Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of protection.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a hardware structure of a smart phone provided in an embodiment of this specification. It should be noted that the hardware structure of the smartphone shown in fig. 1 is only an example, and does not limit the smartphone provided in the embodiment of the present specification.
As shown in fig. 1, the upper portion (or top) and the lower portion (or bottom) of the main body of the smart phone are respectively provided with a through hole penetrating through the main body, and are used for installing the electric turbofan engine in the main body in an embedded manner. In addition, the smart phone in the embodiment of the present specification may not have a through hole, and the electric turbofan may be installed outside the body.
It is necessary here to explain the principle of the electric turbofan engine. FIG. 2 is a schematic diagram of a turbofan engine provided by embodiments of the present description. The electric turbofan engine includes a forward turbofan and a reverse turbofan. The electric turbofan engine is driven by power supplied by a battery of the smart phone, and when the electric turbofan engine runs, the electric turbofan engine generally controls the forward turbofan and the reverse turbofan to rotate at different rotating speeds, and generates air pressure difference in two opposite directions so as to provide power for flying of the smart phone. The plane of the forward turbofan and the plane of the reverse turbofan may be the same plane or parallel planes. The inclination angle of the plane where the forward turbofan and the reverse turbofan are located relative to the ground plane is adjustable, and the power direction of the electric turbofan engine can be changed by adjusting the inclination angle, so that the smart phone is driven to fly in different directions.
For example, referring to fig. 3a, if the smartphone is desired to be raised perpendicular to the ground, the plane of the forward turbofan and the plane of the reverse turbofan may be parallel to the ground, and the rotation speed of the forward turbofan is controlled to be greater than that of the reverse turbofan, so that the smartphone is raised perpendicular to the ground after the air pressure difference is generated.
For another example, referring to fig. 3b, if the smartphone is intended to fly in a horizontal direction, the plane of the forward turbofan and the plane of the reverse turbofan may have a certain inclination angle with respect to the ground, and the rotation speed of the forward turbofan is controlled to be greater than that of the reverse turbofan, so that the smartphone flies forward in the horizontal direction after an air pressure difference is generated.
In one or more embodiments of the present description, a front surface of a body of the smartphone (except for the through-hole) may be covered with a screen, a back surface of the body of the smartphone may be divided into an upper back surface portion, a middle back surface portion, and a lower back surface portion, and the upper back surface portion (except for the through-hole) is covered with the screen.
In one or more embodiments of the present description, the front surface of the smart phone body may be covered with a flexible screen, so as to achieve a full screen effect of the front surface of the smart phone body. The back of the body of the smart phone can be divided into a back upper part, a back middle part, a back and a lower part, and the back upper part is covered with a screen (which may not be a flexible screen).
Furthermore, the joint of the upper part of the back and the middle part of the back can be folded inwards, and the joint of the middle part of the back and the lower part of the back can be folded inwards. Thus, the body of the smart phone can be folded twice continuously in the following ways:
folding the lower back portion inwardly to complete a single fold; continuing to fold the upper portion of the back inwardly to complete the refolding. The folding process of the smart phone can be seen in fig. 4a and 4 b.
As shown in fig. 4a and 4b, reference numbers 1 to 3 represent 3 functional states of the smart phone.
Functional state 3 is the full screen configuration when the smartphone is fully deployed, and the user views the video program using the smartphone, as shown in fig. 5.
The functional state 2 is a state after the smartphone is folded for the first time, and the user can use the smartphone to identify whether the product is genuine or not or make a call, as shown in fig. 6.
The functional state 1 is a state after the smartphone is folded for the second time, and the user can use the smartphone to pay. Since the front side and the back side of the smartphone in the functional state 1 are both screen display areas, order information can be displayed on the front side (the side facing the user), a payment two-dimensional code can be displayed on the back side, and the user can hold the smartphone, attach the back side of the smartphone to a payment device, and pay, as shown in fig. 7.
In one or more embodiments of the present description, a smartphone may include one or more rear-facing cameras. Further, the one or more rear cameras can be hidden under a screen on the back of the body.
In one or more embodiments of the present description, a smartphone may include one or more front-facing cameras. Further, the one or more front cameras may be hidden under a screen on the front of the body. In addition, the one or more front-facing cameras can be used for achieving face acquisition, so that a user can unlock the smart phone in a face recognition mode.
In one or more embodiments of the present description, the smartphone may also include one or more of an earpiece, a microphone, a speaker, and a fingerprint sensor. Further, the handset, the microphone, the speaker and the fingerprint sensor of the smart phone can be disposed under the screen on the front side of the body. In addition, the smart phone may not include an earpiece and a speaker, but may sound using a screen sound technology.
In one or more embodiments of the present description, the smartphone may be equipped with a graphene new energy battery. By using graphene with a two-dimensional structure as a superconducting material, a larger battery capacity (such as 7200 milliamperes) can be realized. The smart phone may also support fast charging (e.g., fast charging at 100 watts power). Thus, the smart phone can have a longer endurance time, while the charging time required by full charge is shorter. In addition, the smart phone can also support wireless suspension charging, namely the smart phone suspends above the wireless charger for charging.
