CN105740686A - Application control method and device - Google Patents
Application control method and device Download PDFInfo
- Publication number
- CN105740686A CN105740686A CN201610061252.4A CN201610061252A CN105740686A CN 105740686 A CN105740686 A CN 105740686A CN 201610061252 A CN201610061252 A CN 201610061252A CN 105740686 A CN105740686 A CN 105740686A
- Authority
- CN
- China
- Prior art keywords
- control instruction
- application
- intended application
- user
- voice messaging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000012545 processing Methods 0.000 claims abstract description 14
- 238000012549 training Methods 0.000 claims description 12
- 238000000605 extraction Methods 0.000 claims description 6
- 230000004044 response Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 10
- 239000000284 extract Substances 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 230000006854 communication Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000009432 framing Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000008451 emotion Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 210000003127 knee Anatomy 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000013178 mathematical model Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Acoustics & Sound (AREA)
- Human Computer Interaction (AREA)
- Audiology, Speech & Language Pathology (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses an application control method and device. One specific implementation way of the method comprises the following steps: receiving voice information input by a user; on the basis of the voice information, carrying out authentication on the identity of the user; if the user passes the identity authentication, identifying the contents of the voice information, and determining a target application and a control instruction used for controlling the target application; and according to the control instruction, carrying out corresponding processing on the target application. The implementation way can more conveniently protect the privacy of the user and improve the safety of mobile equipment.
Description
Technical field
The application relates to field of computer technology, is specifically related to field of terminal technology, particularly relates to control method and the device of application.
Background technology
Along with the development of mobile financial technology and mobile interaction technique, the safety of mobile equipment is more and more important, and thus safety and privacy to mobile equipment require more and more higher.Mobile equipment can install various application, for instance the application of instant messaging class, payment class application, finance class application etc..These application typically exhibit in the interface of mobile equipment, it is possible to enter easily.The relevant information (such as payment information, Content of communciation etc.) of user can easily be obtained, and privacy is poor, there is also certain security risk simultaneously.At present, user can promote the safety of application in mobile equipment by arranging keyboard password, click the manual operation such as programmable button, with need not keep the invisible mode applied when using, it is to avoid the leakage of information and loss.
In prior art, manually operation carries out the mode not only complex operation of security protection, and safety and privacy also have to be hoisted.Such as, it is likely to for the password that inputs and clicks the operation information of programmable button be likely to be stolen, thus forming potential safety hazard.Application especially for finance class, it is necessary to promote its security protection ability further.
Summary of the invention
This application provides the control method of application and device.
On the one hand, this application provides the control method of a kind of application, described method includes: receive the voice messaging of user's input;Based on described voice messaging, the identity of described user is authenticated;If described user passes through authentication, the content of described voice messaging is identified, to determine intended application and the control instruction that intended application is controlled;According to described control instruction, described intended application is processed accordingly.
In certain embodiments, described based on described voice messaging, the identity of described user is authenticated, including: from described voice messaging, extract the phonetic feature of user;The phonetic feature extracted is mated with the phonetic feature template prestored;If the match is successful, it is determined that described user passes through authentication.
In certain embodiments, described method also includes: the step of training phonetic feature template, including: obtain user's voice recording information based on training text;The feature of described voice recording information is analyzed, draws described phonetic feature template.
In certain embodiments, the described content to described voice messaging is identified, to determine intended application and the control instruction that intended application is controlled, including: from described voice messaging, extract the identification information of application and described control instruction;Described intended application is determined according to described identification information.
In certain embodiments, the described identification information extracting application from described voice messaging and described control instruction, including: described voice messaging is mated with the identification information template prestored and the control instruction template prestored;Described identification information is determined according to the described identification information template that the match is successful;Described control instruction is determined according to the described control instruction template that the match is successful.
In certain embodiments, described control instruction includes the instruction being controlled in present condition to described intended application, described includes hidden state and display state in present condition;Described according to described control instruction, described intended application is processed accordingly, including: the target determining described intended application based on described control instruction is present condition, and described target is present condition is hidden state or display state;Obtain the current in present condition of described intended application, described current be hidden state or display state in present condition;If described current be that present condition is inconsistent in present condition with described target, then be that present condition switches to described target to be present condition by described intended application.
Second aspect, this application provides a kind of application controls device, and described device includes: receive unit, and configuration is for receiving the voice messaging of user's input;Authentication ' unit, configuration is for being authenticated the identity of described user based on described voice messaging;Recognition unit, the content of described voice messaging, for passing through authentication in response to described user, is identified, to determine intended application and the control instruction that intended application is controlled by configuration;Processing unit, configuration is for processing accordingly described intended application according to described control instruction.
In certain embodiments, described authentication ' unit configures further for as follows the identity of described user being authenticated: extract the phonetic feature of user from described voice messaging;The phonetic feature extracted is mated with the phonetic feature template prestored;If the match is successful, it is determined that described user passes through authentication.
In certain embodiments, described device also includes: training unit, and configuration is used for training phonetic feature template, including: acquisition module, configuration is for obtaining user's voice recording information based on training text;Analysis module, configuration, for the feature of described voice recording information is analyzed, draws described phonetic feature template.
In certain embodiments, described recognition unit farther includes: extraction module, and configuration for extracting the identification information of application and described control instruction from described voice messaging;Determining module, configuration is for determining described intended application according to described identification information.
In certain embodiments, described extraction module configures the identification information for extracting application as follows from described voice messaging and described control instruction further: mated with the identification information template prestored and the control instruction template prestored by described voice messaging;Described identification information is determined according to the described identification information template that the match is successful;Described control instruction is determined according to the described control instruction template that the match is successful.
In certain embodiments, described control instruction includes the instruction being controlled in present condition to described intended application, described includes hidden state and display state in present condition;Described processing unit configures further for carrying out described intended application as follows processing accordingly: the target determining described intended application based on described control instruction is present condition, and described target is present condition is hidden state or display state;Obtain the current in present condition of described intended application, described current be hidden state or display state in present condition;If described current be that present condition is inconsistent in present condition with described target, then be that present condition switches to described target to be present condition by described intended application.
The control method of the application that the application provides and device, by receiving the voice messaging of user's input, be subsequently based on the described voice messaging identity to user and be authenticated;When user is by certification, the content of voice messaging is identified, to determine intended application and the control instruction that intended application is controlled;Finally according to control instruction, intended application is processed accordingly.Thus realizing the display state by voice mode change application, it is possible to more easily the privacy of user is protected, simultaneously because phonetic feature is not easily stolen or imitates, it is possible to promote the safety of mobile equipment further.
Accompanying drawing explanation
Non-limiting example being described in detail with reference to what the following drawings was made by reading, other features, purpose and advantage will become more apparent upon:
Fig. 1 is that the application can apply to exemplary system architecture figure therein;
Fig. 2 is the flow chart of an embodiment of the control method of the application according to the application;
Fig. 3 is the effect schematic diagram of a scene of the control method of the application according to the application;
Fig. 4 is the structural representation of the embodiment controlling device of the application of the application;
Fig. 5 is adapted for the structural representation of the computer system for the terminal unit or server realizing the embodiment of the present application.
Detailed description of the invention
Below in conjunction with drawings and Examples, the application is described in further detail.It is understood that specific embodiment described herein is used only for explaining related invention, but not the restriction to this invention.It also should be noted that, for the ease of describing, accompanying drawing illustrate only the part relevant to about invention.
It should be noted that when not conflicting, the embodiment in the application and the feature in embodiment can be mutually combined.Describe the application below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Fig. 1 illustrates the control method of the application that can apply the application or the exemplary system architecture 100 of the embodiment controlling device of application.
As it is shown in figure 1, system architecture 100 can include terminal unit 101,102, network 103 and server 104.Network 103 in order to provide the medium of communication link between terminal unit 101,102 and server 104.Network 103 can include various connection type, for instance wired, wireless communication link or fiber optic cables etc..
User 110 can use terminal unit 101,102 mutual with server 104 by network 103, to receive or to send message etc..Terminal unit 101,102 can be provided with the application of various telecommunication customer end, for instance web browser applications, shopping class application, searching class application, JICQ, mailbox client, social platform software etc..
Terminal unit 101,102 can be the various electronic equipments supporting phonetic entry and speech recognition, includes but not limited to smart mobile phone, panel computer, notebook computer, intelligent watch, E-book reader, pocket computer on knee and desk computer etc..
Server 104 can be to provide the server of various service, for instance the various telecommunication customer ends on terminal unit 101,102 are applied provides data support and background server.The request of data received can be analyzed waiting and process by background server, and result is fed back to terminal unit.
It should be noted that the control method of application that the embodiment of the present application provides generally is performed by terminal unit 101,102, correspondingly, the control device of application is generally positioned in terminal unit 101,102.
It should be understood that the number of terminal unit in Fig. 1, network and server is merely schematic.According to realizing needs, it is possible to have any number of terminal unit, network and server.
With continued reference to Fig. 2, it is shown that the flow process 200 according to the control method of the application of the application embodiment.The control method of described application, comprises the following steps:
Step 201, receives the voice messaging of user's input.
In the present embodiment, the electronic equipment (such as the terminal unit 101,102 shown in Fig. 1) that the control method of application is applied thereon can install multiple application, such as instant messaging class is applied, mobile finance class application, reading class application, video playback class application etc..Above-mentioned electronic equipment can be provided with the speech input interfaces such as mike.Above-mentioned electronic equipment can receive the voice messaging that user is inputted by speech input interface.Wherein, the voice messaging of input can include the relevant information to the control instruction that application is controlled, such as can include the relevant information of the instructions such as " movement ", " hiding ", " display ", the object being controlled can also be included, i.e. intended application, for instance the information such as title that can include intended application in voice messaging.
User can send phonetic order by the speech input interface of above-mentioned electronic equipment.At this moment, above-mentioned electronic equipment can detect whether that voice messaging inputs automatically, when the voice messaging receiving user's input when voice messaging inputs being detected.
In some optional implementations of the present embodiment, the voice messaging of input can be carried out encoding and decoding by above-mentioned electronic equipment, voice messaging is converted to the data form that above-mentioned electronic equipment can directly process, such as be converted to binary coded format, so that voice messaging further to be identified.For example, user can input the voice messaging of " hiden application A " to mobile phone, this voice messaging that mobile phone can be inputted by microphones user, it is possible to further this voice messaging is encoded.
Step 202, is authenticated the identity of user based on voice messaging.
