CN108023856B - Information sharing method and device - Google Patents

Information sharing method and device Download PDF

Info

Publication number
CN108023856B
CN108023856B CN201610943041.3A CN201610943041A CN108023856B CN 108023856 B CN108023856 B CN 108023856B CN 201610943041 A CN201610943041 A CN 201610943041A CN 108023856 B CN108023856 B CN 108023856B
Authority
CN
China
Prior art keywords
identification code
information
verification
terminal
target identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610943041.3A
Other languages
Chinese (zh)
Other versions
CN108023856A (en
Inventor
张婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201610943041.3A priority Critical patent/CN108023856B/en
Publication of CN108023856A publication Critical patent/CN108023856A/en
Application granted granted Critical
Publication of CN108023856B publication Critical patent/CN108023856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Acoustics & Sound (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an information sharing method and device, wherein the method comprises the steps that a server receives and stores shared information and voice recognition information uploaded by a first terminal; the server generates a corresponding target identification code corresponding to the shared information based on the voice identification information, returns the target identification code to the first terminal, and triggers the first terminal to send the multimedia data generated based on the target identification code to the second terminal; the server receives a verification identification code returned by the second terminal based on the obtained multimedia data; and when the server determines that the verification identification code is successfully associated with the target identification code, the server sends the shared information to the second terminal. Therefore, the user can realize the screening and downloading of the shared information through voice, the safety of information authentication is improved, the information interactivity is improved, and convenience is provided for the user.