In one or more embodiments of the present description, the smartphone may be equipped with a quantum chip, with a large number (e.g., 100) of qubits. As is well known, a quantum is the smallest indivisible unit of energy, while 1 qubit has both 0 and 1 states, and the corresponding N qubits can store 2 nth-power data simultaneously. Therefore, the effect of one operation of the quantum chip is equivalent to the effect of 2 operations of power N of the ordinary chip, in other words, the quantum chip can complete parallel processing of 2 data of power N at a time, and the parallel computing speed is much higher than that of the traditional chip.
Compared with the traditional chip, the parallel computing capability and speed of the smart phone carrying the quantum chip are greatly improved, and the smart phone can be used for processing mass data. Particularly, with the advent of the 5G era and the internet of things era, a high requirement is put on the data processing capability of the mobile phone chip. After the smart phone is carried with the quantum chip, the smart phone can be accessed to the Internet of things based on a 5G communication technology to become member equipment of the Internet of things and process a large amount of data of the Internet of things.
Fig. 8 is a schematic software structure diagram of a smartphone according to an embodiment of the present specification.
As shown in fig. 8, the smart phone has a built-in command response module and a flight control module, which are used to implement: an authorized user of the smart phone can trigger the smart phone to arrive at a destination specified by the authorized user in a flying manner in an instruction manner.
The command response module acquires a flight operation command; and if the flight operation instruction is determined to be sent by the authority user of the smart phone, determining a flight track according to the flight operation instruction, and notifying the flight control module of the determined flight track.
The flight control module controls the smart phone to fly along the flight track through the at least one electric turbofan engine.
It should be noted that the authorized user is a user authorized to operate the smart phone, and is generally an owner of the smart phone.
The flight operation instruction is an instruction for triggering the smart phone to fly to a destination designated by an authorized user in a flight manner.
In practice, the flight operation instruction acquired by the smart phone is not necessarily sent by the authorized user, and may also be sent by an unknown user. Therefore, the instruction response module needs to judge whether the received flight operation instruction is sent by an authorized user, and if the received flight operation instruction is determined to be sent by the authorized user, the flight operation instruction is executed, that is, the destination position information is determined according to the flight operation instruction. In the following, when the expression "user" is used, the description here is not intended to limit whether it is an authorized user or an unknown user.
In practical application, a user can hold the smart phone by hand and input a flight operation instruction to the smart phone, wherein the flight operation instruction comprises destination position information specified by the user. If the smart phone is not at the hand of the user, the user can also send out a voice flight operation instruction, or send out an action flight operation instruction, or send out a voice + action instruction (namely, an instruction generated by combining voice and action). Of course, even if the smart phone is at the user's hand, the user can also choose to issue voice, motion or "voice + motion" flight operation instructions.
It should be noted that, the instruction response module may store a mapping table in advance, where the mapping table records destination location information corresponding to different voice contents, destination location information corresponding to different actions, and destination location information corresponding to different "voice + action" contents.
For example, in the mapping table stored in the command response module, the destination location information corresponding to the voice content "back" is "at hand of the user", and the destination location information corresponding to the "waving action" is also "at hand of the user". Assuming that the user is at one side of the room and the smart phone is at the other side of the room, the user can call back as a voice flight operation instruction to recall the mobile phone, and can also take a hand-calling action as an action flight operation instruction to recall the mobile phone.
The instruction response module can determine a flight track according to the determined destination position information and the current position of the smart phone.
Further, the flight maneuver command may also be differentiated from a functional perspective. For example, the flight operation instruction sent by the user may be a mobile phone recall instruction for instructing the smart phone to fly back to the hand of the user, a mobile phone follow instruction for instructing the smart phone to keep a user following state, a mobile phone charging instruction for instructing the smart phone to go to a charging position, and a flight operation instruction for instructing the smart phone to execute other flight operations.
After determining that the authorized user sends the flight operation instruction, if the flight operation instruction is determined to be a mobile phone recall instruction or a mobile phone follow-up instruction, the instruction response module may determine a flight trajectory for reaching the position of the authorized user. The location of the authorized user may specifically be a small-range area, where the authorized user is located in the small-range area, and the smart phone, when flying into the small-range area, is regarded as arriving at the authorized user. The position of the authorized user may specifically be in the palm of the authorized user.
Accordingly, the flight control module may, for a cell phone recall instruction, control the smart phone to complete the flight trajectory before landing at the location of the authorized user (e.g., landing in the palm of the authorized user).
The flight control module can control the smart phone to be in a flight state continuously through the electric turbofan engine after the smart phone is controlled to complete the flight track for the mobile phone following instruction, so that a fixed distance is kept between the smart phone and the authorized user.
It should be noted that the smartphone may be equipped with a distance sensor. In the process that the smart phone follows the authority user, if the authority user is static, the flight control module detects that the flight control module still keeps a fixed distance from the authority user through a distance sensor, and at the moment, the smart phone is controlled to keep a suspended state; if the authorized user moves, the flight control module controls the smart phone to move in a flight mode so as to continuously keep a fixed distance from the authorized user.