In the present embodiment, the identity of user can be authenticated by above-mentioned electronic equipment, to determine the authority of user.Based on the voice characteristics comprised in voice messaging, the identity of user can be authenticated.For example, it is possible to the pronouncing frequency of each word or word etc. and the pronouncing frequency of the word prestored or word are to determine whether user has the authority of control application in comparison voice messaging.
In some optional implementations of this enforcement, it is possible to extract the phonetic feature of user from voice messaging, and the phonetic feature extracted is mated with the phonetic feature template prestored, if the match is successful, it may be determined that user passes through authentication.
Specifically, it is possible to voice messaging is converted to the voice signal represented with time-domain signal.Voice signal can be carried out feature analysis by above-mentioned electronic equipment, extracts the phonetic feature of user.The phonetic feature extracted can be external variable (emotion such as speaker) is insensitive, there is the feature of stability.Concrete feature extracting method can be that the sampling that voice signal carries out time domain draws speech characteristic vector, or voice signal is converted into frequency domain, carries out calculating speech characteristic vector after linear prediction, wavelet transformation etc. process to the signal of frequency domain.Using phonetic feature as user of the speech characteristic vector that extracts.
After the phonetic feature extracting user, it is possible to the phonetic feature of user is mated with the phonetic feature template being stored in advance in above-mentioned electronic equipment.The similarity between the phonetic feature of user and the phonetic feature template prestored can be calculated, for instance Hamming distance, cosine correlation coefficient etc..If similarity is more than default threshold value, then it is assumed that the match is successful, at this moment may determine that user passes through authentication, namely determine that user has the authority controlling application.Alternatively, if the similarity between the phonetic feature of user and the phonetic feature template prestored is less than default threshold value, then may determine that user does not pass through authentication.
In some optional implementations of this enforcement, can adopt Speaker Identification model that the identity of user is authenticated, such as after the phonetic feature extracting user, by speech feature vector, and input and based on the Speaker Identification model of the Mathematical Models such as HMM or Gauss model, the identity of speaker (i.e. user) is identified, judge whether user has the authority that control is applied according to recognition result afterwards.In actual scene, one or more user having and controlling application permission can be preset, if the user that recognition result is input voice information is user set in advance, then determine that user passes through authentication, if the user that recognition result is input voice information is not user set in advance, it is determined that user does not pass through authentication.
Step 203, if user is by authentication, is identified the content of voice messaging, to determine intended application and the control instruction that intended application is controlled.
In the present embodiment, if step 202 being determined, user passes through authentication, it is possible to adopt audio recognition method that the content of voice messaging is identified.First voice messaging can be carried out pretreatment, including: voice messaging is converted to the voice signal of time domain, voice signal is filtered.Voice signal can be carried out framing afterwards, voice signal is divided into multiple signal segment.Specifically, it is possible to by Moving Window function, voice signal is carried out framing.The time span of each signal segment can be identical, it is also possible to differs.The methods such as signal domain conversion and filtering can be adopted afterwards to extract the acoustic features in voice messaging, for instance MFCC (MelFrequencyCepstrumCoefficient, Mel frequency cepstral coefficient) feature, as the characteristic vector of each signal segment.Then, it is possible to employing acoustic model determines the word that the characteristic vector of each signal segment is corresponding.Afterwards word corresponding for each signal segment is combined, the Word message that voice messaging is corresponding can be drawn.
After drawing the Word message that voice messaging is corresponding, it is possible to the information that information relevant to intended application in Word message and control instruction that intended application is controlled are relevant is identified and extracts.Wherein, the information relevant to intended application can include the identification information of intended application, display positional information etc., the information that the control instruction that intended application is controlled is relevant can include preset keyword, for instance " movement ", " hiding ", " display ", " deletion " etc..
In some optional implementations of this enforcement, it is possible to the identification information extracting application from voice messaging and the control instruction that intended application is controlled.Wherein, identification information can be title, numbering etc., and control instruction can be the operational order that intended application is controlled.It is possible to further mated with the identification information template prestored and the control instruction template prestored by voice messaging, determine, according to the identification information template that the match is successful, the identification information identified;The control instruction identified is determined according to the control instruction template that the match is successful.
Specifically, above-mentioned electronic equipment can prestore identification information template and control instruction template.Its identification information template and control instruction template can be sound template, it is also possible to for word template.If the identification information template prestored and control instruction template are sound template, it is possible to voice messaging is directly mated with the identification information template prestored and control instruction template.If the identification information template prestored and control instruction template are word template, Word message corresponding for voice messaging can be mated with the identification information template of the application prestored, such as the title of Word message corresponding for voice messaging with each application is mated, using identification information as intended application of the Apply Names that matches.Intended application can be determined afterwards according to identification information.Word message corresponding for voice messaging can also be mated with the operational order prestored title, the operational order name that the match is successful is referred to as the control instruction identified.
For example, if user have input the voice messaging of " hiden application A ", then above-mentioned electronic equipment by this voice messaging or the Word message drawn after the process of step 202 and step 203 and the Apply Names template matching prestored, can draw the title " A " of intended application;This voice messaging is mated with the operational order title template prestored, show that operational order is " hiding ".
Step 204, processes described intended application accordingly according to control instruction.