Description

Information sharing method and device
Technical Field
The present invention relates to the field of intelligent technologies, and in particular, to a method and an apparatus for information sharing.
Background
With the development of internet technology, information authentication is carried out to improve the security of information transmission. The intelligent terminal can acquire data corresponding to the authentication information in the server through the authentication information, and information interaction between the intelligent terminal and the server is achieved.
Referring to fig. 1, in the prior art, an intelligent terminal interacts with a server through authentication information, mainly using the following method:
the first terminal uploads target data to the server, converts a target identification code generated after the server receives the target data into audio data, and then sends the multimedia data with the audio data to the second terminal. The second terminal converts the multimedia data into a target identification code and uploads the target identification code to the server. Further, the server matches the received target identification codes with the stored target identification codes, so as to determine target data corresponding to the target identification codes. Thus, the second terminal can download and display the target data.
The target identification code is a group of ID codes which are generated by the server according to a certain rule and are embedded into the target data. Optionally, the target identification code embedded in the multimedia data may be a two-dimensional code, a voiceprint, or an audio watermark.
The two-dimensional code is an image of black and white patterns distributed on a plane according to a certain rule by using a certain specific geometric figure. However, when the two-dimensional code is used as the target identification code, the two-dimensional code can only be carried on an image, and the two-dimensional code needs to be identified by scanning, so that the identification success rate is low.
By voiceprint is meant a digital signature that can represent a piece of sound with fixed audio important acoustic characteristics. For example, shake a little to ping the sound. However, when the voiceprint is used as the target identification code, the requirement on the surrounding sound environment is high, the original media accompanying sound is required, the identification time is long, the identification success rate is low, and the technology of interacting with the background is complex.
By audio watermark is meant information that is embedded in the original audio with special significance and that is easy to extract without affecting the quality of the original audio. However, the audio watermark is adopted as the target identification code, so that the requirement on the surrounding sound environment is high, the original media sound is required to be processed, the system integration complexity is low, and only the watermark ID with a fixed bit number is supported.
In summary, in the prior art, when the two-dimensional code is used as the target identification code, the two-dimensional code can only be borne on an image, and needs to be identified by scanning, so that the identification rate is low; when the voiceprint is used as the target identification code, the requirement on the surrounding sound environment is high, original media accompanying sound is also needed, the identification time is long, the identification success rate is low, and the technology of interacting with the background is complex; the audio watermark is adopted as the target identification code, the requirement on the surrounding sound environment is higher, the original media sound is required to be processed, the system integration complexity is low, and only the watermark ID with a fixed bit number is supported; furthermore, the second terminal can only passively download the content corresponding to the target identification code through the target identification code, and can only complete one-time interaction, and the interactivity of the interaction with the first terminal is poor.
Disclosure of Invention
The embodiment of the invention provides an information sharing method and device, which are used for enabling a user to realize screening and downloading of shared information through voice, improving the safety of information authentication and the interactivity of information and providing convenience for the user.
The embodiment of the invention provides the following specific technical scheme:
a method of information sharing, comprising:
the server receives and stores the sharing information and the voice recognition information uploaded by the first terminal;
the server generates a corresponding target identification code corresponding to the shared information based on the voice identification information, returns the target identification code to the first terminal, and triggers the first terminal to send the multimedia data generated based on the target identification code to the second terminal;
the server receives a verification identification code returned by the second terminal based on the obtained multimedia data;
and when the server determines that the verification identification code is successfully associated with the target identification code, the server sends the shared information to the second terminal.
Preferably, the server receives and stores the sharing information and the voice recognition information uploaded by the first terminal, and specifically includes:
the server receives and stores the sharing information and the voice password uploaded by the first terminal, and the voice password is used as voice recognition information; alternatively, the first and second electrodes may be,
the server receives and stores the shared information uploaded by the first terminal, and the text information or/and the voiceprint obtained by the first terminal after the voice password is analyzed, and the text information or/and the voiceprint are used as voice recognition information.
Preferably, the server generates the corresponding target identification code corresponding to the shared information based on the voice recognition information, and specifically includes:
if the voice password is used as voice identification information, the server analyzes the voice password to obtain corresponding text information or/and voiceprint, and corresponding target identification codes are generated corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
and if the text information or/and the voiceprint are/is taken as the voice recognition information, the server generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint.
Preferably, the server generates the corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint, and specifically includes:
the server determines that text information is adopted for verification based on a verification mode identifier carried by the voice recognition information, and generates a corresponding target recognition code corresponding to the shared information based on the obtained text information; alternatively, the first and second electrodes may be,
the server determines that a voiceprint is adopted for verification based on a verification mode identifier carried by the voice recognition information, and generates a corresponding target recognition code corresponding to the shared information based on the obtained voiceprint; alternatively, the first and second electrodes may be,
and the server determines that the text information and the voiceprint are adopted for verification based on the verification mode identification carried by the voice recognition information, and generates a corresponding target recognition code corresponding to the shared information based on the obtained text information and the voiceprint.
Preferably, the receiving, by the server, the verification identification code returned by the second terminal based on the obtained multimedia data specifically includes:
the server receives the verification voice sent by the second terminal, analyzes the verification voice, obtains corresponding text information and voiceprint, returns the text information and the voiceprint to the second terminal, and receives a verification identification code returned by the second terminal, wherein the verification identification code is obtained after the second terminal executes the following operations: converting the multimedia data to obtain a target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
the server receives a verification identification code returned by the second terminal based on the obtained multimedia data; wherein, the verification identification code is obtained after the second terminal executes the following operations: the multimedia data is converted to obtain a target identification code, the target identification code is adopted to verify text information or/and voice print obtained after the verification voice input by a user is analyzed, and after the verification is determined to be successful, a corresponding verification identification code is generated based on the target identification code.
Preferably, when the server determines that the verification identifier is successfully associated with the target identifier, the server sends the shared information to the second terminal, which specifically includes:
when the server determines that the verification identification code is successfully associated with the target identification code, the server acquires an operation identifier carried in the target identification code;
the server acquires auxiliary operation information of the shared information set corresponding to the operation identifier based on the operation identifier, and sends the auxiliary operation information of the shared information to the second terminal; or the server acquires the shared information set corresponding to the operation identifier based on the operation identifier and sends the shared information to the second terminal.
A method of information sharing, comprising:
the first terminal sends the sharing information and the voice recognition information to the server, and triggers the server to execute the following operations: based on the voice recognition information, generating a corresponding target recognition code corresponding to the shared information, and returning the target recognition code to the first terminal;
the first terminal sends the multimedia data generated based on the target identification code to the second terminal, and triggers the second terminal to execute the following operations: and generating a verification identification code based on the obtained multimedia data, and sending the verification identification code to a server, wherein the verification identification code is used for sending the shared information to the second terminal when the server determines that the verification identification code is successfully associated with the target identification code.
Preferably, the sending, by the first terminal, the shared information and the voice recognition information to the server specifically includes:
the first terminal sends the shared information and the voice password to the server, and the voice password is used as voice recognition information; alternatively, the first and second electrodes may be,
the first terminal sends the shared information to the server, and the first terminal analyzes the voice password to obtain text information or/and voiceprint, and the text information or/and voiceprint is used as voice recognition information.
Preferably, the trigger server performs the following operations: based on the voice recognition information, generating a corresponding target recognition code corresponding to the shared information, specifically comprising:
if the voice password is used as the voice recognition information, triggering the server to execute the following operations: analyzing the voice password to obtain corresponding text information or/and voiceprint, and generating corresponding target identification codes corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
if the text information or/and the voiceprint are/is taken as the voice recognition information, the server is triggered to execute the following operations: and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint.
A method of information sharing, comprising:
the second terminal receives the multimedia data sent by the first terminal, wherein the multimedia data is obtained by the server executing the following operations: receiving and storing sharing information and voice recognition information uploaded by a first terminal, generating a corresponding target recognition code corresponding to the sharing information based on the voice recognition information, returning the target recognition code to the first terminal, and triggering the first terminal to generate multimedia data based on the target recognition code;
the second terminal generates a verification identification code based on the multimedia data;
the second terminal sends the verification identification code to the server, and triggers the server to execute the following operations: and when the verification identification code is successfully associated with the target identification code, the shared information is sent to the second terminal.
Preferably, the generating, by the second terminal, the verification identification code based on the multimedia data specifically includes:
the second terminal converts the multimedia data to obtain a target identification code, verifies the received text information or/and voiceprint by adopting the target identification code, and generates a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
the second terminal converts the multimedia data to obtain a target identification code, verifies text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generates a corresponding verification identification code based on the target identification code after determining that the verification is successful.
Preferably, the trigger server performs the following operations: when the verification identification code is successfully associated with the locally stored target identification code, sending the shared information set corresponding to the verification identification code to the second terminal, specifically comprising:
the trigger server performs the following operations: when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to a second terminal; alternatively, the first and second electrodes may be,