In addition, the present specification gives the following two ways of determining the flight trajectory.
In a first mode
The first mode is suitable for the situation that the distance between the smart phone and the authorized user is not far away, in this scenario, the smart phone needs to have a camera, and the authorized user should be within the shooting range of the camera of the smart phone.
The instruction response module may determine a current Location of the smartphone using a Location Based Service (LBS); then, acquiring an image of the authorized user at the current position through the camera; determining the relative position of the authority user relative to the current position according to the current position and the image of the authority user acquired at the current position; and determining a flight track for reaching the position of the authority user according to the current position and the relative position of the authority user relative to the current position.
It should be noted that, for the smartphone, the farther the authorized user is, the smaller the size proportion occupied by the authorized user in the image obtained by shooting the authorized user is. And the relative direction of the position of the authority user relative to the position of the smart phone can be analyzed according to the body orientation of the authority user in the image obtained by shooting the authority user. Therefore, the instruction response module can analyze the relative position of the authority user relative to the current position according to the current position of the smart phone and the image of the authority user acquired at the current position, so as to obtain the position of the authority user, and finally determine the flight track.
Mode two
In the second mode, the authorized user needs to be located in the internet of things area. And a plurality of member devices of the Internet of things exist in the Internet of things area. It should be noted that the member devices of the internet of things in the area of the internet of things may include devices deployed by a manager of the internet of things, and may also include a smart phone of each user in the area of the internet of things.
The member equipment of the internet of things can monitor the surrounding environment in real time and upload monitoring data to the management equipment of the internet of things of the management party of the internet of things. The monitoring data typically includes pictures, video, and sound.
It should be noted that the various "real-time" operations presented herein refer to operations that are performed continuously or periodically. Since the object on which an operation is performed may be constantly changing or periodically changing, the operation performed on the object needs to be "real-time".
According to the monitoring data in the Internet of things area stored by the Internet of things management equipment, the position of the authority user in the Internet of things area at each moment can be searched according to the identification information of the authority user.
The smart phone may store the identification information of the authorized user in advance, and specifically may include: the face image of the authority user, the identity card number of the authority user, the mobile phone number of the authority user, the name and the gender of the authority user and the like.
Thus, the instruction response module can upload the identification information of the authorized user and the position of the smart phone to the internet of things management device, so that the internet of things management device determines the position of the authorized user according to the monitoring data in the internet of things area and the identification information of the authorized user, and determines a flight trajectory for reaching the position of the authorized user according to the position of the authorized user and the position of the smart phone; and acquiring the flight track from the management equipment of the Internet of things.
Of course, the instruction response module may not upload the position of the smart phone to the internet of things management device, but the internet of things management device directly sends the position of the authority user to the smart phone, and the flight trajectory is directly determined by the instruction corresponding module in the smart phone.
Further, in the process of flying the smart phone to the position of the authorized user, the position of the authorized user in the internet of things area may change.
Therefore, when monitoring that the position of the authority user changes, the internet of things device can acquire the current position (a certain position on the flight track) of the smart phone, then re-determine the flight track according to the changed position of the authority user at the current position of the smart phone, namely, update the flight track, and send the updated flight track to the instruction corresponding module of the smart phone. The instruction response module may notify the flight control module of the updated flight trajectory, and the flight control module may control the smart phone to fly along the updated flight trajectory.
In addition, when monitoring that the position of the authorized user changes, the internet of things device can also send the changed position of the authorized user to the instruction response module. And the instruction response module updates the flight track according to the changed position of the authority user and the current position of the smart phone, and sends the updated flight track to the flight control module.
It should be noted that the updated flight trajectory generally takes the current position of the smartphone as a starting point.
It should be noted here that, for the second mode, since the identification information of the authorized user, which the smartphone needs to upload to the internet of things management device, is often also privacy information of the authorized user, for the authorized user, the authorized user may not want to reveal his privacy information to the internet of things management device.
Therefore, in the second mode, a multi-party security computing technology can be adopted between the smart phone and the internet of things management device. Specifically, the smart phone transforms the identification information of the authorized user by using a one-time irreversible transformation algorithm agreed with the internet of things management device, and sends the transformed identification information to the internet of things management device, and the internet of things management device can determine the position of the authorized user in the internet of things area on the premise of not acquiring the identification information plaintext of the authorized user based on a fuzzy matching technology.
In addition, if the flight operation instruction is determined to be a mobile phone charging instruction, the instruction corresponding module determines a flight track for reaching the charging position. The smart phone can have a wireless suspension charging function, and the charging position can be above the wireless suspension charger.
Fig. 9 is a schematic diagram of a more specific software structure of a smartphone provided in an embodiment of the present specification.
In one or more embodiments of the present description, the smartphone may further include an alarm module. The instruction response module can obtain an alarm instruction, and if the alarm instruction is determined to be sent by the authorized user, the alarm module is triggered according to the alarm instruction. The alarm module may perform an alarm operation after being triggered by the instruction response module.
The alarm operation can be dialing an alarm call, sending a short message to a police service platform and the like.
In practice, if the smart phone of the authorized user is stolen or the authorized user is in urgent danger, the smart phone of the authorized user can be triggered to alarm by sending an alarm instruction.
In one or more embodiments of the present description, the smartphone may also include a reply module. The command response module may send the acquired flight operation command to the reply module, and then the reply module may perform voice reply according to the flight operation command.
For example, the voice flight operation instruction sent by the authorized user is "back", and the smart phone can reply "good" through the reply module.
In addition, in one or more embodiments of the present description, the smartphone may have a standby state, an awake state, a flight state. When the smart phone is in a standby state, the smart phone can enter an awakening state after being awakened. The smart phone can respond to various operation instructions only when being in an awakening state. In practice, the smart phone may not be woken up by an authorized user, but may be woken up by a non-authorized user. Therefore, after the smartphone is woken up by the unknown user, before executing an operation instruction issued by the unknown user, it is necessary to determine whether the unknown user is an authorized user.
It should be further noted that the manner of waking up the smart phone may be voice wake-up, or may be wake-up by triggering a screen or a power key of the smart phone.
Specifically, the smart phone may further include a wake-up module, a subscriber identity module, and an identification information collector set including at least one identification information collector. The at least one identification information collector can be arranged inside the body of the smart phone.
And the awakening module triggers the smart phone to enter an awakening state when an unknown user sends an awakening signal.
The user identification module acquires identification information of the unknown user through the identification information collector set when the smart phone is in an awakening state to obtain an identification information set of the unknown user; comparing the identification information set of the unknown user with the pre-stored identification information set of the authorized user, and judging whether the unknown user is the authorized user according to a comparison result; the subscriber identity module will typically inform the order response module of the determination.
The instruction response module receives a flight operation instruction sent by the unknown user when the smart phone is in an awakening state; and if the user identification module identifies that the unknown user is the authorized user, determining a flight track according to the flight operation instruction.
The identification information collector set may include a camera, a chemical sensor, and the like. The collected identification information may include: one or more of image information of the unknown user, voice information of the unknown user, posture information of the unknown user, and odor information of the unknown user.
The pre-stored identification information of the authorized user includes: one or more of image information of the authorized user, voice information of the authorized user, posture information of the authorized user and smell information of the authorized user.
Furthermore, the identity recognition module can compare the collected image information with the pre-stored image information; comparing the collected voice information with pre-stored voice information; comparing the acquired attitude information with prestored attitude information; comparing the collected odor information with prestored odor information; if the number of the comparison results which are in accordance with the comparison is larger than the designated number, the unknown user is determined to be the authority user, and if the number of the comparison results which are in accordance with the comparison is not larger than the designated number, the unknown user is determined not to be the authority user.
In addition, the smart phone further comprises a living body monitoring device. The identity identification module can carry out living body detection on the unknown user before the identification information of the unknown user is acquired; and if the unknown user is determined to be a living body, acquiring identification information of the unknown user.
The purpose of in-vivo monitoring on an unknown user is to avoid the situation that the unknown user is a dummy (such as a human body model of an authorized user) and cheats the identification information sensor set.
Fig. 10 is a schematic diagram of an authorized user recalling a smartphone according to an embodiment of the present specification. As shown in fig. 10, when the smartphone is in the wake-up state, the smartphone may suspend in the air, and when the authorized user sends a phone recall instruction, the smartphone may change the inclination angle of the electric turbofan, so that the smartphone may fly to the location where the authorized user is located.
In one or more embodiments of the present description, the smartphone also has a function of identifying an item attribute.
Specifically, the smartphone may further include an item identification module and an item feature collector set including at least one item feature collector. The at least one article feature collector may be disposed inside a body of the smartphone.
The article identification module can acquire article characteristics of the article to be identified through the article characteristic acquisition device set to obtain an article characteristic set; and inputting the article feature set into a pre-trained article recognition model to obtain a recognition result corresponding to the article to be recognized.
It should be noted that the training method of the article identification model generally includes:
the method includes the steps of collecting a plurality of articles, collecting article characteristics of each collected article to obtain an article characteristic set of the article, and distributing labels to the articles, wherein the labels of the articles record attributes of the articles. And then, training to obtain an article identification module by using the collected article feature set and label of each article as samples by adopting a supervised machine learning algorithm.
In an embodiment of this specification, the item feature collector set includes: at least one visible light camera, a projector, an infrared camera, at least one chemical sensor. The article feature set acquired by the article feature collector set comprises: at least one of a visible light plane image, an infrared plane image, a three-dimensional image and odor information of the object to be identified. The above-described item features may reflect characteristics of the item from multiple dimensions.
It should be noted that the at least one visible light camera is used for acquiring a visible light plane image of the article to be identified. When more than one visible light camera is available, the focal lengths of the visible light cameras are different. The article identification module can shoot the article to be identified through each visible light camera respectively, and then the obtained visible light plane images are subjected to image registration to obtain a comprehensive visible light plane image.
The infrared camera is used for collecting the infrared plane image of the object to be identified.
The at least one chemical sensor is used for collecting concentration information of various chemical molecules in the air around the object to be identified. It is well known that odors are actually a combination of various chemical molecules in a certain concentration. Therefore, after the object identification module acquires the concentration information of various chemical molecules in the air around the object to be identified through the at least one chemical sensor, the odor information of the object to be identified can be determined according to the concentration information.
The plurality of visible light cameras, the infrared camera and the dot matrix projector are combined together and can be used for building a three-dimensional model. The article identification module can perform three-dimensional modeling on the article to be identified through the plurality of visible light cameras, the infrared camera and the dot matrix projector to obtain a three-dimensional image of the article to be identified.
Further, the smartphone may have a built-in gyroscope for locating the position of the smartphone in three-dimensional space. Therefore, when an authorized user uses the smart phone to scan the object to be identified, the object identification module can position the position of the smart phone through the gyroscope, and then assist in characteristic collection of the object to be identified.
For example, the article identification function can be used to determine whether an egg is a native egg, identify the degree of a bottle of wine, determine whether a bottle of wine is a fake wine, determine whether food is fresh, and the like.
In practical application, a plurality of food samples can be obtained in advance, wherein the food samples comprise normal food and abnormal food; for each food sample, collecting a food characteristic set of the food sample, wherein the food characteristic set of the food sample comprises a visible light plane image, an infrared plane image, a three-dimensional image and odor information of the food sample; and (3) taking the food feature set of each food sample as a feature, taking whether each food sample is normal as a label, and training a food identification model for identifying whether food is normal.
In this way, if the to-be-identified item is the to-be-identified food, the item identification module performs food characteristic collection on the to-be-identified food through the item characteristic collector set to obtain a food characteristic set; and inputting the food characteristic set into a food recognition model trained in advance so as to judge whether the food to be recognized is normal or not.
In one or more embodiments of the present description, the smartphone further includes a call analysis module.
The call analysis module can analyze fraud risks in real time based on one or more preset fraud risk models in the call process of the authorized user using the smart phone and the incoming call object; and when the real-time analysis result represents that the fraud risk exists, carrying out risk prompt on the authority user.
The real-time analysis of the fraud risk can be continuously analyzing the fraud risk involved in the call as the call process advances. Therefore, when the authorized user communicates with a stranger, if fraud risks occur, the smart phone can remind the authorized user to avoid being cheated in time.
Further, the call analysis module may analyze, in real time, a fraud risk probability corresponding to an operation of the authorized user on the smartphone, analyze, in real time, a fraud risk probability corresponding to call content of the authorized user and the incoming call object, analyze, in real time, a risk probability corresponding to a sound feature of an environment where the incoming call object is located, and analyze, in real time, a risk probability corresponding to a voice feature of the incoming call object.
The fraud risk probability corresponding to the operation of the authority user on the smart phone is analyzed in real time, and the possibility that the authority user operates the smart phone due to fraud currently is represented.
For example, if the authorized user operates the smart phone to perform online transfer to the account bound to the phone number of the incoming call object while the call is being made by the incoming call object, and the account bound to the phone number of the incoming call object is frequently paid recently, it means that the authorized user is more likely to be cheated.
And analyzing the fraud risk probability corresponding to the conversation content of the authority user and the incoming call object in real time, and representing the possibility that the incoming call object carries out fraud on the authority user currently.
For example, the caller claiming that the health care product sold by the caller in the call treats all diseases, and the payment for the purchase needs to be overtaken, and at this time, the fraud risk model may determine that the caller is likely to cheat the authorized user.
And analyzing the risk probability corresponding to the sound characteristics of the environment where the incoming call object is located in real time, and representing the possibility that the environment where the incoming call object is located is a cheating behavior pit.
For example, the call sound of the incoming call object is noisy, and there are other sounds around the incoming call object, which means that the environment where the incoming call corresponds to is likely to be a fraud trap, i.e. a place where fraudulent molecules gather.
And the risk probability corresponding to the voice characteristics of the incoming call object is analyzed in real time, and the possibility of disguising the identity and/or the disguising emotion of the incoming call object is represented.
For example, the caller claiming that the right user continues to make money in the hospital, but the voice feature shows that the emotion of the caller is not eager, so that the possibility that the caller pretends to be an emotion fraud right user is high. For another example, the incoming call object claims that it is a certain relative of the authorized user, but the voice feature (mainly, tone) of the incoming call object does not match the voice feature of the relative of the authorized user obtained by the call analysis module, so that the possibility that the incoming call object pretends to be an identity fraudulent authorized user is high.
The call analysis module can obtain fraud risk probability corresponding to the operation of the intelligent mobile phone by the authority user and fraud risk probability corresponding to the call content of the authority user and the call object according to real-time analysis; and determining a real-time analysis result according to the risk probability corresponding to the sound characteristic of the environment where the incoming call object is located and the risk probability corresponding to the voice characteristic of the incoming call object.
Specifically, the call analysis module may analyze, in real time, a fraud risk probability corresponding to the operation of the authorized user on the smartphone and a fraud risk probability corresponding to the call content between the authorized user and the incoming call object; and carrying out weighted calculation on the risk probability corresponding to the sound characteristic of the environment where the incoming call object is located and the risk probability corresponding to the voice characteristic of the incoming call object to obtain a real-time comprehensive risk probability which is used as a real-time analysis result.
In addition, the call analysis module can push a real-time analysis result to the authority user in the call process of the authority user using the smart phone and the incoming call object. The call analysis module can timely push the call to the authorized user when generating a real-time analysis result.
Furthermore, the call analysis module can also generate a real-time notification according to the fraud risk probability corresponding to the operation of the smart phone by the authority user, which is analyzed in real time, and push the real-time notification to the authority user. Similarly, the call analysis module may generate a real-time notification according to the fraud risk probability corresponding to the call content of the authority user and the incoming call object, the risk probability corresponding to the sound feature of the environment where the incoming call object is located, or the risk probability corresponding to the voice feature of the incoming call object, which is analyzed in real time, and push the real-time notification to the authority user.
The function realized by the call module can realize accompany type risk reminding for the authority user of the smart phone, analyzes and identifies potential fraud risk in real time in the call process of the authority user and the incoming call object, and reminds the user of the fraud risk in time.
In one or more embodiments of the present description, the smartphone may further include an auto-answer module.
The automatic answering module is used for automatically answering strange calls; carrying out intelligent communication with an incoming call object; in the conversation process, conversation content is analyzed in real time based on a preset fraud risk model; and when the real-time analysis result represents that the fraud risk exists, carrying out risk prompt on the authority user.
Therefore, for strange calls which are possibly fraudulent calls, the authority user is not disturbed, the automatic answering module automatically answers the calls and carries out intelligent communication with the call object to identify whether fraud risks exist.
Furthermore, the automatic answering module can intelligently communicate with the incoming call object by aiming at guiding the incoming call object to reveal effective information. The effective information is information which can provide basis for identifying fraud risk.
For example, when an incoming call is unfamiliar, the automatic answering module (a) may have the following dialog with the incoming call object (B):
b: is you a family of xx?
A: what did i, how?
B: the child is mishaped.
A: o! What is it the case?
B: intracranial hemorrhage, requiring surgery, seven ten thousand blocks.
A: not possible to get a bar!
B: your phone is provided by the police.
A: what are you?
B: i are happy people who send your son to the hospital.
A: where you are, i come now.
B: before that, the money saving and lifesaving bar is turned first, and I is now in a charging window of xxxx hospital.
Therefore, in the intelligent call, the guide A of the guide B reveals a lot of effective information, so that the fraud risk probability can be analyzed to be higher, and the authorized user can be prompted to report the strange call.
In addition, the automatic answering module can remind the authorized user to answer the unfamiliar call after the intelligent call with the incoming call object is carried out for a specified time and the real-time analysis result representation does not have fraud risk.
That is, if the automatic answering module cannot confirm that the fraud risk exists within a certain time, the automatic answering module can basically determine that the strange incoming call is low in fraud possibility, and can be answered by an authorized user.
In one or more embodiments of the present description, the smartphone may also include a blockchain wallet module.
The block chain wallet module can receive a payment instruction sent by the authorized user; and paying according to the payment instruction, and submitting a payment record to a blockchain network for evidence storage through the blockchain account of the authorized user.
In addition, the block chain wallet module can offer a right user to pay safely and conveniently in any scene through technologies such as an encryption algorithm, identity authentication and trusted computing, and the like, so that transactions can be traced, and personal data privacy and assets can be protected.
In one or more embodiments of the present specification, for each circulation link of a commodity, circulation state information of the commodity may be acquired in the circulation link in advance, the acquired circulation state information and a commodity identifier of the commodity are written into a circulation record of the commodity, and the circulation record of the commodity generated in the circulation link is submitted to a block chain for storage.
Thus, the mobile phone can further comprise a block chain source tracing module. The block chain traceability module can acquire a commodity identification of a commodity to be traced; acquiring a circulation record containing a commodity identifier of a commodity to be traced from a block chain; and determining the circulation process of the commodity to be traced according to the acquired circulation record so as to trace the source of the commodity to be traced.
In practical application, when purchasing commodities, an authorized user can scan the bar codes of the commodities by using the smart phone of the authorized user to obtain commodity identifications, and then trace the sources of the commodities by using the smart phone of the authorized user to know the production places, the production dates and the conditions of each intermediate circulation link of the commodities.
In one or more embodiments of the present description, the smartphone may further include an application recommendation module that determines a location of the smartphone using a location based service LBS; analyzing the current application scene according to the position of the smart phone; and sending a recommendation message to the authority user according to the current application scene. The recommendation message is used for recommending the authorized user to install one or more applications on the smart phone.
That is to say, the operating system of the smartphone in the embodiment of the present specification may also have a smart application store built therein. When the intelligent application store is opened by operating the intelligent mobile phone by the authority user, the LBS technology can be utilized to recommend applications which may be needed by the authority user for the authority user according to the current position of the authority user.
For example, an authorized user of a smart phone may be at the gate of a certain restaurant, and the smart application store may determine that the authorized user may want to have a meal according to the position of the authorized user, so that the installation of a food order comment application may be recommended to the user.
In summary, the smart phone in the embodiments of the present specification has at least the following technical effects:
the method can respond to the instruction of the user, and the user can arrive at the position designated by the user in a flying mode, so that even if the smart phone of the user is lost, the user can recall the smart phone of the user through the instruction, namely, the smart phone has an anti-theft function.
The smart phone can identify the property of the article, identify the genuine and fake goods, and identify whether the food is overdue or rancid, and has the function of counterfeit goods prevention.
The smart phone can actively answer suspicious calls and identify possible fraud risks. The smart phone can also monitor the conversation between the user and other people, analyze whether a fraud risk exists in real time, remind the user of paying attention to property safety in time, and has a fraud prevention function.
The smart phone supports the user to use the blockchain wallet for safe payment, personal privacy of the user is protected, and payment records can be stored in the blockchain, so that each payment can be verified and traced. The user can also use the smart phone to trace the source of a certain commodity by the block chain, know the circulation state information of the commodity in each circulation link and identify the authenticity of the commodity.
In addition, the user can trigger the smart phone to alarm through an instruction, or trigger the smart phone to arrive at a charging position in a flying manner for charging.
Fig. 11 is a flowchart of an automatic moving method of a smartphone according to an embodiment of the present disclosure, where the method includes the following steps:
s1101: the smart phone obtains a flight operation instruction.
S1102: and if the flight operation instruction is determined to be sent by the authority user of the smart phone, determining a flight track according to the flight operation instruction.
S1103: flying along the flight path by means of at least one electric turbofan engine installed.
The flight operation instruction specifically comprises: voice commands, or, motion commands, or, voice + motion commands.
Determining a flight trajectory according to the flight operation instruction, and specifically comprising: and if the flight operation instruction is determined to be a mobile phone recall instruction or a mobile phone following instruction, determining a flight track for reaching the position of the authorized user.
Determining a flight trajectory according to the flight operation instruction, and specifically comprising: if the flight operation instruction is a mobile phone recall instruction, the smart phone is controlled to land at the position of the authority user after the flight track is completed; if the flight operation instruction is a mobile phone following instruction, after the smart mobile phone is controlled to complete the flight track, the smart mobile phone is continuously controlled to be in a flight state through the electric turbofan engine, so that a fixed distance is kept between the smart mobile phone and the authorized user.
Determining a flight trajectory, specifically comprising: determining a current location of the smartphone using a Location Based Service (LBS); acquiring an image of the authorized user at the current position through the camera; determining the relative position of the authority user relative to the current position according to the current position and the image of the authority user acquired at the current position; and determining a flight track for reaching the position of the authority user according to the current position and the relative position of the authority user relative to the current position.
The authorized user is located in the area of the Internet of things; and for each member device of the Internet of things in the Internet of things area, monitoring the surrounding environment in real time by the member device of the Internet of things, and uploading monitoring data to the management device of the Internet of things.
Determining a flight trajectory, specifically comprising: the smart phone uploads the identification information of the authorized user and the position of the smart phone to the Internet of things management equipment; the management equipment of the Internet of things determines the position of the authority user according to the monitoring data in the area of the Internet of things and the identification information of the authority user, and determines a flight track for reaching the position of the authority user according to the position of the authority user and the position of the smart phone; the smart phone acquires the flight track from the internet of things management device.
The method further comprises the following steps: and acquiring the updated flight track returned by the Internet of things equipment after updating the flight track, and flying along the updated flight track.
Determining a flight trajectory according to the flight operation instruction, and specifically comprising: and if the flight operation instruction is determined to be a mobile phone charging instruction, determining a flight track for reaching a charging position.
The method further comprises the following steps: acquiring an alarm instruction; and if the alarm instruction is determined to be sent by the authority user, executing alarm operation.
The method further comprises the following steps: when the smart phone is in a standby state, if an unknown user sends a wake-up signal, the smart phone enters a wake-up state; acquiring identification information of the unknown user through an identification information acquisition device set to obtain an identification information set of the unknown user; and comparing the identification information set of the unknown user with the pre-stored identification information set of the authorized user, and judging whether the unknown user is the authorized user according to the comparison result.
Acquiring a flight operation instruction, specifically comprising: and when the smart phone is in an awakening state, receiving a flight operation instruction sent by the unknown user.
Comparing the identification information set of the unknown user with the pre-stored identification information set of the authorized user, specifically comprising: comparing the acquired image information with pre-stored image information; comparing the collected voice information with pre-stored voice information; comparing the acquired attitude information with prestored attitude information; and comparing the collected odor information with the prestored odor information.
Judging whether the unknown user is the authorized user according to the comparison result, which specifically comprises:
if the number of the comparison results which are in accordance with the comparison is larger than the designated number, the unknown user is determined to be the authority user, and if the number of the comparison results which are in accordance with the comparison is not larger than the designated number, the unknown user is determined not to be the authority user.
The method further comprises the following steps: before the identification information of the unknown user is collected, performing living body detection on the unknown user; and if the unknown user is determined to be a living body, acquiring identification information of the unknown user.
Fig. 12 is a schematic flowchart of an article identification method provided in an embodiment of the present specification, including the following steps:
s1201: and the smart phone collects the object characteristics of the object to be identified to obtain an object characteristic set.
S1202: and inputting the article feature set into a pre-trained article recognition model to obtain a recognition result corresponding to the article to be recognized.
The item feature set includes: at least one of a visible light plane image, an infrared plane image, a three-dimensional image and odor information of the object to be identified.
Further, the object to be identified is a food to be identified.
Through the collection of the article characteristic collector, the article characteristic collection is carried out on the article to be identified to obtain an article characteristic collection, which specifically comprises the following steps: and carrying out food characteristic collection on the food to be identified through the collection of the object characteristic collectors to obtain a food characteristic collection.
Inputting the article feature set into a pre-trained article recognition model to obtain a recognition result corresponding to the article to be recognized, and specifically comprising: and inputting the food characteristic set into a food recognition model trained in advance so as to judge whether the food to be recognized is normal or not.
Fig. 13 is a schematic flowchart of a call analysis method provided in an embodiment of the present specification, including the following steps:
s1301: and the smart phone analyzes fraud risks in real time based on one or more preset fraud risk models in the process of the call between the smart phone and the incoming call object by the authorized user of the smart phone.
S1302: and when the real-time analysis result represents that the fraud risk exists, carrying out risk prompt on the authority user.
Real-time fraud risk analysis specifically includes: analyzing fraud risk probability corresponding to the operation of the authorized user on the smart phone in real time; analyzing fraud risk probability corresponding to the conversation content of the authority user and the calling object in real time; analyzing risk probability corresponding to sound characteristics of the environment where the incoming call object is located in real time; and analyzing the risk probability corresponding to the voice characteristics of the incoming call object in real time.
Determining a real-time analysis result, specifically comprising: according to the fraud risk probability corresponding to the operation of the authority user on the smart phone and the fraud risk probability corresponding to the call content of the authority user and the call object, which are obtained through real-time analysis; and determining a real-time analysis result according to the risk probability corresponding to the sound characteristic of the environment where the incoming call object is located and the risk probability corresponding to the voice characteristic of the incoming call object.
Further, the fraud risk probability corresponding to the operation of the authority user on the smart phone and the fraud risk probability corresponding to the call content of the authority user and the call object are obtained through real-time analysis; and carrying out weighted calculation on the risk probability corresponding to the sound characteristic of the environment where the incoming call object is located and the risk probability corresponding to the voice characteristic of the incoming call object to obtain a real-time comprehensive risk probability which is used as a real-time analysis result.
The method shown in fig. 13 further comprises: and pushing a real-time analysis result to the authority user in the process of the conversation between the authority user and the incoming call object by using the smart phone.
Fig. 14 is a flowchart of a method for automatically answering an incoming call according to an embodiment of the present disclosure, including the following steps:
s1401: the intelligent mobile phone automatically answers strange calls.
S1402: and carrying out intelligent communication with the incoming call object.
S1403: and in the call process, analyzing the call content in real time based on a preset fraud risk model.
S1404: and when the real-time analysis result represents that the fraud risk exists, carrying out risk prompt on the authority user.
Carry out intelligent conversation with the incoming call object, specifically include: the intelligent communication with the incoming call object is carried out with the aim of guiding the incoming call object to reveal effective information; the effective information is information which can provide basis for identifying fraud risk.
The method shown in fig. 14 further comprises: and after the intelligent call with the incoming call object is carried out for a specified time, if the real-time analysis result representation does not have fraud risk, reminding the authority user to answer the unfamiliar incoming call.
Fig. 15 shows a more specific hardware structure diagram of a smartphone provided in an embodiment of the present specification, where the apparatus may include: a processor 1510, a memory 1520, an input/output interface 1530, a communication interface 1540, and a bus 1550. Wherein the processor 1510, the memory 1520, the input/output interface 1530, and the communication interface 1540 are communicatively coupled to each other within the device via a bus 1550.
The processor 1510 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present specification.
The Memory 1520 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random access Memory), a static storage device, a dynamic storage device, or the like. The memory 1520 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1520 and called by the processor 1510 for execution.
The input/output interface 1530 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1540 is used for connecting a communication module (not shown in the figure) to implement the communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1550 includes a path that transfers information between various components of the device, such as processor 1510, memory 1520, input/output interface 1530, and communication interface 1540.
It should be noted that although the above-described apparatus only shows the processor 1510, the memory 1520, the input/output interface 1530, the communication interface 1540 and the bus 1550, in a specific implementation, the apparatus may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Embodiments of the present specification also provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the functions of each of the modules shown in fig. 8.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
From the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present disclosure can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The systems, methods, modules or units described in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the method and apparatus embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related areas. The above-described method embodiments are merely illustrative, wherein the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the embodiments of the present specification. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is only a specific embodiment of the embodiments of the present disclosure, and it should be noted that, for those skilled in the art, a plurality of modifications and decorations can be made without departing from the principle of the embodiments of the present disclosure, and these modifications and decorations should also be regarded as the protection scope of the embodiments of the present disclosure.