of times is determined as the amount of communication with the communication terminal by voice information.
in some embodiments, when obtaining the threshold of the degree of match based on the traffic, processor 408 is configured to: determining a traffic interval in which the traffic is located; and acquiring a matching degree threshold according to the communication volume interval and a preset corresponding relation, wherein the preset corresponding relation is the corresponding relation between the communication volume interval and the matching degree threshold.
In the above embodiments, the descriptions of the embodiments have respective emphasis, and for parts that are not described in detail in some embodiments, reference may be made to the foregoing detailed description of the voice information playing method, which is not described herein again.
As can be seen from the above, the embodiment of the present invention provides a terminal, where the terminal sends a first voice message to a communication terminal; receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information; acquiring the decrypted voiceprint characteristics of the current user; matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree; and when the matching degree is greater than or equal to the threshold value of the matching degree, playing the second voice message. According to the scheme, the second voice message is played only when the current user is judged to be a legal user according to the encrypted voiceprint features in the voice message and the decrypted voiceprint features of the current user, so that the current user cannot know the real content of the voice message when the current user is not the legal user, the illegal user can be prevented from acquiring the real content of the voice message, the privacy information of the user can be effectively prevented from being leaked, and the information safety of the terminal can be improved.
It should be noted that, as one of ordinary skill in the art would understand, all or part of the steps in the methods of the above embodiments may be implemented by hardware related to instructions of a program, where the program may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The method, the device and the terminal for playing the voice information provided by the embodiment of the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A voice message playing method is characterized by comprising the following steps:
the terminal sends the first voice information to the communication terminal so that the communication terminal generates second voice information according to voiceprint feature encryption in the first voice information and sends the second voice information to the terminal;
receiving the second voice information, and prompting a user to input decrypted voice according to the second voice information;
Acquiring the decrypted voiceprint characteristics of the current user according to the decrypted voice;
Matching the decrypted voiceprint features with the encrypted voiceprint features in the second voice message to obtain a matching degree;
acquiring communication traffic communicated with a communication terminal through voice information;
obtaining a matching degree threshold according to the traffic, wherein the matching degree threshold is increased along with the increase of the traffic;
And when the matching degree is greater than or equal to a threshold value of the matching degree, playing the second voice information.
2. The voice message broadcasting method according to claim 1, wherein the step of acquiring the traffic volume communicated with the communication terminal through the voice message includes:
Acquiring the total duration of voice information sent to a communication terminal;
And determining the total duration as the communication volume communicated with the communication terminal through voice information.
3. The voice message broadcasting method according to claim 1, wherein the step of acquiring the traffic volume communicated with the communication terminal through the voice message includes:
Acquiring the frequency of sending voice information to a communication terminal;
And determining the number of times as the communication volume communicated with the communication terminal through the voice information.
4. the audio information playback method according to any one of claims 1 to 3, wherein the step of obtaining the threshold value of the degree of matching based on the traffic amount includes:
Determining a traffic interval in which the traffic is located;
And acquiring a matching degree threshold according to the communication volume interval and a preset corresponding relation, wherein the preset corresponding relation is the corresponding relation between the communication volume interval and the matching degree threshold.
5. a voice information playing apparatus, comprising:
the sending module is used for sending the first voice information to the communication terminal;
the receiving module is used for receiving second voice information encrypted by the communication terminal according to the voiceprint characteristics in the first voice information and prompting a user to input decrypted voice according to the second voice information;
the first obtaining module is used for obtaining the decrypted voiceprint characteristics of the current user according to the decrypted voice;
The matching module is used for matching the decrypted voiceprint characteristics with the encrypted voiceprint characteristics in the second voice message to obtain matching degree;
the second acquisition module is used for acquiring the communication traffic communicated with the communication terminal through the voice information;
A third obtaining module, configured to obtain a threshold of matching degree according to the traffic, where the threshold of matching degree is increased with an increase in traffic;
and the playing module is used for playing the second voice information when the matching degree is greater than or equal to a threshold value of the matching degree.
6. The apparatus for playing back audio information according to claim 5, wherein the second obtaining module is configured to:
Acquiring the total duration of voice information sent to a communication terminal;
And determining the total duration as the communication volume communicated with the communication terminal through voice information.
7. the apparatus for playing back audio information according to claim 5, wherein the second obtaining module is configured to:
Acquiring the frequency of sending voice information to a communication terminal;
and determining the number of times as the communication volume communicated with the communication terminal through the voice information.
8. The apparatus for playing back audio information according to any one of claims 5 to 7, wherein the third obtaining module is configured to:
determining a traffic interval in which the traffic is located;
And acquiring a matching degree threshold according to the communication volume interval and a preset corresponding relation, wherein the preset corresponding relation is the corresponding relation between the communication volume interval and the matching degree threshold.
9. a terminal, comprising:
The touch screen is used for receiving touch operation of a user;
A memory storing executable program code;
a processor coupled with the memory;
The processor calls the executable program code stored in the memory to execute the voice message playing method according to any one of claims 1 to 4.
10. a storage medium storing instructions adapted to be loaded by a processor to perform the steps of the method of playing back voice information according to any one of claims 1 to 4.
CN201611085036.XA 2016-11-30 2016-11-30 Voice information playing method and device and terminal Expired - Fee Related CN106782498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085036.XA CN106782498B (en) 2016-11-30 2016-11-30 Voice information playing method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085036.XA CN106782498B (en) 2016-11-30 2016-11-30 Voice information playing method and device and terminal

Publications (2)

Publication Number Publication Date
CN106782498A CN106782498A (en) 2017-05-31
CN106782498B true CN106782498B (en) 2019-12-10

Family

ID=58914815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085036.XA Expired - Fee Related CN106782498B (en) 2016-11-30 2016-11-30 Voice information playing method and device and terminal

Country Status (1)

Country Link
CN (1) CN106782498B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110380856B (en) * 2019-08-15 2023-04-18 Oppo(重庆)智能科技有限公司 Terminal device and voice information processing method and device thereof, and storage medium
CN111240634A (en) * 2020-01-08 2020-06-05 百度在线网络技术(北京)有限公司 Sound box working mode adjusting method and device
CN113225310A (en) * 2021-03-23 2021-08-06 上海闻泰电子科技有限公司 Voice encryption method, device, system, electronic equipment and storage medium
CN113178187A (en) * 2021-04-26 2021-07-27 北京有竹居网络技术有限公司 Voice processing method, device, equipment and medium, and program product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2010101325A4 (en) * 2010-11-26 2010-12-23 Davies, Gabrielle Ann Ms MobileVBM
CN102064937A (en) * 2011-01-10 2011-05-18 杭州电子科技大学 Voice encryption and decryption method for conversion parties on basis of voice print
CN105096937A (en) * 2015-05-26 2015-11-25 努比亚技术有限公司 Voice data processing method and terminal
CN105468956A (en) * 2015-12-28 2016-04-06 深圳市亚略特生物识别科技有限公司 Intelligent mobile terminal and electronic system based on biological recognition
CN205283664U (en) * 2015-12-23 2016-06-01 武汉哒呤科技有限公司 Carry out black cell -phone to real -time chat content
CN105898054A (en) * 2016-04-08 2016-08-24 惠州Tcl移动通信有限公司 Verification-based message display method and communication terminal
CN106131312A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 The player method of speech message, device and mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2010101325A4 (en) * 2010-11-26 2010-12-23 Davies, Gabrielle Ann Ms MobileVBM
CN102064937A (en) * 2011-01-10 2011-05-18 杭州电子科技大学 Voice encryption and decryption method for conversion parties on basis of voice print
CN105096937A (en) * 2015-05-26 2015-11-25 努比亚技术有限公司 Voice data processing method and terminal
CN205283664U (en) * 2015-12-23 2016-06-01 武汉哒呤科技有限公司 Carry out black cell -phone to real -time chat content
CN105468956A (en) * 2015-12-28 2016-04-06 深圳市亚略特生物识别科技有限公司 Intelligent mobile terminal and electronic system based on biological recognition
CN105898054A (en) * 2016-04-08 2016-08-24 惠州Tcl移动通信有限公司 Verification-based message display method and communication terminal
CN106131312A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 The player method of speech message, device and mobile terminal

Also Published As

Publication number Publication date
CN106782498A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN107643977B (en) Anti-addiction method and related product
CN106782498B (en) Voice information playing method and device and terminal
CN107743086B (en) Message processing method and system, and message sending and receiving device
CN109921976B (en) Group-based communication control method, device and storage medium
CN107147618A (en) A kind of user registering method, device and electronic equipment
CN104346560B (en) A kind of safe verification method and device
CN103716309A (en) Security authentication method and terminal
CN107346397B (en) Information processing method and related product
CN106297801A (en) Method of speech processing and device
CN104917612B (en) Auth method and device
CN110347862B (en) Recording processing method, device, equipment, system and audio equipment
CN108847242B (en) Electronic device control method, electronic device control device, storage medium and electronic device
CN104766005A (en) Management method and device for application software access authority
CN104378501A (en) Phone number naming method and device
CN105100363A (en) Information processing method, information processing device and terminal
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN104917724A (en) Identity verification method and apparatus
CN109218528B (en) Sound effect processing method and device and electronic equipment
CN105323243A (en) Method and device for secure voice communication based on instant messaging
CN111953668B (en) Network security information processing method and device
CN110278273B (en) Multimedia file uploading method, device, terminal, server and storage medium
CN111356117A (en) Voice interaction method and Bluetooth device
CN104010060A (en) Method and electronic device for recognizing identity of incoming caller
CN113284500B (en) Audio processing method, device, electronic equipment and storage medium
CN104933340B (en) The sending method and mobile terminal of a kind of message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191210