the trigger server performs the following operations: and when the verification identification code is successfully associated with the target identification code, acquiring the operation identifier carried in the target identification code, acquiring the shared information set corresponding to the operation identifier based on the operation identifier, and sending the shared information to the second terminal.
An information sharing apparatus specifically includes:
the first receiving unit is used for receiving and storing the sharing information and the voice recognition information uploaded by the first terminal;
the generating unit is used for generating a corresponding target identification code corresponding to the shared information based on the voice identification information, returning the target identification code to the first terminal, and triggering the first terminal to send the multimedia data generated based on the target identification code to the second terminal;
the second receiving unit is used for receiving the verification identification code returned by the second terminal based on the obtained multimedia data;
and the sending unit is used for sending the shared information to the second terminal when the verification identification code is successfully associated with the target identification code.
Preferably, when receiving and storing the sharing information and the voice recognition information uploaded by the first terminal, the first receiving unit is specifically configured to:
receiving and storing shared information and a voice password uploaded by a first terminal, and taking the voice password as voice recognition information; alternatively, the first and second electrodes may be,
and receiving and storing the shared information uploaded by the first terminal, and text information or/and voiceprint obtained after the first terminal analyzes the voice password, and taking the text information or/and voiceprint as voice recognition information.
Preferably, when the corresponding target identification code is generated corresponding to the shared information based on the voice recognition information, the generating unit is specifically configured to:
if the voice password is used as voice identification information, the server analyzes the voice password to obtain corresponding text information or/and voiceprint, and corresponding target identification codes are generated corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
and if the text information or/and the voiceprint are/is taken as the voice recognition information, the server generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint.
Preferably, when the corresponding target identification code is generated corresponding to the shared information based on the text information or/and the voiceprint, the generating unit is further configured to:
based on a verification mode identifier carried by the voice recognition information, when the text information is determined to be adopted for verification, corresponding target identification codes are generated corresponding to the shared information based on the obtained text information; alternatively, the first and second electrodes may be,
based on a verification mode identifier carried by the voice recognition information, when the voiceprint is determined to be adopted for verification, a corresponding target identification code is generated corresponding to the shared information based on the obtained voiceprint; alternatively, the first and second electrodes may be,
and based on the verification mode identification carried by the voice recognition information, when the text information and the voiceprint are determined to be adopted for verification, generating a corresponding target recognition code corresponding to the shared information based on the obtained text information and the voiceprint.
Preferably, when receiving the verification identification code returned by the second terminal based on the obtained multimedia data, the second receiving unit is specifically configured to:
receiving verification voice sent by the second terminal, analyzing the verification voice, obtaining corresponding text information and voiceprint, returning the text information and the voiceprint to the second terminal, and receiving a verification identification code returned by the second terminal, wherein the verification identification code is obtained after the second terminal executes the following operations: converting the multimedia data to obtain a target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
receiving a verification identification code returned by the second terminal based on the obtained multimedia data; wherein, the verification identification code is obtained after the second terminal executes the following operations: the multimedia data is converted to obtain a target identification code, the target identification code is adopted to verify text information or/and voice print obtained after the verification voice input by a user is analyzed, and after the verification is determined to be successful, a corresponding verification identification code is generated based on the target identification code.
Preferably, when it is determined that the verification identifier is successfully associated with the target identifier, and the shared information is sent to the second terminal, the sending unit is specifically configured to:
when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code;
acquiring auxiliary operation information of the shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to the second terminal; or the server acquires the shared information set corresponding to the operation identifier based on the operation identifier and sends the shared information to the second terminal.
An apparatus for information sharing, comprising:
the first sending unit is used for sending the sharing information and the voice recognition information to the server and triggering the server to execute the following operations: based on the voice recognition information, generating a corresponding target recognition code corresponding to the shared information, and returning the target recognition code to the first terminal;
the second sending unit is used for sending the multimedia data generated based on the target identification code to the second terminal and triggering the second terminal to execute the following operations: and generating a verification identification code based on the obtained multimedia data, and sending the verification identification code to the server, wherein the verification identification code is used for sending the shared information to the second terminal when the server determines that the verification identification code is successfully associated with the target identification code.
Preferably, when the shared information and the voice recognition information are sent to the server, the first sending unit is specifically configured to:
sending sharing information and a voice password to a server, and taking the voice password as voice recognition information; alternatively, the first and second electrodes may be,
and sending the shared information to a server, and text information or/and voiceprint obtained by analyzing the voice password by the first terminal, and taking the text information or/and voiceprint as voice recognition information.
Preferably, the trigger server performs the following operations: based on the voice recognition information, when the corresponding target identification code is generated corresponding to the shared information, the first sending unit is further configured to:
if the voice password is used as the voice recognition information, triggering the server to execute the following operations: analyzing the voice password to obtain corresponding text information or/and voiceprint, and generating corresponding target identification codes corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
if the text information or/and the voiceprint are/is taken as the voice recognition information, the server is triggered to execute the following operations: and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint.
An apparatus for information sharing, comprising:
the receiving unit is used for receiving the multimedia data sent by the first terminal, wherein the multimedia data is obtained by the server executing the following operations: receiving and storing sharing information and voice recognition information uploaded by a first terminal, generating a corresponding target recognition code corresponding to the sharing information based on the voice recognition information, returning the target recognition code to the first terminal, and triggering the first terminal to generate multimedia data based on the target recognition code;
a generating unit configured to generate a verification identification code based on the multimedia data;
the sending unit is used for sending the verification identification code to the server and triggering the server to execute the following operations: and when the verification identification code is successfully associated with the target identification code, the shared information is sent to the second terminal.
Preferably, when the verification identification code is generated based on the multimedia data, the generating unit is specifically configured to:
converting the multimedia data to obtain a target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
the multimedia data is converted to obtain a target identification code, the target identification code is adopted to verify text information or/and voice print obtained after the verification voice input by a user is analyzed, and after the verification is determined to be successful, a corresponding verification identification code is generated based on the target identification code.
Preferably, the trigger server performs the following operations: when it is determined that the verification identification code is successfully associated with the locally stored target identification code, and when the shared information set corresponding to the verification identification code is sent to the second terminal, the sending unit is specifically configured to:
the trigger server performs the following operations: when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to a second terminal; alternatively, the first and second electrodes may be,
the trigger server performs the following operations: and when the verification identification code is successfully associated with the target identification code, acquiring the operation identifier carried in the target identification code, acquiring the shared information set corresponding to the operation identifier based on the operation identifier, and sending the shared information to the second terminal.
In the embodiment of the invention, a server receives and stores shared information and voice recognition information uploaded by a first terminal; the server generates a corresponding target identification code corresponding to the shared information based on the voice identification information, returns the target identification code to the first terminal, and triggers the first terminal to send multimedia data generated based on the target identification code to the second terminal; the server receives a verification identification code returned by the second terminal based on the obtained multimedia data; and when the server determines that the verification identification code is successfully associated with the target identification code, the server sends the shared information to the second terminal. In this way, the server generates the target identification code according to the acquired voice recognition information of the first user through the first terminal, converts the target identification code into multimedia data which can be understood and recognized by each user, and sends the multimedia data to the second terminal. Furthermore, the second user acquires the target identification code of multimedia data conversion through the second terminal, and sends corresponding verification identification information to the server based on the target identification code so as to download the shared information, thereby realizing authentication through complex voice identification information, actively screening the downloaded shared information through the voice of the user, improving the safety of information authentication, improving interactivity and providing convenience for the user.
Drawings
FIG. 1 is a flow chart of a method for sharing information according to the prior art;
FIG. 2 is a first information sharing flow chart according to an embodiment of the present invention;
FIG. 3 is a flow chart of a second information sharing method according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating a server architecture according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a second terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to enable a user to realize screening and downloading of shared information through voice, improve the safety of information authentication, improve the information interactivity and provide convenience for the user, in the embodiment of the invention, a server receives the shared information and voice recognition information sent by a first user through a first terminal, generates a target identification code based on the voice recognition information, converts the target identification code into multimedia data which can be understood and recognized by each user, and sends the multimedia data to a second terminal; further, the second user obtains a target identification code of multimedia data conversion through the second terminal, and sends corresponding verification identification information to the server based on the target identification code so as to download the shared information.
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
In the embodiment of the invention, different modes can be respectively adopted to realize information sharing according to different voice recognition information.
For example, when the voice recognition information is a voice password, the information sharing can be realized in a first mode; and when the voice information is text information and/or voiceprint, the information sharing is realized by adopting a second mode.
The above two modes will be described in detail by using specific procedures
Referring to fig. 2, when the voice recognition information is a voice password, the specific process of implementing information sharing by the first method is as follows:
step 200: the first terminal transmits the shared information and the voice recognition information to the server.
In practical application, the first terminal sends the shared information and the voice password to the server, and the voice password is used as voice recognition information.