In the present embodiment, above-mentioned electronic equipment can perform control instruction and operate accordingly, and intended application is processed accordingly.Such as, if control instruction is " mobile to page 1 ", intended application is application A, then the icon of application A can be moved to the first display interface.
In some optional implementations of the present embodiment, control instruction includes the instruction being controlled in present condition to intended application.Wherein, hidden state and display state are included in present condition.Intended application can be processed by above-mentioned electronic equipment according to following manner: is primarily based on control instruction and determines that the target of intended application is present condition, wherein, target is present condition is hidden state or display state, obtain the current in present condition of intended application afterwards, wherein, current is hidden state or display state in present condition;If be currently that present condition is inconsistent in present condition with target, then it is that present condition switches to target to be present condition by intended application.Specifically, the target that can comprise instruction intended application in control instruction is the information of present condition.Such as can comprise the information such as " display ", " hiding ".According to these information in control instruction, above-mentioned electronic equipment can determine that the target of intended application be present condition is show or hide.Can also detecting the current in present condition of intended application, if the icon of current goal application is visible, then the current of intended application is display state in present condition;If the icon of current goal application is invisible, then the current of intended application is hidden state in present condition.And judge that the current of intended application is whether present condition is consistent in present condition with target.If it is inconsistent, it is possible to by intended application is that present condition switches to target to be present condition.Further, if unanimously, then can not switching in present condition or changing operation intended application.
In some optional implementations of the present embodiment, the control method of above-mentioned application can also include the step of training phonetic feature template.When training phonetic feature template, it is possible to obtain user's voice recording information based on training text, and the feature of voice recording information is analyzed, draw phonetic feature template.The tone color of user, tonequality can be analyzed record, and the voice signal that voice recording information is corresponding is carried out feature extraction by above-mentioned electronic equipment, draw phonetic feature template.Concrete feature extraction can adopt the time-domain sampling method that step 202 describes or the method that voice signal is converted into the process such as the laggard line linearity prediction of frequency domain, wavelet transformation.
With further reference to Fig. 3, it illustrates the effect schematic diagram of the control method of the application according to the application a scene.As it is shown on figure 3, user have input the voice messaging of " hiding B ", wherein B is the title of some application installed on electronic equipment 30.Electronic equipment 30 is after identifying the title of intended application " B " and control instruction " hiding ", the current in present condition of application B can be obtained, if the icon of application B is currently visible, may determine that the current of application B is display state in present condition, application B can be switched to hidden state in present condition according to control instruction by above-mentioned electronic equipment, and the icon being about to application B is set to invisible mode.At this moment, other users cannot pass through to apply the icon entrance application B of B.When being applied to mobile finance class application, the application of instant messaging class and the application of social platform class, it is possible to effectively protect the privacy of user and the safety of mobile financial business.
In above-mentioned application scenarios, it is possible to the icon hiding of B will be applied by voice mode, afterwards, when user inputs the voice messaging of " display B ", it is possible to the icon of application B is shown on the interface of above-mentioned electronic equipment.
The control method of the application that the present embodiment provides, it is possible to what switched application quickly and safely by voice mode is present condition, simplifies operating process, effectively improves the convenience that the privacy to user is protected.Simultaneously because phonetic feature is not easily stolen or imitates, it is possible to promote the safety of mobile equipment further.
Refer to Fig. 4, as the realization to said method, this application provides the embodiment controlling device of a kind of application, this device embodiment is corresponding with the embodiment of the method shown in Fig. 2, and this device specifically can apply in various electronic equipment.
As shown in Figure 4, the control device 400 of the application described in the present embodiment can include receiving unit 401, authentication ' unit 402, recognition unit 403 and processing unit 403.Wherein receive unit 401 configuration for receiving the voice messaging of user's input;Authentication ' unit 402 configuration is for being authenticated the identity of user based on voice messaging;The content of voice messaging, for passing through authentication in response to user, is identified, to determine intended application and the control instruction that intended application is controlled by recognition unit 403 configuration;Processing unit 404 configuration is for processing accordingly intended application according to control instruction.
In the present embodiment, receive unit 401 and can pass through the voice messaging of speech input interface reception user's input.The voice messaging of user's input can include the relevant information to the control instruction that application is controlled, such as can include the relevant information to the control instruction in present condition of application such as " movement ", " hiding ", " display ", the object being controlled can also be included, i.e. intended application, for instance the information such as title that can include intended application in voice messaging.
The identity of user can be authenticated by authentication ' unit 402 based on receiving the voice characteristics comprised in the voice messaging that unit 401 receives.Specifically, with the pronouncing frequency etc. of the word prestored, word, authentication ' unit 402 in comparison voice messaging word, the pronouncing frequency etc. of word can determine whether user has the authority controlling application.Alternatively, authentication ' unit 402 can extract the phonetic feature of user from voice messaging, and is mated with the phonetic feature template prestored by the phonetic feature extracted, if the match is successful, it may be determined that user passes through authentication.
The voice messaging of the user by authentication ' unit 402 certification can be identified by recognition unit 403, first voice messaging can be carried out pretreatment, such as voice messaging is converted to time-domain signal, filtering etc., framing can be carried out by time-domain signal afterwards, then can extract the MFCC feature in each framing, characteristic vector as each framing, acoustic model finally can be adopted to determine the word that the characteristic vector of each signal segment is corresponding, and the word drawn is mated with the identification information template of application preset and control instruction template, it is identified result.
Intended application can be processed accordingly by processing unit 404 according to the recognition result of recognition unit 403, can according to the operation relevant information in control instruction, the operation information such as such as " movement ", " display ", " hiding " carries out the mobile operation of correspondence, display operation respectively and hides operation.Thus realizing by voice mode change application is present condition.
It will be understood by those skilled in the art that the control device 400 of above-mentioned application also includes some other known features, for instance processor, memorizer etc., embodiment of the disclosure in order to unnecessarily fuzzy, these known structures are not shown in the diagram.
The all unit recorded in device 400 are corresponding with reference to each step in Fig. 2 method described.Thus, the operation and the feature that describe above with respect to the control method of application are equally applicable to device 40 and the unit wherein comprised, the operation and the feature that describe above with respect to the control method of application are equally applicable to device 400 and the unit wherein comprised, and do not repeat them here.Corresponding units in device 400 can cooperate to realize the scheme of the embodiment of the present application with the unit in terminal unit and/or server.
Below with reference to Fig. 5, it illustrates the structural representation of the computer system 500 being suitable to terminal unit or server for realizing the embodiment of the present application.
As shown in Figure 5, computer system 500 includes CPU (CPU) 501, its can according to the program being stored in read only memory (ROM) 502 or from storage part 508 be loaded into the program random access storage device (RAM) 503 and perform various suitable action and process.In RAM503, also storage has system 500 to operate required various programs and data.CPU501, ROM502 and RAM503 are connected with each other by bus 504.Input/output (I/O) interface 505 is also connected to bus 504.
It is connected to I/O interface 505: include the importation 506 of keyboard, mouse etc. with lower component;Output part 507 including such as cathode ray tube (CRT), liquid crystal display (LCD) etc. and speaker etc.;Storage part 508 including hard disk etc.;And include the communications portion 509 of the NIC of such as LAN card, modem etc..Communications portion 509 performs communication process via the network of such as the Internet.Driver 510 is connected to I/O interface 505 also according to needs.Detachable media 511, such as disk, CD, magneto-optic disk, semiconductor memory etc., be arranged in driver 510 as required, in order to the computer program read from it is mounted into storage part 508 as required.
Especially, according to embodiment of the disclosure, the process described above with reference to flow chart may be implemented as computer software programs.Such as, embodiment of the disclosure and include a kind of computer program, it includes the computer program being tangibly embodied on machine readable media, and described computer program comprises the program code for performing the method shown in flow chart.In such embodiments, this computer program can pass through communications portion 509 and be downloaded and installed from network, and/or is mounted from detachable media 511.
Flow chart in accompanying drawing and block diagram, it is illustrated that according to the system of the various embodiment of the application, the architectural framework in the cards of method and computer program product, function and operation.In this, flow chart or each square frame in block diagram can represent a part for a module, program segment or code, and a part for described module, program segment or code comprises the executable instruction of one or more logic function for realizing regulation.It should also be noted that at some as in the realization replaced, the function marked in square frame can also to be different from the order generation marked in accompanying drawing.Such as, two square frames succeedingly represented can essentially perform substantially in parallel, and they can also perform sometimes in the opposite order, and this determines according to involved function.It will also be noted that, the combination of the square frame in each square frame in block diagram and/or flow chart and block diagram and/or flow chart, can realize by the special hardware based system of the function or operation that perform regulation, or can realize with the combination of specialized hardware Yu computer instruction.
It is described in unit involved in the embodiment of the present application to be realized by the mode of software, it is also possible to realized by the mode of hardware.Described unit can also be arranged within a processor, for instance, it is possible to it is described as: a kind of processor includes receiving unit, authentication ' unit, recognition unit and processing unit.Wherein, the title of these unit is not intended that the restriction to this unit itself under certain conditions, for instance, receive unit and be also described as " for receiving the unit of the voice messaging of user's input ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media, this nonvolatile computer storage media can be the nonvolatile computer storage media comprised in device described in above-described embodiment;Can also be individualism, be unkitted the nonvolatile computer storage media allocating in terminal.Above-mentioned nonvolatile computer storage media storage has one or more program, when one or multiple program are performed by an equipment so that described equipment: receive the voice messaging of user's input;Based on described voice messaging, the identity of described user is authenticated;If described user passes through authentication, the content of described voice messaging is identified, to determine intended application and the control instruction that intended application is controlled;According to described control instruction, described intended application is processed accordingly.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Skilled artisan would appreciate that, invention scope involved in the application, it is not limited to the technical scheme of the particular combination of above-mentioned technical characteristic, when also should be encompassed in without departing from described inventive concept simultaneously, other technical scheme being carried out combination in any by above-mentioned technical characteristic or its equivalent feature and being formed.Such as features described above and (but not limited to) disclosed herein have the technical characteristic of similar functions and replace mutually and the technical scheme that formed.
Claims (12)
1. the control method of an application, it is characterised in that described method includes:
Receive the voice messaging of user's input;
Based on described voice messaging, the identity of described user is authenticated;
If described user passes through authentication, the content of described voice messaging is identified, to determine intended application and the control instruction that intended application is controlled;
According to described control instruction, described intended application is processed accordingly.
2. method according to claim 1, it is characterised in that described based on described voice messaging, the identity of described user is authenticated, including:
The phonetic feature of user is extracted from described voice messaging;
The phonetic feature extracted is mated with the phonetic feature template prestored;
If the match is successful, it is determined that described user passes through authentication.
3. method according to claim 2, it is characterised in that described method also includes:
Train the step of described phonetic feature template, including:
Obtain user's voice recording information based on training text;
The feature of described voice recording information is analyzed, draws described phonetic feature template.
4. method according to claim 1, it is characterised in that the described content to described voice messaging is identified, to determine intended application and the control instruction that intended application is controlled, including:
The identification information of application and described control instruction is extracted from described voice messaging;
Described intended application is determined according to described identification information.
5. method according to claim 4, it is characterised in that the described identification information extracting application from described voice messaging and described control instruction, including:
Described voice messaging is mated with the identification information template prestored and the control instruction template prestored;
Described identification information is determined according to the described identification information template that the match is successful;
Described control instruction is determined according to the described control instruction template that the match is successful.
6. the method according to any one of claim 1-5, it is characterised in that described control instruction includes the instruction being controlled in present condition to described intended application, described includes hidden state and display state in present condition;
Described according to described control instruction, described intended application is processed accordingly, including:
The target determining described intended application based on described control instruction is present condition, and described target is present condition is hidden state or display state;
Obtain the current in present condition of described intended application, described current be hidden state or display state in present condition;
If described current be that present condition is inconsistent in present condition with described target, then described intended application being switched to described target is present condition.
7. the control device of an application, it is characterised in that described device includes:
Receiving unit, configuration is for receiving the voice messaging of user's input;
Authentication ' unit, configuration is for being authenticated the identity of described user based on described voice messaging;
Recognition unit, the content of described voice messaging, for passing through authentication in response to described user, is identified, to determine intended application and the control instruction that intended application is controlled by configuration;
Processing unit, configuration is for processing accordingly described intended application according to described control instruction.
8. device according to claim 7, it is characterised in that described authentication ' unit configures for as follows the identity of described user being authenticated further:
The phonetic feature of user is extracted from described voice messaging;
The phonetic feature extracted is mated with the phonetic feature template prestored;
If the match is successful, it is determined that described user passes through authentication.
9. device according to claim 8, it is characterised in that described device also includes:
Training unit, configuration is used for training described phonetic feature template, including:
Acquisition module, configuration is for obtaining user's voice recording information based on training text;
Analysis module, configuration, for the feature of described voice recording information is analyzed, draws described phonetic feature template.
10. device according to claim 7, it is characterised in that described recognition unit farther includes:
Extraction module, configuration for extracting the identification information of application and described control instruction from described voice messaging;
Determining module, configuration is for determining described intended application according to described identification information.
11. device according to claim 10, it is characterised in that described extraction module configures the identification information for extracting application as follows from described voice messaging and described control instruction further:
Described voice messaging is mated with the identification information template prestored and the control instruction template prestored;
Described identification information is determined according to the described identification information template that the match is successful;
Described control instruction is determined according to the described control instruction template that the match is successful.
12. according to the device described in any one of claim 7-11, it is characterised in that described control instruction includes the instruction being controlled in present condition to described intended application, described include hidden state and display state in present condition;
Described processing unit configures for carrying out described intended application as follows processing accordingly further:
The target determining described intended application based on described control instruction is present condition, and described target is present condition is hidden state or display state;
Obtain the current in present condition of described intended application, described current be hidden state or display state in present condition;
If described current be that present condition is inconsistent in present condition with described target, then be that present condition switches to described target to be present condition by described intended application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610061252.4A CN105740686B (en) | 2016-01-28 | 2016-01-28 | The control method and device of application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610061252.4A CN105740686B (en) | 2016-01-28 | 2016-01-28 | The control method and device of application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105740686A true CN105740686A (en) | 2016-07-06 |
CN105740686B CN105740686B (en) | 2019-04-23 |
Family
ID=56247923
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610061252.4A Active CN105740686B (en) | 2016-01-28 | 2016-01-28 | The control method and device of application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105740686B (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107230475A (en) * | 2017-05-27 | 2017-10-03 | 腾讯科技(深圳)有限公司 | A kind of voice keyword recognition method, device, terminal and server |
CN107481721A (en) * | 2017-08-16 | 2017-12-15 | 北京百度网讯科技有限公司 | Voice interactive method and wearable electronic for wearable electronic |
CN108877793A (en) * | 2018-05-30 | 2018-11-23 | Oppo广东移动通信有限公司 | Application control method, apparatus, storage medium and electronic equipment |
CN109120774A (en) * | 2018-06-29 | 2019-01-01 | 深圳市九洲电器有限公司 | Terminal applies voice control method and system |
CN109215643A (en) * | 2017-07-05 | 2019-01-15 | 阿里巴巴集团控股有限公司 | A kind of exchange method, electronic equipment and server |
CN109597657A (en) * | 2017-09-29 | 2019-04-09 | 广州市动景计算机科技有限公司 | For the operating method of target application, device and calculate equipment |
CN109741761A (en) * | 2019-03-13 | 2019-05-10 | 百度在线网络技术(北京)有限公司 | Sound processing method and device |
CN110209476A (en) * | 2019-05-09 | 2019-09-06 | 深圳如一探索科技有限公司 | Object switching method, device, electronic equipment and storage medium in a kind of application program |
CN110334497A (en) * | 2019-06-28 | 2019-10-15 | Oppo广东移动通信有限公司 | Switching method and wearable electronic equipment, the storage medium of display interface |
CN110634478A (en) * | 2018-06-25 | 2019-12-31 | 百度在线网络技术(北京)有限公司 | Method and apparatus for processing speech signal |
CN110955327A (en) * | 2018-09-27 | 2020-04-03 | 奇酷互联网络科技(深圳)有限公司 | Method for starting and closing intelligent equipment, storage device and terminal |
CN111292753A (en) * | 2020-02-28 | 2020-06-16 | 广州国音智能科技有限公司 | Offline voice recognition method, device and equipment |
CN112118348A (en) * | 2019-06-20 | 2020-12-22 | 奇酷互联网络科技(深圳)有限公司 | Control method and control system for electronic equipment, electronic equipment and storage device |
CN112216275A (en) * | 2019-07-10 | 2021-01-12 | 阿里巴巴集团控股有限公司 | Voice information processing method and device and electronic equipment |
CN112735390A (en) * | 2020-12-25 | 2021-04-30 | 江西台德智慧科技有限公司 | Intelligent voice terminal equipment with voice recognition function |
CN112859747A (en) * | 2020-12-25 | 2021-05-28 | 浙江先导精密机械有限公司 | Macro programming method |
CN112947256A (en) * | 2021-03-31 | 2021-06-11 | 中国建设银行股份有限公司 | Robot-based computer system control method, device, medium and robot |
CN113177816A (en) * | 2020-01-08 | 2021-07-27 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN113296722A (en) * | 2021-04-17 | 2021-08-24 | 中天智领(北京)科技有限公司 | Control method and device of display all-in-one machine, computer storage medium and display all-in-one machine |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1118633A (en) * | 1993-12-29 | 1996-03-13 | 美国电报电话公司 | Voice command control and verification system and method |
CN102510426A (en) * | 2011-11-29 | 2012-06-20 | 安徽科大讯飞信息科技股份有限公司 | Personal assistant application access method and system |
CN103426429A (en) * | 2013-07-15 | 2013-12-04 | 三星半导体(中国)研究开发有限公司 | Voice control method and voice control device |
CN104143326A (en) * | 2013-12-03 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Voice command recognition method and device |
CN104219388A (en) * | 2014-08-28 | 2014-12-17 | 小米科技有限责任公司 | Voice control method and device |
CN104991713A (en) * | 2015-06-15 | 2015-10-21 | 百度在线网络技术(北京)有限公司 | Method and device for switching application states |
-
2016
- 2016-01-28 CN CN201610061252.4A patent/CN105740686B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1118633A (en) * | 1993-12-29 | 1996-03-13 | 美国电报电话公司 | Voice command control and verification system and method |
CN102510426A (en) * | 2011-11-29 | 2012-06-20 | 安徽科大讯飞信息科技股份有限公司 | Personal assistant application access method and system |
CN103426429A (en) * | 2013-07-15 | 2013-12-04 | 三星半导体(中国)研究开发有限公司 | Voice control method and voice control device |
CN104143326A (en) * | 2013-12-03 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Voice command recognition method and device |
CN104219388A (en) * | 2014-08-28 | 2014-12-17 | 小米科技有限责任公司 | Voice control method and device |
CN104991713A (en) * | 2015-06-15 | 2015-10-21 | 百度在线网络技术(北京)有限公司 | Method and device for switching application states |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110349572A (en) * | 2017-05-27 | 2019-10-18 | 腾讯科技(深圳)有限公司 | A kind of voice keyword recognition method, device, terminal and server |
CN107230475B (en) * | 2017-05-27 | 2022-04-05 | 腾讯科技(深圳)有限公司 | Voice keyword recognition method and device, terminal and server |
WO2018219023A1 (en) * | 2017-05-27 | 2018-12-06 | 腾讯科技(深圳)有限公司 | Speech keyword identification method and device, terminal and server |
CN110349572B (en) * | 2017-05-27 | 2021-10-22 | 腾讯科技(深圳)有限公司 | Voice keyword recognition method and device, terminal and server |
TWI690919B (en) * | 2017-05-27 | 2020-04-11 | 大陸商騰訊科技(深圳)有限公司 | Method and device for recognizing speech keyword, terminal, server, computer readable storage medium, and computer program product |
CN107230475A (en) * | 2017-05-27 | 2017-10-03 | 腾讯科技(深圳)有限公司 | A kind of voice keyword recognition method, device, terminal and server |
CN109215643A (en) * | 2017-07-05 | 2019-01-15 | 阿里巴巴集团控股有限公司 | A kind of exchange method, electronic equipment and server |
CN109215643B (en) * | 2017-07-05 | 2023-10-24 | 阿里巴巴集团控股有限公司 | Interaction method, electronic equipment and server |
CN107481721A (en) * | 2017-08-16 | 2017-12-15 | 北京百度网讯科技有限公司 | Voice interactive method and wearable electronic for wearable electronic |
CN109597657A (en) * | 2017-09-29 | 2019-04-09 | 广州市动景计算机科技有限公司 | For the operating method of target application, device and calculate equipment |
CN109597657B (en) * | 2017-09-29 | 2022-04-29 | 阿里巴巴(中国)有限公司 | Operation method and device for target application and computing equipment |
WO2019228136A1 (en) * | 2018-05-30 | 2019-12-05 | Oppo广东移动通信有限公司 | Application control method, apparatus, storage medium and electronic device |
CN108877793B (en) * | 2018-05-30 | 2021-04-23 | Oppo广东移动通信有限公司 | Application control method and device, storage medium and electronic equipment |
CN108877793A (en) * | 2018-05-30 | 2018-11-23 | Oppo广东移动通信有限公司 | Application control method, apparatus, storage medium and electronic equipment |
CN110634478A (en) * | 2018-06-25 | 2019-12-31 | 百度在线网络技术(北京)有限公司 | Method and apparatus for processing speech signal |
CN109120774A (en) * | 2018-06-29 | 2019-01-01 | 深圳市九洲电器有限公司 | Terminal applies voice control method and system |
CN110955327A (en) * | 2018-09-27 | 2020-04-03 | 奇酷互联网络科技(深圳)有限公司 | Method for starting and closing intelligent equipment, storage device and terminal |
CN109741761A (en) * | 2019-03-13 | 2019-05-10 | 百度在线网络技术(北京)有限公司 | Sound processing method and device |
CN110209476A (en) * | 2019-05-09 | 2019-09-06 | 深圳如一探索科技有限公司 | Object switching method, device, electronic equipment and storage medium in a kind of application program |
CN112118348A (en) * | 2019-06-20 | 2020-12-22 | 奇酷互联网络科技(深圳)有限公司 | Control method and control system for electronic equipment, electronic equipment and storage device |
CN110334497B (en) * | 2019-06-28 | 2021-10-26 | Oppo广东移动通信有限公司 | Display interface switching method, wearable electronic device and storage medium |
CN110334497A (en) * | 2019-06-28 | 2019-10-15 | Oppo广东移动通信有限公司 | Switching method and wearable electronic equipment, the storage medium of display interface |
CN112216275A (en) * | 2019-07-10 | 2021-01-12 | 阿里巴巴集团控股有限公司 | Voice information processing method and device and electronic equipment |
CN113177816A (en) * | 2020-01-08 | 2021-07-27 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN111292753A (en) * | 2020-02-28 | 2020-06-16 | 广州国音智能科技有限公司 | Offline voice recognition method, device and equipment |
CN112735390A (en) * | 2020-12-25 | 2021-04-30 | 江西台德智慧科技有限公司 | Intelligent voice terminal equipment with voice recognition function |
CN112859747A (en) * | 2020-12-25 | 2021-05-28 | 浙江先导精密机械有限公司 | Macro programming method |
CN112735390B (en) * | 2020-12-25 | 2023-02-28 | 江西台德智慧科技有限公司 | Intelligent voice terminal equipment with voice recognition function |
CN112947256A (en) * | 2021-03-31 | 2021-06-11 | 中国建设银行股份有限公司 | Robot-based computer system control method, device, medium and robot |
CN113296722A (en) * | 2021-04-17 | 2021-08-24 | 中天智领(北京)科技有限公司 | Control method and device of display all-in-one machine, computer storage medium and display all-in-one machine |
Also Published As
Publication number | Publication date |
---|---|
CN105740686B (en) | 2019-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105740686A (en) | Application control method and device | |
US10645081B2 (en) | Method and apparatus for authenticating user | |
JP6429945B2 (en) | Method and apparatus for processing audio data | |
CN111488433B (en) | Artificial intelligence interactive system suitable for bank and capable of improving field experience | |
CN106373575B (en) | User voiceprint model construction method, device and system | |
CN107481720B (en) | Explicit voiceprint recognition method and device | |
WO2020119448A1 (en) | Voice information verification | |
CN103730120A (en) | Voice control method and system for electronic device | |
CN103366745B (en) | Based on method and the terminal device thereof of speech recognition protection terminal device | |
CN107430858A (en) | The metadata of transmission mark current speaker | |
CN102223367B (en) | Method, device and system for accessing website of mobile subscriber | |
CN110020009A (en) | Online answering method, apparatus and system | |
CN102073810A (en) | Method for integrating account management function in input method software | |
CN109101801B (en) | Method, apparatus, device and computer readable storage medium for identity authentication | |
CN105471877B (en) | Proof data acquisition methods and device | |
CN107731229A (en) | Method and apparatus for identifying voice | |
CN105138882A (en) | Terminal unlocking method and apparatus | |
CN107463700A (en) | For obtaining the method, apparatus and equipment of information | |
KR102262989B1 (en) | Interactive Flat Panel Display System Performing Artificial Intelligence Control Technology Using Speech Recognition in Cloud Environment | |
CN105096934A (en) | Method for constructing speech feature library as well as speech synthesis method, device and equipment | |
CN113129867B (en) | Training method of voice recognition model, voice recognition method, device and equipment | |
WO2017185648A1 (en) | Method and apparatus for protecting user information | |
CN110837546A (en) | Hidden head pair generation method, device, equipment and medium based on artificial intelligence | |
CN103839547A (en) | System for loading corresponding instruction elements by comparing voice operation signals and method thereof | |
CN111651749A (en) | Method and device for finding account based on password, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |