CN107205198B - Microphone unlocking method and device - Google Patents

Microphone unlocking method and device Download PDF

Info

Publication number
CN107205198B
CN107205198B CN201710443615.5A CN201710443615A CN107205198B CN 107205198 B CN107205198 B CN 107205198B CN 201710443615 A CN201710443615 A CN 201710443615A CN 107205198 B CN107205198 B CN 107205198B
Authority
CN
China
Prior art keywords
data
user
singing
login information
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710443615.5A
Other languages
Chinese (zh)
Other versions
CN107205198A (en
Inventor
史润宇
熊达蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710443615.5A priority Critical patent/CN107205198B/en
Publication of CN107205198A publication Critical patent/CN107205198A/en
Application granted granted Critical
Publication of CN107205198B publication Critical patent/CN107205198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R3/00Circuits for transducers, loudspeakers or microphones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/08Mouthpieces; Microphones; Attachments therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R2430/00Signal processing covered by H04R, not provided for in its groups

Abstract

The disclosure relates to a microphone unlocking method and device, relating to the technical field of multimedia equipment, wherein the method comprises the following steps: by receiving first login information; when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in; and then unlock the microphone. The unlocking method and the device for the microphone can identify the login information input by the user, so that the user can log in and unlock the microphone in the personal identity, and the personal microphone of the user can be protected.