For example, the shared information sent by the first terminal to the server is movie video "movie 121" and the voice password is "movie 121".
The server comprises a content server and a voice server, wherein the voice server is used for analyzing the voice password, and the content server is used for realizing generation and verification of the target identification code and uploading and downloading of the shared information. In the embodiment of the present invention, the content server and the voice server may be configured as separate devices, which are collectively referred to as a server, or may be configured as the same device, that is, configured as two different functional modules on the same server.
On the other hand, in the embodiment of the present invention, although different manners are adopted to implement information sharing according to different voice recognition information, both the first manner and the second manner are applicable to the setting manners of the two servers, and details are not described herein again.
Step 201: the voice server analyzes the acquired voice password into text information and a voiceprint.
In practical application, the voice server acquires the voice password, analyzes the voice password and acquires corresponding text information and voiceprint.
Step 202: the voice server sends the text information and voiceprint to the content server.
Step 203: and the content server generates a corresponding target identification code corresponding to the shared information based on the voice identification information.
In practical application, the content server receives and stores the shared information, and generates a corresponding target identification code corresponding to the shared information based on the text information and/or the voiceprint.
Step 204: the content server sends the target identification code to the first terminal.
Step 205: the first terminal generates multimedia data based on the target identification code.
In practical application, the first terminal synthesizes the target identification code into the multimedia data.
For example, the first terminal obtains the target identification codes corresponding to the voice passwords "apple", "pear" and "strawberry", and synthesizes the target identification codes into multimedia data for fruit promotion, such as audio and video.
Step 206: the first terminal sends multimedia data to the second terminal.
Step 207: and the second terminal converts the multimedia data to obtain and store the target identification code.
Step 208: and the second terminal uploads the verification voice input by the user.
In practical application, the second terminal obtains the multimedia data based on the user and uploads verification voice input by the user.
For example, in a shopping video sent by the first terminal, the host introduces three products: juice extractor, TV, silk quilt. The voice passwords added by the first terminal are respectively a juicer, a television and a silk quilt. If the user of the second terminal determines to purchase the silk quilt, the user can upload the verification voice "silk quilt" through the microphone of the second terminal.
Therefore, the user of the second terminal can obtain a plurality of voice passwords contained in the multimedia data through the multimedia data issued by the first terminal, and then determine the voice password corresponding to the shared information to be downloaded, so that the corresponding verification voice is uploaded through the second terminal.
Step 209: and the voice server analyzes the verification voice to obtain text information and voiceprint.
Step 210: the voice server returns the text information and voiceprint to the second terminal.
Step 211: the second terminal determines that the verification voice is correct based on the target identification code, and generates a verification identification code corresponding to the target identification code.
In practical application, the second terminal receives the text information and the voiceprint sent by the voice server, and then determines the mode for verifying the verification voice based on the target identification code.
The verification voice is verified based on the target identification code, the verification voice is determined to be correct, and when the verification identification code is generated corresponding to the target identification code, the following modes can be adopted:
the first mode is as follows: and if the second terminal determines to verify only according to the text information based on the target identification code, the second terminal only matches the text information obtained based on the target identification code with the text information obtained after analyzing the verification voice, and generates a verification identification code corresponding to the target identification code after determining that the matching is successful.
The first mode is suitable for verification among a plurality of users, is used for realizing sharing of shared information among the plurality of users, and can effectively improve verification efficiency.
For example, since the target identification code only includes the text information "rose tea", and the text information obtained after the verification voice is analyzed is "rose tea", the second terminal determines that the verification voice is correct, and generates the verification identification code corresponding to the target identification code.
The second way is: and if the second terminal determines to verify only according to the voiceprint based on the target identification code, the second terminal only matches the voiceprint obtained based on the target identification code with the voiceprint obtained after the verification voice is analyzed, and generates a verification identification code corresponding to the target identification code after the successful matching is determined.
For example, the user zhang san uploads shared information (such as a personal photo) and voice recognition information to the server through the notebook, and then the server proposes a voiceprint of zhang san from the voice recognition information and sends a target identification code generated based on the voiceprint of zhang san to the notebook of zhang san of the user. And the notebook computer of Zhang III sends the multimedia data synthesized based on the target identification code to the smart phone of Zhang III. Furthermore, the user Zhang III uploads verification voice to the server through the smart phone, the server extracts the voiceprint of the user Zhang III from the verification voice, and then the voiceprint of the user Zhang III is sent to the smart phone. The smart phone obtains a target identification code based on the received multimedia data, matches the voiceprint obtained based on the target identification code with the voiceprint of Zhang III of the user obtained through analysis of the server, and generates a verification identification code corresponding to the target identification code after the successful matching is determined. Thus, the user can view personal shared information, namely personal photos, in different devices.
The second mode is only suitable for the same user, and is used for realizing that the same user stores shared information only seen by oneself in different devices, so that the safety of verification can be effectively improved.
The third mode is as follows: if the second terminal determines to verify according to the text information and the voiceprint based on the target identification code, in the verification process, preferably, the text information can be verified firstly, and the voiceprint is verified after the text information is successfully verified, or the voiceprint can be verified firstly, and the text information is verified after the voiceprint is successfully verified.
For example, the user li four first uploads the shared information (i.e., the work file) and the voice recognition information to the server through the smart phone. Then, the server obtains text information 'work' and voiceprint after analyzing the voice recognition information, generates a target recognition code, sends the target recognition code to the smart phone, and the smart phone sends multimedia data synthesized based on the target recognition code to the computer of the user Li IV. Further, the user Li IV uploads the verification voice to the server through the computer, the server sends text information 'work' and voiceprint obtained after the verification voice is analyzed to the computer of the user Li IV, the computer of the user Li IV obtains a target identification code based on the received multimedia data, matches the text information 'work' obtained based on the target identification code with the text information 'work' obtained through the analysis of the server, and determines that the matching is successful, then matches the voiceprint obtained based on the target identification code with the voiceprint obtained through the analysis of the server, and determines that the matching is successful, and finally, the verification identification code is generated corresponding to the target identification code.
The third mode can also realize that the same user stores the shared information which is only visible to the user in different devices. In the verification process, if the text information is verified firstly, the voiceprint is verified after the text information is verified successfully, so that the verification efficiency can be improved, and if the voiceprint is verified firstly, the text information is verified after the voiceprint is verified successfully, so that the verification accuracy can be improved.
TABLE 1
Figure BDA0001139452890000141
Figure BDA0001139452890000151
Optionally, referring to table 1, in the above embodiment, the target identification code and the verification identification code may use the same encoding method, for example, the target identification code and the verification identification code may be composed of the following parts: flag bit, text information, verification mode, operation and time stamp.
And when the value of the flag bit is 0, the shared information is uploaded, and when the value of the flag bit is 1, the shared information is downloaded. In the embodiment of the present invention, in the implementation process, the flag bit of the target identification code is usually set to 0, and the flag bit of the verification identification code is usually set to 1.
And the text information is used for representing the text information obtained after the voice password or the verification voice is analyzed. Optionally, in order to improve the recognition accuracy of the text information, generally, no more than 4 characters are used.
The verification mode is that when the value is 0x00, text information verification is performed, and when the value is 0x01, voiceprint verification is performed; and when the value is 0x10, text information and voiceprint verification are performed.
According to the verification mode, determining to adopt voiceprints for verification, or adding voiceprint fields in the target identification code and the verification identification code when the voiceprints and the text information are adopted for verification, wherein the value of the voiceprints is a voiceprint identifier corresponding to each preset voiceprint.
And the operation is used for representing the specific operation triggered after the identification code is successfully associated with the target identification code, wherein the value of the operation is the operation identifier set corresponding to each operation. Optionally, the operation set corresponding to the operation identifier may be directly sending the shared information to the second terminal, or may be sending auxiliary operation information of the shared information to the second terminal.
For example, assume that the following information is set in advance: after the successful association between the verification identification code and the target identification code, an operation with an operation identifier of 0x01 needs to be triggered, and a specific operation corresponding to 0x01 is "send shared information directly to the receiving party", then, assuming that the first terminal uploads shared information (e.g., a short message) and voice identification information to the server, when the server obtains the target identification code based on the voice identification information and obtains the verification identification code from the second terminal, and determines that the verification identification code is successfully associated with the target identification code, the server will send the short message obtained from the first terminal directly to the second terminal that uploaded the verification identification code.
Obviously, when the content of the shared information is small, since no traffic load is caused, the operation corresponding to such shared information setting may be "directly sending the shared information to the recipient by the server".
For another example, assume that the following information is set in advance: after the successful association of the verification identification code and the target identification code, an operation with an operation identifier of 0x02 needs to be triggered, and a specific operation corresponding to 0x02 is "a link for sending shared information to the receiving party", then, assuming that the first terminal uploads the shared information (e.g., the movie 345) and the voice recognition information to the server, when the server obtains the target identification code based on the voice recognition information and obtains the verification identification code from the second terminal, and determines that the verification identification code is successfully associated with the target identification code, the server sends the second terminal, which has uploaded the verification identification code, the link of the "movie 345" as the auxiliary operation information of the "movie 345" obtained from the first terminal, so that the second terminal can download the "movie 345" based on the link of the "movie 345".
Obviously, when the content of the shared information is large, traffic load is caused, and therefore, the operation set for such shared information may be "transmitting the auxiliary operation information of the shared information to the receiving side by the server".
And the time stamp is used for indicating a time length threshold value for identifying the voice identification information.
For example, if the time stamp is set to 30s, the terminal recognizes the voice recognition information within 30 s.
Further, when the target identification code and the verification identification code are set, corresponding custom fields can be added according to the requirements of the user, and are not described herein again.
Step 212: and the second terminal uploads the verification identification code to the content server.
Step 213: the content server identifies the verification identification code.
In practical application, the content server acquires the locally stored target identification codes, matches the received verification identification codes with the target identification codes, and determines the corresponding target identification codes and the shared information corresponding to the target identification codes based on the matching result.
Step 214: the second terminal downloads the shared information through the content server.
In practical application, the second terminal downloads the shared information through the content server, and may adopt, but is not limited to, the following several ways:
the first mode is as follows: the second terminal directly receives the shared information (e.g., short message) sent by the content server.
The second way is: the second terminal receives the subsidiary operation information (e.g., download link of the movie) of the shared information transmitted from the content server and downloads the shared information based on the subsidiary operation information of the shared information.
Referring to fig. 3, when the speech recognition information is text information and/or voiceprint, the specific process of implementing information sharing by the second method is as follows:
step 300: the first terminal uploads the shared information to the server, and further, the server receives and stores the shared information.
In practical application, the first user sends the shared information to the server through the first terminal.
For example, the shared information sent by the first user to the server through the first terminal is an audio file.
Further, the server receives the shared information and stores the shared information in a local database.
Step 301: and the first terminal analyzes the acquired voice password into text information and a voiceprint.
In practical application, the first terminal acquires a voice password input by a user and analyzes the voice password into text information and a voiceprint.
For example, if the user inputs a voice password as "mobile phone" through the microphone of the first terminal, the first terminal parses the voice password into text information "mobile phone" and a corresponding voiceprint.
Step 302: the first terminal sends the text information and the voiceprint to the server.
Step 303: the server generates the target identification code based on the received text information and/or voiceprint.
Step 304: the server sends the target identification code to the first terminal.
Step 305: the first terminal generates multimedia data based on the target identification code.
In practical application, the first terminal receives the target identification code and synthesizes the target identification code into the multimedia data.
For example, the first terminal synthesizes a book, music and a picture, and a corresponding object identification code into a multimedia data for shopping.
Step 306: the first terminal sends multimedia data to the second terminal.
Step 307: the second terminal obtains and stores the object identification code based on the received multimedia data.
Step 308: the second terminal parses the verification voice input by the second user into text information and a voiceprint.
In practical application, the second user determines the corresponding verification voice through the multimedia data.
For example, in the video transmitted by the first terminal, the host introduces a movie "movie 789" and an audio "music 345", wherein the voice passwords added by the first terminal are "movie 789" and "music 345", respectively. If the second user determines to watch the movie, the second user may upload the verification voice "movie 789" through the second terminal's microphone.
Therefore, the user of the second terminal can obtain a plurality of voice passwords contained in the multimedia data through the multimedia data issued by the first terminal, and then determine the voice password corresponding to the shared information to be downloaded, so that the corresponding verification voice is uploaded through the second terminal.
Further, the second terminal parses the verification voice input by the user into text information and a voiceprint.
Step 309: the second terminal verifies the verification voice, determines that the verification is correct and generates a verification identification code.
In practical application, the second terminal verifies the verification voice to determine that the verification is correct, and when generating the verification identification code, the following modes can be adopted, but are not limited to:
the first mode is as follows: and if the second terminal determines to verify only according to the text information based on the target identification code, the second terminal only matches the text information obtained based on the target identification code with the text information obtained after analyzing the verification voice, and generates a verification identification code corresponding to the target identification code after determining that the matching is successful.
The first mode is suitable for verification among a plurality of users, is used for realizing sharing of shared information among the plurality of users, and can effectively improve verification efficiency.
For example, since the target identification code includes only the text information "tableware" and the text information obtained after parsing the verification voice is "tableware", the second terminal determines that the verification voice is correct and generates the verification identification code corresponding to the target identification code.
The second way is: and if the second terminal determines to verify only according to the voiceprint based on the target identification code, the second terminal only matches the voiceprint obtained based on the target identification code with the voiceprint obtained after the verification voice is analyzed, and generates a verification identification code corresponding to the target identification code after the successful matching is determined.
For example, a user first uploads shared information (e.g., personal video) to the server via the notebook, then the user first inputs a voice password "video" to the notebook via the microphone and extracts a one-to-one voiceprint and text information from the voice password and sends the one-to-one voiceprint and text information to the server. Then, the server sends the one-by-one voice print-based target identification code to the one-by-one notebook of the user. And the notebook computer of the user one sends the multimedia data synthesized based on the target identification code to the smart phone of the user one. Further, the first user obtains the verification voice input by the user through the smart phone, and extracts the voiceprint of the first user from the verification voice. Then, the smart phone obtains a target identification code based on the received multimedia data, matches the voiceprint obtained based on the target identification code with the user-one voiceprint obtained by analyzing the verification voice, and generates a verification identification code corresponding to the target identification code after the successful matching is determined. Thus, the user can view personal shared information, i.e., personal photos, in different devices on their own.
The second mode is only suitable for the same user, and is used for realizing that the same user stores shared information only seen by oneself in different devices, so that the safety of verification can be effectively improved.
The third mode is as follows: if the second terminal determines to verify according to the text information and the voiceprint based on the target identification code, in the verification process, preferably, the text information can be verified firstly, and the voiceprint is verified after the text information is successfully verified, or the voiceprint can be verified firstly, and the text information is verified after the voiceprint is successfully verified.
For example, the user li first uploads shared information (i.e., an entertainment file) to the server through the smartphone, then the user li first inputs a voice password "entertainment" to the smartphone through the microphone, and extracts the voiceprint and text information of li from the voice password, and sends the voiceprint and text information of li to the server. Then, the server generates a target identification code based on the acquired voiceprint and text information entertainment of the user Liyi, sends the target identification code to the smart phone, and then the smart phone sends the multimedia data synthesized based on the target identification code to the computer of the user Liyi. Further, the computer receives verification voice input by the user Li I, analyzes the verification voice to obtain voiceprint and text information entertainment of the Li I, matches the text information entertainment obtained based on the target identification code with the text information entertainment of the user Li I obtained after analyzing the verification voice after obtaining the target identification code based on the received multimedia data, determines that the matching is successful, matches the voiceprint obtained based on the target identification code with the voiceprint of the user Li I obtained after analyzing the verification voice to determine that the matching is successful, and finally generates the verification identification code corresponding to the target identification code.
The third mode can also realize that the same user stores the shared information which is only visible to the user in different devices. In the verification process, if the text information is verified firstly, the voiceprint is verified after the text information is verified successfully, so that the verification efficiency can be improved, and if the voiceprint is verified firstly, the text information is verified after the voiceprint is verified successfully, so that the verification accuracy can be improved.
Optionally, referring to table 1, in the above embodiment, the target identification code and the verification identification code may use the same encoding method, for example, the target identification code and the verification identification code may be composed of the following parts: flag bit, text information, verification mode, operation and time stamp.
And when the value of the flag bit is 0, the shared information is uploaded, and when the value of the flag bit is 1, the shared information is downloaded. In the embodiment of the present invention, in the implementation process, the flag bit of the target identification code is usually set to 0, and the flag bit of the verification identification code is usually set to 1.
And the text information is used for representing the text information obtained after the voice password or the verification voice is analyzed. Optionally, in order to improve the recognition accuracy of the text information, generally, no more than 4 characters are used.
The verification mode is that when the value is 0x00, text information verification is performed, and when the value is 0x01, voiceprint verification is performed; and when the value is 0x10, text information and voiceprint verification are performed.
According to the verification mode, determining to adopt voiceprints for verification, or adding voiceprint fields in the target identification code and the verification identification code when the voiceprints and the text information are adopted for verification, wherein the value of the voiceprints is a voiceprint identifier corresponding to each preset voiceprint.
And the operation is used for representing the specific operation triggered after the identification code is successfully associated with the target identification code, wherein the value of the operation is the operation identifier set corresponding to each operation. Optionally, the operation set corresponding to the operation identifier may be directly sending the shared information to the second terminal, or may be sending auxiliary operation information of the shared information to the second terminal.
For example, assume that the following information is set in advance: after the successful association of the verification identification code with the target identification code, an operation with an operation identifier of 0x03 needs to be triggered, and a specific operation corresponding to 0x03 is "send shared information directly to the receiving party", then, assuming that the first terminal uploads shared information (e.g., a title) and voice recognition information to the server, when the server obtains the target identification code based on the voice recognition information and obtains the verification identification code from the second terminal, and determines that the verification identification code is successfully associated with the target identification code, the server directly sends the title obtained from the first terminal to the second terminal that uploaded the verification identification code.
Obviously, when the content of the shared information is small, since no traffic load is caused, the operation corresponding to such shared information setting may be "directly sending the shared information to the recipient by the server".
For another example, assume that the following information is set in advance: after the successful association of the verification identification code with the target identification code, the operation with the operation identifier of 0x04 needs to be triggered, and a specific operation corresponding to 0x04 is "a link for sending shared information to the receiving party", then, assuming that the first terminal uploads the shared information (e.g., music 78) and the voice identification information to the server, when the server obtains the target identification code based on the voice identification information and obtains the verification identification code from the second terminal, and determines that the verification identification code is successfully associated with the target identification code, the server sends the second terminal, which has uploaded the verification identification code, the link for the auxiliary operation information of "music 78", i.e., "music 78", obtained from the first terminal, so that the second terminal can download "music 78" based on the link for "music 78".
Obviously, when the content of the shared information is large, traffic load is caused, and therefore, the operation set for such shared information may be "transmitting the auxiliary operation information of the shared information to the receiving side by the server".
And the time stamp is used for indicating a time length threshold value for identifying the voice identification information.
For example, if the time stamp is set to 20s, the terminal recognizes the voice recognition information within 20 s.
Further, when the target identification code and the verification identification code are set, corresponding custom fields can be added according to the requirements of the user, and are not described herein again.
Step 310: the second terminal sends the verification identification code to the server.
Step 311: the server identifies the verification identification code.
In practical application, the server acquires the locally stored target identification codes, matches the received verification identification codes with the target identification codes, and determines the corresponding target identification codes and the shared information corresponding to the target identification codes based on the matching result.
Step 312: and the second terminal downloads the shared information through the server.
In practical application, the second terminal downloads the shared information through the server, and may adopt, but is not limited to, the following several ways:
the first mode is as follows: the second terminal receives the shared information (e.g., title) transmitted by the server.
The second way is: the second terminal receives the auxiliary operation information of the shared information transmitted by the server and downloads the shared information based on the auxiliary operation information of the shared information (e.g., a download link of music).
Based on the above embodiment, referring to fig. 4, a schematic structural diagram of an information sharing device (e.g., a server), in an embodiment of the present invention, the information sharing device specifically includes:
a first receiving unit 40, configured to receive and store the sharing information and the voice recognition information uploaded by the first terminal;
the generating unit 41 is configured to generate a corresponding target identification code corresponding to the shared information based on the voice recognition information, return the target identification code to the first terminal, and trigger the first terminal to send multimedia data generated based on the target identification code to the second terminal;
a second receiving unit 42, configured to receive a verification identification code returned by the second terminal based on the obtained multimedia data;
and a sending unit 43, configured to send the shared information to the second terminal when it is determined that the verification identifier is successfully associated with the target identifier.
Preferably, when receiving and storing the sharing information and the voice recognition information uploaded by the first terminal, the first receiving unit 40 is specifically configured to:
receiving and storing shared information and a voice password uploaded by a first terminal, and taking the voice password as voice recognition information; alternatively, the first and second electrodes may be,
and receiving and storing the shared information uploaded by the first terminal, and text information or/and voiceprint obtained after the first terminal analyzes the voice password, and taking the text information or/and voiceprint as voice recognition information.
Preferably, when the corresponding target identification code is generated corresponding to the shared information based on the voice recognition information, the generating unit 41 is specifically configured to:
if the voice password is used as voice identification information, the server analyzes the voice password to obtain corresponding text information or/and voiceprint, and corresponding target identification codes are generated corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
and if the text information or/and the voiceprint are/is taken as the voice recognition information, the server generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint.
Preferably, when the corresponding target identification code is generated corresponding to the shared information based on the text information or/and the voiceprint, the generating unit 41 is further configured to:
based on a verification mode identifier carried by the voice recognition information, when the text information is determined to be adopted for verification, corresponding target identification codes are generated corresponding to the shared information based on the obtained text information; alternatively, the first and second electrodes may be,
based on a verification mode identifier carried by the voice recognition information, when the voiceprint is determined to be adopted for verification, a corresponding target identification code is generated corresponding to the shared information based on the obtained voiceprint; alternatively, the first and second electrodes may be,
and based on the verification mode identification carried by the voice recognition information, when the text information and the voiceprint are determined to be adopted for verification, generating a corresponding target recognition code corresponding to the shared information based on the obtained text information and the voiceprint.
Preferably, when receiving the verification identification code returned by the second terminal based on the obtained multimedia data, the second receiving unit 42 is specifically configured to:
receiving verification voice sent by the second terminal, analyzing the verification voice, obtaining corresponding text information and voiceprint, returning the text information and the voiceprint to the second terminal, and receiving a verification identification code returned by the second terminal, wherein the verification identification code is obtained after the second terminal executes the following operations: converting the multimedia data to obtain a target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
receiving a verification identification code returned by the second terminal based on the obtained multimedia data; wherein, the verification identification code is obtained after the second terminal executes the following operations: the multimedia data is converted to obtain a target identification code, the target identification code is adopted to verify text information or/and voice print obtained after the verification voice input by a user is analyzed, and after the verification is determined to be successful, a corresponding verification identification code is generated based on the target identification code.
Preferably, when determining that the verification identifier is successfully associated with the target identifier, and when sending the shared information to the second terminal, the sending unit 43 is specifically configured to:
when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code;
acquiring auxiliary operation information of the shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to the second terminal; or the server acquires the shared information set corresponding to the operation identifier based on the operation identifier and sends the shared information to the second terminal.
Based on the above embodiment, referring to fig. 5, a schematic structural diagram of an information sharing device (e.g., a first terminal), in an embodiment of the present invention, the information sharing device specifically includes:
a first sending unit 50, configured to send the sharing information and the voice recognition information to the server, and trigger the server to perform the following operations: based on the voice recognition information, generating a corresponding target recognition code corresponding to the shared information, and returning the target recognition code to the first terminal;
a second sending unit 51, configured to send the multimedia data generated based on the target identification code to the second terminal, and trigger the second terminal to perform the following operations: and generating a verification identification code based on the obtained multimedia data, and sending the verification identification code to the server, wherein the verification identification code is used for sending the shared information to the second terminal when the server determines that the verification identification code is successfully associated with the target identification code.
Preferably, when sending the shared information and the voice recognition information to the server, the first sending unit 50 is specifically configured to:
sending sharing information and a voice password to a server, and taking the voice password as voice recognition information; alternatively, the first and second electrodes may be,
and sending the shared information to a server, and text information or/and voiceprint obtained by analyzing the voice password by the first terminal, and taking the text information or/and voiceprint as voice recognition information.
Preferably, the trigger server performs the following operations: when generating the corresponding target identification code corresponding to the shared information based on the voice recognition information, the first sending unit 50 is further configured to:
if the voice password is used as the voice recognition information, triggering the server to execute the following operations: analyzing the voice password to obtain corresponding text information or/and voiceprint, and generating corresponding target identification codes corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
if the text information or/and the voiceprint are/is taken as the voice recognition information, the server is triggered to execute the following operations: and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint.
Based on the foregoing embodiment, referring to fig. 6, a schematic structural diagram of an information sharing device (e.g., a second terminal), in an embodiment of the present invention, the information sharing device specifically includes:
a receiving unit 60, configured to receive multimedia data sent by the first terminal, where the multimedia data is obtained by the server performing the following operations: receiving and storing sharing information and voice recognition information uploaded by a first terminal, generating a corresponding target recognition code corresponding to the sharing information based on the voice recognition information, returning the target recognition code to the first terminal, and triggering the first terminal to generate multimedia data based on the target recognition code;
a generating unit 61 for generating a verification identification code based on the multimedia data;
a sending unit 62, configured to send the verification identification code to the server, and trigger the server to perform the following operations: and when the verification identification code is successfully associated with the target identification code, the shared information is sent to the second terminal.
Preferably, when generating the verification identification code based on the multimedia data, the generating unit 61 is specifically configured to:
converting the multimedia data to obtain a target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
the multimedia data is converted to obtain a target identification code, the target identification code is adopted to verify text information or/and voice print obtained after the verification voice input by a user is analyzed, and after the verification is determined to be successful, a corresponding verification identification code is generated based on the target identification code.
Preferably, the trigger server performs the following operations: when determining that the verification identification code is successfully associated with the locally stored target identification code, and when sending the shared information set corresponding to the verification identification code to the second terminal, the sending unit 62 is specifically configured to:
the trigger server performs the following operations: when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to a second terminal; alternatively, the first and second electrodes may be,
the trigger server performs the following operations: and when the verification identification code is successfully associated with the target identification code, acquiring the operation identifier carried in the target identification code, acquiring the shared information set corresponding to the operation identifier based on the operation identifier, and sending the shared information to the second terminal.
In the embodiment of the invention, a server receives and stores shared information and voice recognition information uploaded by a first terminal; the server generates a corresponding target identification code corresponding to the shared information based on the voice identification information, returns the target identification code to the first terminal, and triggers the first terminal to send multimedia data generated based on the target identification code to the second terminal; the server receives a verification identification code returned by the second terminal based on the obtained multimedia data; and when the server determines that the verification identification code is successfully associated with the target identification code, the server sends the shared information to the second terminal. In this way, the server generates the target identification code according to the acquired voice recognition information of the first user through the first terminal, converts the target identification code into multimedia data which can be understood and recognized by each user, and sends the multimedia data to the second terminal. Furthermore, the second user acquires the target identification code of multimedia data conversion through the second terminal, and sends corresponding verification identification information to the server based on the target identification code so as to download the shared information, thereby realizing authentication through complex voice identification information, actively screening the downloaded shared information through the voice of the user, improving the safety of information authentication, improving interactivity and providing convenience for the user.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments of the present invention without departing from the spirit or scope of the embodiments of the invention. Thus, if such modifications and variations of the embodiments of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to encompass such modifications and variations.

Claims (24)

1. A method of information sharing, comprising:
the server receives and stores the sharing information and the voice recognition information uploaded by the first terminal;
the server generates a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint obtained through the voice identification information, returns the target identification code to the first terminal, and triggers the first terminal to send the multimedia data generated based on the target identification code to the second terminal;
the server receives a verification identification code returned by the second terminal based on the obtained multimedia data;
when the server determines that the verification identification code is successfully associated with the target identification code, the server sends the shared information to the second terminal;
the voice recognition information is a voice password, the multimedia data comprises a plurality of voice passwords, and the verification identification code is obtained by the second terminal after the following operations are executed: converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; the verification voice is determined according to the voice password corresponding to the shared information needing to be downloaded.
2. The method of claim 1, wherein the server receives and stores the sharing information and the voice recognition information uploaded by the first terminal, and specifically comprises:
the server receives and stores the sharing information and the voice password uploaded by the first terminal, and the voice password is used as voice recognition information; alternatively, the first and second electrodes may be,
and the server receives and stores the shared information uploaded by the first terminal, and text information or/and voiceprint obtained after the first terminal analyzes the voice password, and the text information or/and the voiceprint are/is used as voice recognition information.
3. The method of claim 2, wherein the server generates a corresponding target identification code corresponding to the shared information based on the voice recognition information, and specifically includes:
if the voice password is used as voice recognition information, the server analyzes the voice password to obtain corresponding text information or/and voiceprint, and generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
and if the text information or/and the voiceprint are/is taken as the voice recognition information, the server generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint.
4. The method according to claim 3, wherein the server generates a corresponding target identifier corresponding to the shared information based on the text information or/and the voiceprint, specifically comprising:
the server determines that text information is adopted for verification based on a verification mode identifier carried by the voice recognition information, and generates a corresponding target recognition code corresponding to the shared information based on the obtained text information; alternatively, the first and second electrodes may be,
the server determines that a voiceprint is adopted for verification based on a verification mode identifier carried by the voice recognition information, and generates a corresponding target recognition code corresponding to the shared information based on the obtained voiceprint; alternatively, the first and second electrodes may be,
and the server generates a corresponding target identification code corresponding to the shared information based on the obtained text information and the voiceprint when determining that the text information and the voiceprint are adopted for verification based on the verification mode identification carried by the voice recognition information.
5. The method as claimed in claim 2, 3 or 4, wherein the server receiving the verification identification code returned by the second terminal based on the obtained multimedia data specifically comprises:
receiving verification voice sent by the second terminal, analyzing the verification voice to obtain corresponding text information and voiceprint, returning the text information and voiceprint to the second terminal, and receiving a verification identification code returned by the second terminal, wherein the verification identification code is obtained after the second terminal executes the following operations: converting the multimedia data to obtain the target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
receiving a verification identification code returned by the second terminal based on the obtained multimedia data; wherein the verification identification code is obtained after the second terminal performs the following operations: and converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after determining that the verification is successful.
6. The method according to claim 1, 2, 3 or 4, wherein the step of sending the shared information to the second terminal when the server determines that the verification identifier is successfully associated with the target identifier comprises:
when the server determines that the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code;
the server acquires auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sends the auxiliary operation information of the shared information to the second terminal; or the server acquires shared information set corresponding to the operation identifier based on the operation identifier, and sends the shared information to the second terminal.
7. A method of information sharing, comprising:
the first terminal sends sharing information and voice recognition information to a server, and triggers the server to execute the following operations: generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint obtained through the voice recognition information, and returning the target identification code to the first terminal;
the first terminal sends the multimedia data generated based on the target identification code to a second terminal, and triggers the second terminal to execute the following operations: generating a verification identification code based on the obtained multimedia data, and sending the verification identification code to the server, wherein the verification identification code is used for sending the shared information to the second terminal when the server determines that the verification identification code is successfully associated with the target identification code;
the voice recognition information is a voice password, the multimedia data comprises a plurality of voice passwords, and the verification identification code is obtained by the second terminal after the following operations are executed: converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; the verification voice is determined according to the voice password corresponding to the shared information needing to be downloaded.
8. The method of claim 7, wherein the first terminal sending the shared information and the voice recognition information to the server specifically comprises:
the method comprises the steps that a first terminal sends shared information and a voice password to a server, and the voice password is used as voice recognition information; alternatively, the first and second electrodes may be,
the method comprises the steps that a first terminal sends shared information to a server, the first terminal analyzes a voice password to obtain text information or/and a voiceprint, and the text information or/and the voiceprint are used as voice recognition information.
9. The method of claim 8, wherein the server is triggered to: generating a corresponding target identification code corresponding to the shared information based on the voice recognition information, which specifically comprises:
if the voice password is used as voice recognition information, triggering the server to execute the following operations: analyzing the voice password to obtain corresponding text information or/and voiceprint, and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
if the text information or/and voiceprint is/are used as the voice recognition information, triggering the server to execute the following operations: and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint.
10. A method of information sharing, comprising:
the second terminal receives multimedia data sent by the first terminal, wherein the multimedia data is obtained by the server executing the following operations: receiving and storing the sharing information and the voice recognition information uploaded by the first terminal, generating a corresponding target identification code corresponding to the sharing information based on text information or/and voiceprint obtained through the voice recognition information, returning the target identification code to the first terminal, and triggering the first terminal to generate multimedia data based on the target identification code;
the second terminal converts the multimedia data to obtain the target identification code, verifies text information or/and voiceprint obtained after analyzing verification voice input by a user by adopting the target identification code, and generates a corresponding verification identification code based on the target identification code after the verification is determined to be successful;
the second terminal sends the verification identification code to a server, and triggers the server to execute the following operations: when the verification identification code is determined to be successfully associated with the target identification code, the shared information is sent to the second terminal;
the voice recognition information is a voice password, the multimedia data comprises a plurality of voice passwords, and the verification voice is determined according to the voice password corresponding to the shared information needing to be downloaded.
11. The method of claim 10, wherein the second terminal generating the authentication identification code based on the multimedia data comprises:
the second terminal converts the multimedia data to obtain the target identification code, verifies the received text information or/and voiceprint by adopting the target identification code, and generates a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
and the second terminal converts the multimedia data to obtain the target identification code, verifies the text information or/and the voiceprint obtained after analyzing the verification voice input by the user by adopting the target identification code, and generates a corresponding verification identification code based on the target identification code after the verification is determined to be successful.
12. The method of claim 10 or 11, wherein the server is triggered to: when determining that the verification identification code is successfully associated with the locally stored target identification code, sending the shared information set corresponding to the verification identification code to the second terminal, specifically including:
triggering the server to perform the following operations: when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to the second terminal; alternatively, the first and second electrodes may be,
triggering the server to perform the following operations: and when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring shared information set corresponding to the operation identifier based on the operation identifier, and sending the shared information to the second terminal.
13. An apparatus for information sharing, comprising:
the first receiving unit is used for receiving and storing the sharing information and the voice recognition information uploaded by the first terminal;
the generating unit is used for generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint obtained through the voice recognition information, returning the target identification code to the first terminal, and triggering the first terminal to send the multimedia data generated based on the target identification code to the second terminal;
the second receiving unit is used for receiving the verification identification code returned by the second terminal based on the obtained multimedia data;
a sending unit, configured to send the shared information to the second terminal when it is determined that the verification identifier is successfully associated with the target identifier;
the voice recognition information is a voice password, the multimedia data comprises a plurality of voice passwords, and the verification identification code is obtained by the second terminal after the following operations are executed: converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; the verification voice is determined according to the voice password corresponding to the shared information needing to be downloaded.
14. The apparatus according to claim 13, wherein when receiving and storing the sharing information and the voice recognition information uploaded by the first terminal, the first receiving unit is specifically configured to:
receiving and storing the sharing information and the voice password uploaded by the first terminal, and taking the voice password as voice recognition information; alternatively, the first and second electrodes may be,
and receiving and storing the shared information uploaded by the first terminal, and text information or/and voiceprint obtained after the first terminal analyzes the voice password, and taking the text information or/and the voiceprint as voice recognition information.
15. The apparatus according to claim 14, wherein when generating the corresponding object id corresponding to the shared information based on the speech recognition information, the generating unit is specifically configured to:
if the voice password is used as voice recognition information, the server analyzes the voice password to obtain corresponding text information or/and voiceprint, and generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
and if the text information or/and the voiceprint are/is taken as the voice recognition information, the server generates a corresponding target recognition code corresponding to the shared information based on the text information or/and the voiceprint.
16. The apparatus according to claim 15, wherein when generating the corresponding object identifier corresponding to the shared information based on the text information or/and the voiceprint, the generating unit is further configured to:
based on the verification mode identification carried by the voice recognition information, when text information is determined to be adopted for verification, based on the obtained text information, generating a corresponding target recognition code corresponding to the shared information; alternatively, the first and second electrodes may be,
based on the verification mode identification carried by the voice recognition information, when determining that voiceprints are adopted for verification, generating corresponding target identification codes corresponding to the shared information based on the obtained voiceprints; alternatively, the first and second electrodes may be,
and based on the verification mode identification carried by the voice recognition information, when the text information and the voiceprint are determined to be adopted for verification, generating a corresponding target identification code corresponding to the shared information based on the obtained text information and the voiceprint.
17. The apparatus according to claim 14, 15 or 16, wherein when receiving the verification identifier returned by the second terminal based on the obtained multimedia data, the second receiving unit is specifically configured to:
receiving verification voice sent by the second terminal, analyzing the verification voice to obtain corresponding text information and voiceprint, returning the text information and voiceprint to the second terminal, and receiving a verification identification code returned by the second terminal, wherein the verification identification code is obtained after the second terminal executes the following operations: converting the multimedia data to obtain the target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
receiving a verification identification code returned by the second terminal based on the obtained multimedia data; wherein the verification identification code is obtained after the second terminal performs the following operations: and converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after determining that the verification is successful.
18. The apparatus according to claim 13, 14, 15 or 16, wherein when determining that the verification identifier is successfully associated with the target identifier and when sending the shared information to the second terminal, the sending unit is specifically configured to:
when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code;
acquiring auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to the second terminal; or the server acquires shared information set corresponding to the operation identifier based on the operation identifier, and sends the shared information to the second terminal.
19. An apparatus for information sharing, comprising:
a first sending unit, configured to send sharing information and voice recognition information to a server, and trigger the server to perform the following operations: generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint obtained through the voice recognition information, and returning the target identification code to the first terminal;
a second sending unit, configured to send the multimedia data generated based on the target identification code to a second terminal, and trigger the second terminal to perform the following operations: generating a verification identification code based on the obtained multimedia data, and sending the verification identification code to the server, wherein the verification identification code is used for sending the shared information to the second terminal when the server determines that the verification identification code is successfully associated with the target identification code;
the voice recognition information is a voice password, the multimedia data comprises a plurality of voice passwords, and the verification identification code is obtained by the second terminal after the following operations are executed: converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; the verification voice is determined according to the voice password corresponding to the shared information needing to be downloaded.
20. The apparatus as claimed in claim 19, wherein when sending the sharing information and the voice recognition information to the server, the first sending unit is specifically configured to:
sending sharing information and a voice password to a server, and taking the voice password as voice recognition information; alternatively, the first and second electrodes may be,
and sending shared information to a server, and text information or/and voiceprint obtained by analyzing the voice password by the first terminal, and taking the text information or/and the voiceprint as voice recognition information.
21. The apparatus of claim 20, wherein the server is triggered to: based on the voice recognition information, when generating a corresponding target identification code corresponding to the shared information, the first sending unit is further configured to:
if the voice password is used as voice recognition information, triggering the server to execute the following operations: analyzing the voice password to obtain corresponding text information or/and voiceprint, and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint; alternatively, the first and second electrodes may be,
if the text information or/and voiceprint is/are used as the voice recognition information, triggering the server to execute the following operations: and generating a corresponding target identification code corresponding to the shared information based on the text information or/and the voiceprint.
22. An apparatus for information sharing, comprising:
a receiving unit, configured to receive multimedia data sent by a first terminal, where the multimedia data is obtained by a server performing the following operations: receiving and storing the sharing information and the voice recognition information uploaded by the first terminal, generating a corresponding target identification code corresponding to the sharing information based on text information or/and voiceprint obtained through the voice recognition information, returning the target identification code to the first terminal, and triggering the first terminal to generate multimedia data based on the target identification code;
the generating unit is used for converting the multimedia data to obtain the target identification code, verifying text information or/and voiceprint obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful;
a sending unit, configured to send the verification identification code to a server, and trigger the server to perform the following operations: when the verification identification code is successfully associated with the target identification code, the shared information is sent to a second terminal;
the voice recognition information is a voice password, the multimedia data comprises a plurality of voice passwords, and the verification voice is determined according to the voice password corresponding to the shared information needing to be downloaded.
23. The apparatus according to claim 22, wherein, when generating the authentication identification code based on the multimedia data, the generating unit is specifically configured to:
converting the multimedia data to obtain the target identification code, verifying the received text information or/and voiceprint by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after the verification is determined to be successful; alternatively, the first and second electrodes may be,
and converting the multimedia data to obtain the target identification code, verifying text information or/and voice print obtained after analyzing verification voice input by a user by adopting the target identification code, and generating a corresponding verification identification code based on the target identification code after determining that the verification is successful.
24. The apparatus of claim 22 or 23, wherein the server is triggered to: when determining that the verification identification code is successfully associated with the locally stored target identification code, and when sending the shared information set corresponding to the verification identification code to the second terminal, the sending unit is specifically configured to:
triggering the server to perform the following operations: when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring auxiliary operation information of shared information set corresponding to the operation identifier based on the operation identifier, and sending the auxiliary operation information of the shared information to the second terminal; alternatively, the first and second electrodes may be,
triggering the server to perform the following operations: and when the verification identification code is successfully associated with the target identification code, acquiring an operation identifier carried in the target identification code, acquiring shared information set corresponding to the operation identifier based on the operation identifier, and sending the shared information to the second terminal.
CN201610943041.3A 2016-11-01 2016-11-01 Information sharing method and device Active CN108023856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610943041.3A CN108023856B (en) 2016-11-01 2016-11-01 Information sharing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610943041.3A CN108023856B (en) 2016-11-01 2016-11-01 Information sharing method and device

Publications (2)

Publication Number Publication Date
CN108023856A CN108023856A (en) 2018-05-11
CN108023856B true CN108023856B (en) 2020-10-16

Family

ID=62070671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610943041.3A Active CN108023856B (en) 2016-11-01 2016-11-01 Information sharing method and device

Country Status (1)

Country Link
CN (1) CN108023856B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810114B (en) * 2018-05-21 2020-12-18 福建省数字福建云计算运营有限公司 Method and terminal for sharing family cloud disk file
CN109117235B (en) * 2018-08-24 2019-11-05 腾讯科技(深圳)有限公司 A kind of business data processing method, device and relevant device
CN111326150A (en) * 2018-12-13 2020-06-23 南京硅基智能科技有限公司 Departed user simulation voice interaction system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238189A (en) * 2011-08-01 2011-11-09 安徽科大讯飞信息科技股份有限公司 Voiceprint password authentication method and system
CN103532916A (en) * 2012-07-05 2014-01-22 百度在线网络技术(北京)有限公司 Method for acquiring information through voice, mobile terminal and voice information system
CN103905474A (en) * 2012-12-25 2014-07-02 腾讯数码(天津)有限公司 Information sharing method, terminal, server and system
CN105989487A (en) * 2015-02-17 2016-10-05 天津市阿波罗信息技术有限公司 Composition method of mobile phone face recognition payment and voiceprint payment system of off-line shopping

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140359736A1 (en) * 2013-05-31 2014-12-04 Deviceauthority, Inc. Dynamic voiceprint authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238189A (en) * 2011-08-01 2011-11-09 安徽科大讯飞信息科技股份有限公司 Voiceprint password authentication method and system
CN103532916A (en) * 2012-07-05 2014-01-22 百度在线网络技术(北京)有限公司 Method for acquiring information through voice, mobile terminal and voice information system
CN103905474A (en) * 2012-12-25 2014-07-02 腾讯数码(天津)有限公司 Information sharing method, terminal, server and system
CN105989487A (en) * 2015-02-17 2016-10-05 天津市阿波罗信息技术有限公司 Composition method of mobile phone face recognition payment and voiceprint payment system of off-line shopping

Also Published As

Publication number Publication date
CN108023856A (en) 2018-05-11

Similar Documents

Publication Publication Date Title
US9055313B2 (en) Device activation using encoded representation
US10091003B2 (en) Mobile signature embedded in desktop workflow
US10929683B2 (en) Video processing method, apparatus and device
CN106782551B (en) Voice recognition system and method
TWI643135B (en) Method for processing a code map that is not related to related binding information
US20170164027A1 (en) Video recommendation method and electronic device
CN109951743A (en) Barrage information processing method, system and computer equipment
US20130262873A1 (en) Method and system for authenticating remote users
KR20160136400A (en) Method, apparatus, and system for providing a security check
CN108023856B (en) Information sharing method and device
CN108391141B (en) Method and apparatus for outputting information
WO2016192457A1 (en) Ar book and ar-book-based indexed augmented reality system and method
TW201531952A (en) Generating barcode and authenticating based on barcode
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN111404695B (en) Token request verification method and device
CN111966441A (en) Information processing method and device based on virtual resources, electronic equipment and medium
CN106896933B (en) method and device for converting voice input into text input and voice input equipment
US9521467B2 (en) Method and apparatus for program information exchange and communications system using a program comment instruction
US10936705B2 (en) Authentication method, electronic device, and computer-readable program medium
CN110909241B (en) Information recommendation method, user identification recommendation method, device and equipment
EP2761823B1 (en) Methods and apparatuses for electronic message authentication
WO2017185613A1 (en) Method and device for inputting character string, and electronic device
WO2015188478A1 (en) Method, system and device for realizing remote contract signing, and computer storage medium
CN110650083B (en) Message filtering method and device
CN111857901B (en) Data processing method, method for generating session background, electronic device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100053 53a, xibianmennei street, Xuanwu District, Beijing

Patentee after: CHINA MOBILE COMMUNICATION LTD., Research Institute

Patentee after: CHINA MOBILE COMMUNICATIONS GROUP Co.,Ltd.

Address before: 100053 53a, xibianmennei street, Xuanwu District, Beijing

Patentee before: CHINA MOBILE COMMUNICATION LTD., Research Institute

Patentee before: CHINA MOBILE COMMUNICATIONS Corp.

CP01 Change in the name or title of a patent holder