Description

Microphone unlocking method and device
Technical Field
The present disclosure relates to the technical field of multimedia devices, and in particular, to a method and an apparatus for unlocking a microphone.
Background
The microphone is an energy conversion device for converting a sound signal into an electric signal, and the microphone in the related art only has the functions of collecting sound and adjusting volume and does not have other functions, so that the microphone can only be used as a simple audio input device in daily application.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a method and apparatus for unlocking a microphone.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for unlocking a microphone, applied to a microphone, the method including:
receiving first login information, wherein the first login information is used for verifying the identity of a user;
when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in;
unlocking the microphone.
Optionally, the first login information includes: the method includes the steps of obtaining pre-stored user data, wherein the pre-stored user data includes voice data of at least one user, and when user data matched with first login information exists in the pre-stored user data, determining that a first user corresponding to the first login information successfully logs in, including:
comparing the first voice data with all voice data in the voice data of the at least one user;
when second voice data matched with the user voiceprint and/or voice content of the first voice data exist, determining that the first voice data are verified;
and determining that the first user corresponding to the second voice data successfully logs in according to the preset binding relationship between the voice data and the user.
Optionally, the first login information includes: the method includes the steps of obtaining first singing data, wherein the pre-stored user data includes singing data of at least one user, and when user data matched with the first login information exists in the pre-stored user data, determining that the first user corresponding to the first login information successfully logs in, including:
identifying the first singing data to obtain a track of the first singing data;
judging whether singing data identical to the song of the first singing data exists in the singing data of the at least one user;
when the singing data same as the song of the first singing data exists, determining whether second singing data matched with the voiceprint of the user of the first singing data exists in the singing data same as the song of the first singing data;
when the second singing data exist, determining that the first singing data pass verification;
and determining that the first user corresponding to the second singing data successfully logs in according to the preset binding relationship between the singing data and the user.
Optionally, the first login information includes: the first biological feature, where the pre-stored user data includes a biological feature of at least one user, and when there is user data matching the first login information in the pre-stored user data, it is determined that the first user login corresponding to the first login information is successful, including:
comparing the first biometric characteristic to all of the at least one user's biometric characteristics;
determining that the first biometric is verified when there is a second biometric that matches the first biometric;
according to the preset binding relationship between the biological characteristics and the user, determining that the first user corresponding to the second biological characteristics successfully logs in;
wherein the first biological characteristic comprises: a fingerprint or an iris.
Optionally, the method further includes:
receiving an accompaniment selection instruction, wherein the accompaniment selection instruction is used for indicating accompaniment music selected by a user;
calling the prestored accompaniment music according to the selection instruction;
playing the accompaniment music;
starting to record singing voice of a user;
performing sound effect processing on the singing sound according to the sound quality of the singing sound;
mixing the accompaniment music and the singing sound subjected to sound effect processing to obtain second singing data;
and outputting audio according to the second singing data.
Optionally, the method further includes:
storing the second singing data in a memory of the microphone;
when a playing instruction of the second singing data is received, the second singing data stored in the memory is called according to the playing instruction;
and outputting audio according to the second singing data.
Optionally, the microphone is a microphone with a display screen, and the method further includes: when the pre-stored user data does not have the user data matched with the first login information, determining that the login fails;
generating prompt information of login failure;
and displaying the prompt information through the display screen, wherein the prompt information is used for prompting the user to log in again.
According to a second aspect of the embodiments of the present disclosure, there is provided an unlocking device for a microphone, applied to the microphone, the device including:
the system comprises a login information receiving module, a login information receiving module and a login information processing module, wherein the login information receiving module is configured to receive first login information which is used for verifying the identity of a user;
the login verification module is configured to determine that the login of the first user corresponding to the first login information is successful when user data matched with the first login information exists in pre-stored user data;
an unlocking module configured to unlock the microphone.
Optionally, the first login information includes: the first voice data, the pre-stored user data includes voice data of at least one user, and the login verification module includes:
a voice data comparison sub-module configured to compare the first voice data with all voice data of the at least one user;
a voice data verification sub-module configured to determine that the first voice data is verified when there is second voice data matching a user voiceprint and/or voice content of the first voice data;
and the voice login determining submodule is configured to determine that the first user corresponding to the second voice data successfully logs in according to a preset binding relationship between the voice data and the user.
Optionally, the first login information includes: the first singing data, the pre-stored user data including at least one user's singing data, the login verification module including:
the singing data acquisition sub-module is configured to identify the first singing data and acquire a track of the first singing data;
the singing data judgment sub-module is configured to judge whether the singing data of the at least one user is the same as the song of the first singing data or not;
a singing data determination sub-module configured to determine whether second singing data matching the user voice print of the first singing data exists in the singing data identical to the track of the first singing data when there is singing data identical to the track of the first singing data;
a singing data verification sub-module configured to determine that the first singing data is verified when the second singing data exists;
and the singing login determining submodule is configured to determine that the first user corresponding to the second singing data successfully logs in according to a preset binding relationship between the singing data and the user.
Optionally, the first login information includes: the first biological characteristic, the pre-stored user data includes the biological characteristic of at least one user, the login verification module includes:
a biometric comparison sub-module configured to compare the first biometric to all of the at least one user's biometric;
a biometric verification sub-module configured to determine that the first biometric is verified when there is a second biometric that matches the first biometric;
the biological characteristic login determining sub-module is configured to determine that the first user login corresponding to the second biological characteristic is successful according to a preset binding relationship between the biological characteristic and the user;
wherein the first biological characteristic comprises: a fingerprint or an iris.
Optionally, the apparatus further comprises:
an accompaniment receiving module configured to receive an accompaniment selection instruction, wherein the accompaniment selection instruction is used for indicating accompaniment music selected by a user;
the accompaniment calling module is configured to call the prestored accompaniment music according to the selection instruction;
an accompaniment playing module configured to play the accompaniment music;
a singing voice recording module configured to start recording a singing voice of a user;
the sound effect processing module is configured to perform sound effect processing on the singing sound according to the sound quality of the singing sound;
the sound mixing processing module is configured to perform sound mixing processing on the accompaniment music and the singing sound subjected to sound effect processing to obtain second singing data;
and the audio output module is configured to output audio according to the second singing data.
Optionally, the apparatus further comprises:
a singing data saving module configured to save the second singing data in a memory of the microphone;
a singing data retrieving module configured to retrieve the second singing data stored in the memory according to a playing instruction when the playing instruction of the second singing data is received;
and the singing data output module is configured to output audio according to the second singing data.
Optionally, the microphone is a microphone with a display screen, and the login verification module is further configured to: when the pre-stored user data does not have the user data matched with the first login information, determining that the login fails; the device further comprises:
the prompt message generation module is configured to generate prompt messages of login failures;
and the prompt information display module is configured to display the prompt information through the display screen, and the prompt information is used for prompting the user to log in again.
According to a third aspect of the embodiments of the present disclosure, there is provided an unlocking device for a microphone, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving first login information, wherein the first login information is used for verifying the identity of a user;
when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in;
unlocking the microphone.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of the first aspect.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
receiving first login information, wherein the first login information is used for verifying the identity of a user; when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in; and then unlocking the microphone. The invention provides a microphone protection mechanism, and the provided microphone unlocking method and device can identify login information input by a user, so that the user can log in and unlock the microphone in a personal identity, and the personal microphone of the user can be protected.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
fig. 1 is a flow chart illustrating a method of unlocking a microphone in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a method for unlocking a microphone in accordance with an exemplary embodiment;
FIG. 3 is a flow diagram illustrating a method for unlocking a microphone in accordance with an exemplary embodiment;
FIG. 4 is a flow diagram illustrating a method for unlocking a microphone in accordance with an exemplary embodiment;
FIG. 5 is a flow diagram illustrating a method for unlocking a microphone in accordance with an exemplary embodiment;
FIG. 6 is a flow diagram illustrating a method of unlocking a microphone in accordance with an exemplary embodiment;
FIG. 7 is a block diagram illustrating an unlocking device for a microphone in accordance with an exemplary embodiment;
FIG. 8 is a block diagram illustrating a login authentication module in accordance with an exemplary embodiment;
FIG. 9 is a block diagram illustrating a login authentication module in accordance with an exemplary embodiment;
FIG. 10 is a block diagram illustrating a login authentication module in accordance with an exemplary embodiment;
FIG. 11 is a block diagram illustrating an unlocking device for a microphone in accordance with an exemplary embodiment;
FIG. 12 is a block diagram illustrating an unlocking device for a microphone in accordance with an exemplary embodiment;
FIG. 13 is a block diagram illustrating an unlocking device for a microphone in accordance with an exemplary embodiment;
fig. 14 is a block diagram illustrating an unlocking apparatus of a microphone according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
At present, a common microphone is not provided with hardware such as a processor, a memory or a display screen, and although some microphones are provided with the display screen, the display screen cannot be operated and is only used for displaying electric quantity or volume, and other functions are not provided, so that the microphone lacks some intelligent functions, for example, a password or other verification information login cannot be performed, and voice data storage cannot be performed according to the identity of a user. The microphone related in each embodiment of the disclosure is a microphone with a processor, a memory and a display screen, the display screen is a touch screen with a touch function, and can be used for inputting personal login information of a user or other operations, the microphone can also perform login verification through voice data of the user or singing voice of a designated song, after the user logs in, accompanying music can be called for the song selected by the user, in addition, the entered singing can be subjected to sound mixing and sound effect optimization processing when the user sings, in addition, the songs sung by the user can be stored, when the user wants to review the songs sung by the user, recording of the singing songs can be called from the stored data, so that a more intelligent karaoke function can be realized, and user experience can be improved.
Fig. 1 is a flowchart illustrating a method for unlocking a microphone, as shown in fig. 1, according to an exemplary embodiment, the method for unlocking a microphone having a display screen, including the steps of:
in step 101, first login information is received, which is used to verify the identity of a user.
For example, the first login information for verifying the user identity may be in the form of voice data, singing data or biological features, and may also use simple login information composed of a character string of numbers, letters or a combination of the numbers and the letters. The microphone related to the present disclosure has a touch screen and/or an entity key, and can directly input login information, thereby realizing operations of a user for logging in and unlocking the microphone. The microphone can also be used for collecting voice data and singing data for verification so as to realize login and unlocking, or the microphone is also provided with a device for collecting biological characteristics so as to log in and unlock by verifying the collected biological characteristics.
In step 102, when there is user data matching the first login information in the pre-stored user data, it is determined that the first user login corresponding to the first login information is successful.
The pre-stored user data is stored in the processor of the microphone when the user initially registers, and then when the user performs a login operation, the processor compares the pre-stored user data with the first login information received in step 101 to determine whether the user can successfully log in. For example, when the user logs in, the microphone displays a prompt text "please input a login password", the user inputs the login password set by the user as first login information according to the prompt, the microphone compares the first login information with pre-stored user data, and finds that the user data same as the first login information, that is, the login password, corresponds to the first user, it can be confirmed that the login is successful with the user identity of the first user, and then step 103 is performed to unlock the microphone.
In step 103, the microphone is unlocked.
After successful login is confirmed in step 102, the microphone is unlocked with the user identity of the first user, and all data corresponding to the first user can be intelligently retrieved, played, recorded and the like according to the instruction of the user.
In summary, the unlocking method of the microphone provided by the present disclosure receives the first login information; and when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in, and then unlocking the microphone. The invention provides a microphone protection mechanism, and the provided microphone unlocking method and device can identify login information input by a user, so that the user can log in and unlock the microphone in a personal identity, and the personal microphone of the user can be protected.
Optionally, fig. 2 is a flowchart illustrating a method for unlocking a microphone according to an exemplary embodiment, where as shown in fig. 2, the first login information in fig. 1 includes: first voice data, correspondingly, the pre-stored user data includes voice data of at least one user, and when there is user data matching the first login information in the pre-stored user data in step 102 in the embodiment of fig. 1, determining that the first user login corresponding to the first login information is successful, includes the following steps:
in step 1021, the first voice data is compared with all voice data in the voice data of the at least one user.
In step 101, the microphone receives first login information, in this embodiment, the first login information may be first voice data, the first voice data may be a sound file of a specific content, for example, "please unlock the microphone" or "login my microphone", which is a standard password for voice login, when the user logs in, the user speaks "please unlock the microphone" to the microphone according to a text prompt on a display screen of the microphone, and the microphone receives the first voice data after receiving the first voice data: comparing the voiceprint and the content of the 'please unlock the microphone' with the pre-stored user data so as to confirm whether the matched voice data exists.
Alternatively, the first voice data may be voice data set by the user, for example, the user may set "i want to sing" as the personal unlock voice data of the user, the text prompt on the display screen of the microphone may be "please speak the login password" at the time of login, and after the microphone receives the first voice data spoken by the user, the first voice data is compared with the voice data stored in the memory to determine whether there is a match, and step 1022 is performed.
In step 1022, when there is second voice data matching the user's voice print and/or voice content of the first voice data, it is determined that the first voice data is authenticated.
When the result of step 1021 is that there is matching second voice data, it indicates that the user can log in with the first login information, and step 1023 can be performed. For example, the user speaks the first voice data "i want to sing" and after the voice data is received by the microphone, the voice content of the first voice data is determined to be consistent with the voice content and the voiceprint of the second voice data pre-stored in the microphone by comparing the voice contents, which indicates that the user can log in with the first voice data, and then the operation of step 1023 is continued.
In step 1023, it is determined that the first user corresponding to the second voice data successfully logs in according to the preset binding relationship between the voice data and the user.
Illustratively, the second voice data of step 1022 corresponds to the first user, so that the first voice data of "i want to sing" is verified in step 1022, it can also be determined that the login is successful with the user identity of the first user corresponding to the first voice data, and then step 103 may be performed, that is, the microphone is unlocked with the user identity of the first user.
Optionally, fig. 3 is a flowchart illustrating a method for unlocking a microphone according to an exemplary embodiment, where as shown in fig. 3, the first login information in fig. 1 includes: the first singing data, where the corresponding pre-stored user data includes singing data of at least one user, and when user data matching the first login information exists in the pre-stored user data in step 102 in fig. 1, it is determined that the first user login corresponding to the first login information is successful, including the following steps:
in step 1024, the first singing data is identified to obtain the track of the first singing data.
In step 1025, it is determined whether the singing data of the at least one user has the same singing data as the song of the first singing data.
In step 1026, when there is the same singing data as the track of the first singing data, it is determined whether there is second singing data matching the user voiceprint of the first singing data in the same singing data as the track of the first singing data.
In step 1027, when the second singing data exists, the first singing data is determined to be verified.
In step 1028, it is determined that the first user corresponding to the second singing data has successfully logged in according to the preset binding relationship between the singing data and the user.
Illustratively, the first log-in information in this embodiment is first singing data, that is, the user sings a song previously stored in the microphone to the microphone for logging in. For example, when logging in, the user sings a song according to a text prompt on a display screen of a microphone, such as "please sing a login song", the microphone receives the singing data of the user at the same time and then identifies the received singing data, that is, step 1024, to determine a song corresponding to the first singing data, then obtains the singing data of the user who sings the song before according to the song, and continues to step 1026, the singing data of the user stored before is called and compared with the first singing data at the moment, and according to the voiceprint characteristics of the singing data, whether the logged-in user is the user who sings the song before is judged, when it can be determined that the first singing data has the matched second singing data, step 1028 is performed, that is to determine successful login according to a preset binding relationship, which indicates that the user can log in with the user identity of the first user, thereby unlocking the microphone.
Optionally, fig. 4 is a flowchart illustrating a method for unlocking a microphone according to an exemplary embodiment, where as shown in fig. 4, the first login information in fig. 1 includes: the first biometric feature, correspondingly, the pre-stored user data includes a biometric feature of at least one user, and the determining that the first user login corresponding to the first login information is successful when there is user data matching the first login information in the pre-stored user data in step 102 in fig. 1 includes the following steps:
in step 10291, the first biometric is compared to all of the at least one user's biometric.
In step 10292, when there is a second biometric that matches the first biometric, the first biometric is determined to be verified.
In step 10293, it is determined that the first user login corresponding to the second biometric characteristic is successful according to the preset binding relationship between the biometric characteristic and the user.
Wherein the first biological characteristic comprises: a fingerprint or an iris.
Similar to the embodiment of fig. 2, the difference is only that the first login data adopted in the embodiment is the first biometric feature, for example, when the user places a finger on the hardware for fingerprint identification, the microphone performs the operations of steps 10291-10293 after receiving the first biometric feature, and then determines whether the user can successfully log in with the first biometric feature, which is similar to the embodiment of fig. 2 and is not repeated here.
Optionally, fig. 5 is a flowchart illustrating an unlocking method of a microphone according to an exemplary embodiment, and as shown in fig. 5, the method shown in fig. 1 further includes the following steps:
in step 104, an accompaniment selection command is received, wherein the accompaniment selection command is used for indicating accompaniment music selected by a user.
Therein, it is determined in step 103 that the microphone is unlocked with the user identity of the first user, at which time the first user may start using the microphone with the user identity, including using other intelligent functions of the microphone. The user can select a song to be sung, for example, the user selects a song 'a big river' as the song to be sung, and the key selects the corresponding accompaniment of the song through the entity key on the microphone and the display content of the touch screen; the selection can be carried out in a voice control mode, the microphone is spoken with the 'please play the accompaniment of a river of the song', and the processor of the microphone identifies the voice content, so that the accompaniment of the song to be played is determined.
In step 105, pre-stored accompaniment music is invoked according to the selection instruction.
The accompaniment music for the song "a river" is called according to the song selected in step 104, and then step 106 is performed.
In step 106, accompaniment music is played.
In step 107, recording of the user's singing voice is started.
For example, when the user starts playing the accompaniment music of the song "a river" selected by the user in step 106, it may be determined that the user is about to sing the song along with the accompaniment, and the microphone starts the recording operation of the singing voice of the user at this time.
In step 108, sound effect processing is performed on the singing sound according to the sound quality of the singing sound.
In step 109, the accompaniment music and the vocal sound processed by the sound effect are mixed to obtain the second vocal data.
Step 108 and step 109 perform sound effect and mixing processing on the singing voice of the user recorded in step 107, respectively, so as to optimize the singing voice of the user. Then, the operation of step 110 can be performed on the second singing data obtained by the sound effect and mixing processing, the second singing data can be directly output, and the operation of step 111 can also be performed.
In step 110, audio output is performed according to the second singing data.
In step 111, the second singing data is saved in the memory of the microphone.
The second singing data obtained in step 109 is saved so that the user can replay the singing data again later, that is, the operations of step 112 and step 113 are performed. The second singing data may be stored in step 111 and then used as login verification data.
In step 112, when a play instruction for the second singing data is received, the second singing data stored in the memory is called according to the play instruction. That is, when the user wants to replay a song sung by himself, a replay instruction of the song is input to the microphone, and the microphone outputs audio again according to the stored singing data.
In step 113, audio output is performed based on the second singing data.
In summary, the unlocking method of the microphone provided by the present disclosure receives the first login information; when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in; and then unlock the microphone. . The microphone unlocking method and the microphone unlocking device can identify login information input by a user, so that the user can log in and unlock the microphone in a personal identity, personal data of the user can be protected and stored while the personal microphone of the user is protected, and optimization and intelligent operation of the microphone are achieved.
Optionally, fig. 6 is a flowchart illustrating a method for unlocking a microphone according to an exemplary embodiment, where as shown in fig. 6, the method further includes, after receiving the first login information in step 101 of fig. 1:
in step 114, when there is no user data matching the first login information among the pre-stored user data, it is determined that the login has failed.
If there is no user data matching the first login information received in step 101 in the pre-stored user data, and it is indicated that the user cannot login with the first login information, the user needs to log in again, and the operations of step 115 and step 116 are performed again.
In step 115, a prompt message indicating that the login failed is generated.
In step 116, the prompt message is displayed, and the prompt message is used to prompt the user to log in again.
For example, the prompt message of login failure may be a prompt message such as "the login information does not exist, login failure, please re-login" or simply "login failure, please re-login", and then the prompt message is displayed on the display screen of the microphone to prompt the user to re-input the login information, that is, to return to step 101 to restart the login operation.
In summary, the unlocking method of the microphone provided by the present disclosure receives the first login information; when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in; and then unlock the microphone. The microphone unlocking method can identify the login information, so that a user can log in with a personal identity, and personal information of the user is protected.
Fig. 7 is a block diagram illustrating an unlocking apparatus of a microphone according to an exemplary embodiment, and as shown in fig. 7, the apparatus 700 is for a microphone having a display screen, the apparatus 700 includes:
a login information receiving module 7010 configured to receive first login information, where the first login information is used to verify the identity of the user.
The login verification module 7020 is configured to determine that the first user corresponding to the first login information successfully logs in when there is user data matching the first login information in the pre-stored user data.
An unlocking module 7030 configured to unlock the microphone.
Optionally, fig. 8 is a block diagram illustrating a login verification module according to an exemplary embodiment, where as shown in fig. 8, the first login information includes: the first voice data, where the pre-stored user data includes voice data of at least one user, the login authentication module 7020 includes:
a voice data comparing sub-module 7021 configured to compare the first voice data with all voice data of the at least one user.
The voice data verification sub-module 7022 is configured to determine that the first voice data is verified when there is second voice data matching the user voiceprint and/or the voice content of the first voice data.
And the voice login determining submodule 7023 is configured to determine that the first user login corresponding to the second voice data is successful according to the preset binding relationship between the voice data and the user.
Optionally, fig. 9 is a block diagram illustrating a login verification module according to an exemplary embodiment, where as shown in fig. 9, the first login information includes: the first singing data, the pre-stored user data includes at least one user's singing data, and the login verification module 7020 includes:
the singing data obtaining sub-module 7024 is configured to identify the first singing data, and obtain a track of the first singing data.
The singing data determination sub-module 7025 is configured to determine whether or not there is singing data identical to the track of the first singing data in the singing data of the at least one user.
The singing data determining sub-module 7026 is configured to, when there is singing data identical to the track of the first singing data, determine whether there is second singing data matching the user voiceprint of the first singing data in the singing data identical to the track of the first singing data.
A singing data verification sub-module 7027 configured to determine that the first singing data is verified when the second singing data exists.
And the singing login determining sub-module 7028 is configured to determine that the login of the first user corresponding to the second singing data is successful according to the preset binding relationship between the singing data and the user.
Optionally, fig. 10 is a block diagram illustrating a login verification module according to an exemplary embodiment, where as shown in fig. 10, the first login information includes: a first biometric characteristic, where the pre-stored user data includes at least one biometric characteristic of the user, and the login verification module 7020 includes:
the biometric comparison sub-module 70291 is configured to compare the first biometric to all of the at least one user's biometric.
A biometric verification sub-module 70292 configured to determine that the first biometric is verified when there is a second biometric that matches the first biometric.
And the biometric login determination sub-module 70293 is configured to determine that the login of the first user corresponding to the second biometric characteristic is successful according to the preset binding relationship between the biometric characteristic and the user.
Wherein the first biological characteristic comprises: a fingerprint or an iris.
Alternatively, fig. 11 is a block diagram illustrating an unlocking apparatus for a microphone according to an exemplary embodiment, where as shown in fig. 11, the apparatus 700 further includes:
the accompaniment receiving module 7040 is configured to receive an accompaniment selection instruction for indicating accompaniment music selected by the user.
An accompaniment calling module 7050 configured to call prestored accompaniment music according to the selection instruction.
An accompaniment playing module 7060 configured to play accompaniment music.
A singing voice recording module 7070 configured to start recording the user's singing voice.
The sound effect processing module 7080 is configured to perform sound effect processing on the singing sound according to the sound quality of the singing sound.
And the sound mixing processing module 7090 is configured to perform sound mixing processing on the accompaniment music and the singing sound subjected to sound effect processing to obtain second singing data.
And an audio output module 7100 configured to perform audio output according to the second singing data.
Alternatively, fig. 12 is a block diagram illustrating an unlocking apparatus for a microphone according to an exemplary embodiment, where as shown in fig. 12, the apparatus 700 further includes:
a singing data saving module 7110 configured to save the second singing data in the memory of the microphone.
A singing data retrieving module 7120 configured to, when receiving a play instruction for the second singing data, retrieve the second singing data stored in the memory according to the play instruction.
And a singing data output module 7130 configured to perform audio output according to the second singing data.
Optionally, fig. 13 is a block diagram illustrating an unlocking apparatus of a microphone according to an exemplary embodiment, and as shown in fig. 13, the login verification module 7020 is further configured to: when the pre-stored user data does not have the user data matched with the first login information, determining that the login fails; the apparatus 700 further comprises:
and a prompt information generation module 7140 configured to generate prompt information of login failure.
And a prompt information display module 7150 configured to display prompt information for prompting the user to log in again.
In summary, the unlocking device for a microphone provided by the present disclosure receives the first login information; when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in; and then unlock the microphone. The invention provides a microphone protection mechanism, and the provided microphone unlocking method and device can identify login information input by a user, so that the user can log in and unlock the microphone in a personal identity, and the personal microphone of the user can be protected.
Fig. 14 is a block diagram illustrating an unlocking apparatus 1400 for a microphone according to an exemplary embodiment. For example, the apparatus 1400 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 14, apparatus 1400 may include one or more of the following components: a processing component 1402, a memory 1404, a power component 1406, a multimedia component 1408, an audio component 1410, an input/output (I/O) interface 1412, a sensor component 1414, and a communication component 1416.
The processing component 1402 generally controls the overall operation of the device 1400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1402 may include one or more processors 1420 to execute instructions to perform all or a portion of the steps of the above-described method of unlocking a microphone. Further, processing component 1402 can include one or more modules that facilitate interaction between processing component 1402 and other components. For example, the processing component 1402 can include a multimedia module to facilitate interaction between the multimedia component 1408 and the processing component 1402.
The memory 1404 is configured to store various types of data to support operations at the apparatus 1400. Examples of such data include instructions for any application or method operating on device 1400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1404 may be implemented by any type of volatile or non-volatile storage device or combination of devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 1406 provide power to the various components of device 1400. Power components 1406 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1400.
The multimedia component 1408 includes a screen that provides an output interface between the device 1400 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1408 includes a front-facing camera and/or a rear-facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 1400 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1410 is configured to output and/or input audio signals. For example, the audio component 1410 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 1400 is in operating modes, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1404 or transmitted via the communication component 1416. In some embodiments, audio component 1410 further includes a speaker for outputting audio signals.
I/O interface 1412 provides an interface between processing component 1402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 1414 includes one or more sensors for providing various aspects of state assessment for the apparatus 1400. For example, the sensor component 1414 may detect an open/closed state of the apparatus 1400, a relative positioning of components, such as a display and keypad of the apparatus 1400, a change in position of the apparatus 1400 or a component of the apparatus 1400, the presence or absence of user contact with the apparatus 1400, an orientation or acceleration/deceleration of the apparatus 1400, and a change in temperature of the apparatus 1400. The sensor assembly 1414 may include a proximity sensor configured to detect the presence of a nearby object in the absence of any physical contact. The sensor assembly 1414 may also include a photosensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1416 is configured to facilitate wired or wireless communication between the apparatus 1400 and other devices. The device 1400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 1400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described microphone unlocking method.
In an exemplary embodiment, a non-transitory computer readable storage medium, such as the memory 1404, including instructions executable by the processor 1420 of the apparatus 1400 to perform the above-described method of unlocking a microphone is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, various possible combinations will not be separately described in this disclosure.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (14)

1. An unlocking method of a microphone, which is applied to the microphone, and comprises the following steps:
receiving first login information, wherein the first login information is used for verifying the identity of a user;
when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in;
the first login information includes: the method includes the steps of obtaining first singing data, wherein the pre-stored user data includes singing data of at least one user, and when user data matched with the first login information exists in the pre-stored user data, determining that the first user corresponding to the first login information successfully logs in, including:
identifying the first singing data to obtain a track of the first singing data; judging whether singing data identical to the song of the first singing data exists in the singing data of the at least one user; when the singing data same as the song of the first singing data exists, determining whether second singing data matched with the voiceprint of the user of the first singing data exists in the singing data same as the song of the first singing data; when the second singing data exist, determining that the first singing data pass verification; according to the preset binding relationship between the singing data and the user, determining that the first user corresponding to the second singing data successfully logs in;
unlocking the microphone.
2. The method of claim 1, wherein the first login information comprises: the method includes the steps of obtaining pre-stored user data, wherein the pre-stored user data includes voice data of at least one user, and when user data matched with first login information exists in the pre-stored user data, determining that a first user corresponding to the first login information successfully logs in, including:
comparing the first voice data with all voice data in the voice data of the at least one user;
when second voice data matched with the user voiceprint and/or voice content of the first voice data exist, determining that the first voice data are verified;
and determining that the first user corresponding to the second voice data successfully logs in according to the preset binding relationship between the voice data and the user.
3. The method of claim 1, wherein the first login information comprises: the first biological feature, where the pre-stored user data includes a biological feature of at least one user, and when there is user data matching the first login information in the pre-stored user data, it is determined that the first user login corresponding to the first login information is successful, including:
comparing the first biometric characteristic to all of the at least one user's biometric characteristics;
determining that the first biometric is verified when there is a second biometric that matches the first biometric;
according to the preset binding relationship between the biological characteristics and the user, determining that the first user corresponding to the second biological characteristics successfully logs in;
wherein the first biological characteristic comprises: a fingerprint or an iris.
4. The method of claim 1, further comprising:
receiving an accompaniment selection instruction, wherein the accompaniment selection instruction is used for indicating accompaniment music selected by a user;
calling the prestored accompaniment music according to the selection instruction;
playing the accompaniment music;
starting to record singing voice of a user;
performing sound effect processing on the singing sound according to the sound quality of the singing sound;
mixing the accompaniment music and the singing sound subjected to sound effect processing to obtain second singing data;
and outputting audio according to the second singing data.
5. The method of claim 4, further comprising:
storing the second singing data in a memory of the microphone;
when a playing instruction of the second singing data is received, the second singing data stored in the memory is called according to the playing instruction;
and outputting audio according to the second singing data.
6. The method of claim 1, wherein the microphone is a microphone having a display screen, the method further comprising:
when the pre-stored user data does not have the user data matched with the first login information, determining that the login fails;
generating prompt information of login failure;
and displaying the prompt information through the display screen, wherein the prompt information is used for prompting the user to log in again.
7. An unlocking device for a microphone, applied to the microphone, the device comprising:
the system comprises a login information receiving module, a login information receiving module and a login information processing module, wherein the login information receiving module is configured to receive first login information which is used for verifying the identity of a user;
the login verification module is configured to determine that the login of the first user corresponding to the first login information is successful when user data matched with the first login information exists in pre-stored user data;
the first login information includes: the first singing data, the pre-stored user data including at least one user's singing data, the login verification module including:
the singing data acquisition sub-module is configured to identify the first singing data and acquire a track of the first singing data; the singing data judgment sub-module is configured to judge whether the singing data of the at least one user is the same as the song of the first singing data or not; a singing data determination sub-module configured to determine whether second singing data matching the user voice print of the first singing data exists in the singing data identical to the track of the first singing data when there is singing data identical to the track of the first singing data; a singing data verification sub-module configured to determine that the first singing data is verified when the second singing data exists; the singing login determining submodule is configured to determine that the first user corresponding to the second singing data successfully logs in according to a preset binding relationship between the singing data and the user;
an unlocking module configured to unlock the microphone.
8. The apparatus of claim 7, wherein the first login information comprises: the first voice data, the pre-stored user data includes voice data of at least one user, and the login verification module includes:
a voice data comparison sub-module configured to compare the first voice data with all voice data of the at least one user;
a voice data verification sub-module configured to determine that the first voice data is verified when there is second voice data matching a user voiceprint and/or voice content of the first voice data;
and the voice login determining submodule is configured to determine that the first user corresponding to the second voice data successfully logs in according to a preset binding relationship between the voice data and the user.
9. The apparatus of claim 7, wherein the first login information comprises: the first biological characteristic, the pre-stored user data includes the biological characteristic of at least one user, the login verification module includes:
a biometric comparison sub-module configured to compare the first biometric to all of the at least one user's biometric;
a biometric verification sub-module configured to determine that the first biometric is verified when there is a second biometric that matches the first biometric;
the biological characteristic login determining sub-module is configured to determine that the first user login corresponding to the second biological characteristic is successful according to a preset binding relationship between the biological characteristic and the user;
wherein the first biological characteristic comprises: a fingerprint or an iris.
10. The apparatus of claim 7, further comprising:
an accompaniment receiving module configured to receive an accompaniment selection instruction, wherein the accompaniment selection instruction is used for indicating accompaniment music selected by a user;
the accompaniment calling module is configured to call the prestored accompaniment music according to the selection instruction;
an accompaniment playing module configured to play the accompaniment music;
a singing voice recording module configured to start recording a singing voice of a user;
the sound effect processing module is configured to perform sound effect processing on the singing sound according to the sound quality of the singing sound;
the sound mixing processing module is configured to perform sound mixing processing on the accompaniment music and the singing sound subjected to sound effect processing to obtain second singing data;
and the audio output module is configured to output audio according to the second singing data.
11. The apparatus of claim 10, further comprising:
a singing data saving module configured to save the second singing data in a memory of the microphone;
a singing data retrieving module configured to retrieve the second singing data stored in the memory according to a playing instruction when the playing instruction of the second singing data is received;
and the singing data output module is configured to output audio according to the second singing data.
12. The apparatus of claim 7, wherein the microphone is a microphone having a display screen, and wherein the login authentication module is further configured to: when the pre-stored user data does not have the user data matched with the first login information, determining that the login fails; the device further comprises:
the prompt message generation module is configured to generate prompt messages of login failures;
and the prompt information display module is configured to display the prompt information through the display screen, and the prompt information is used for prompting the user to log in again.
13. An unlocking device for a microphone, applied to the microphone, comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving first login information, wherein the first login information is used for verifying the identity of a user;
when the pre-stored user data has user data matched with the first login information, determining that the first user corresponding to the first login information successfully logs in;
the first login information includes: the method includes the steps of obtaining first singing data, wherein the pre-stored user data includes singing data of at least one user, and when user data matched with the first login information exists in the pre-stored user data, determining that the first user corresponding to the first login information successfully logs in, including:
identifying the first singing data to obtain a track of the first singing data; judging whether singing data identical to the song of the first singing data exists in the singing data of the at least one user; when the singing data same as the song of the first singing data exists, determining whether second singing data matched with the voiceprint of the user of the first singing data exists in the singing data same as the song of the first singing data; when the second singing data exist, determining that the first singing data pass verification; according to the preset binding relationship between the singing data and the user, determining that the first user corresponding to the second singing data successfully logs in;
unlocking the microphone.
14. A computer-readable storage medium having computer program instructions stored thereon, which, when executed by a processor, implement the steps of the method of any one of claims 1-6.
CN201710443615.5A 2017-06-13 2017-06-13 Microphone unlocking method and device Active CN107205198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710443615.5A CN107205198B (en) 2017-06-13 2017-06-13 Microphone unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710443615.5A CN107205198B (en) 2017-06-13 2017-06-13 Microphone unlocking method and device

Publications (2)

Publication Number Publication Date
CN107205198A CN107205198A (en) 2017-09-26
CN107205198B true CN107205198B (en) 2020-01-10

Family

ID=59907640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710443615.5A Active CN107205198B (en) 2017-06-13 2017-06-13 Microphone unlocking method and device

Country Status (1)

Country Link
CN (1) CN107205198B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107765891B (en) * 2017-10-19 2021-12-21 广东小天才科技有限公司 Microphone control method and microphone
CN109104667A (en) * 2018-06-25 2018-12-28 福来宝电子(深圳)有限公司 A kind of control method of intelligent sound, system and intelligent sound
CN108882112B (en) * 2018-06-26 2021-04-06 Oppo广东移动通信有限公司 Audio playing control method and device, storage medium and terminal equipment
CN111191754B (en) * 2019-12-30 2023-10-27 秒针信息技术有限公司 Voice acquisition method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105321543A (en) * 2015-10-23 2016-02-10 太仓市新志杰电子科技有限公司 Player with identity recognition function
CN106454570A (en) * 2016-11-24 2017-02-22 深圳市好兄弟电子有限公司 Microphone system
CN106599660A (en) * 2016-12-02 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Terminal safety verification method and terminal safety verification device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016206428A (en) * 2015-04-23 2016-12-08 京セラ株式会社 Electronic device and voiceprint authentication method
CN105141619A (en) * 2015-09-15 2015-12-09 北京云知声信息技术有限公司 Account login method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105321543A (en) * 2015-10-23 2016-02-10 太仓市新志杰电子科技有限公司 Player with identity recognition function
CN106454570A (en) * 2016-11-24 2017-02-22 深圳市好兄弟电子有限公司 Microphone system
CN106599660A (en) * 2016-12-02 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Terminal safety verification method and terminal safety verification device

Also Published As

Publication number Publication date
CN107205198A (en) 2017-09-26

Similar Documents

Publication Publication Date Title
US20160381540A1 (en) Method and device for alarm triggering
CN105654302B (en) Payment method and device
CN107205198B (en) Microphone unlocking method and device
CN107911386B (en) Method and device for acquiring service authorization information
CN107767864B (en) Method and device for sharing information based on voice and mobile terminal
US20170034336A1 (en) Event prompting method and device
JP2014056576A (en) Gesture- and expression-based authentication
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
US20140358566A1 (en) Methods and devices for audio processing
RU2636686C2 (en) Method and device for sending information in voice service
CN103986840B (en) Control method and the device of dialog information
CN105930707A (en) Method and device for switching systems
TWI761843B (en) Access control method and device, electronic device and storage medium
CN104363205A (en) Application login method and device
CN107819740B (en) Terminal device verification method, terminal device, sound box, server and medium
CN108710791A (en) The method and device of voice control
CN107145771B (en) Application program unlocking method and device and terminal
US10764418B2 (en) Method, device and medium for application switching
US9667784B2 (en) Methods and devices for providing information in voice service
CN108766427B (en) Voice control method and device
CN107911380B (en) Identity verification method and device
CN113113044B (en) Audio processing method and device, terminal and storage medium
CN110290526B (en) Data access method, device and medium
CN109325337A (en) Unlocking method and device
CN105430639A (en) Information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant