CN109547990B - Method and device for controlling terminal unlocking, computer equipment and storage medium - Google Patents

Method and device for controlling terminal unlocking, computer equipment and storage medium Download PDF

Info

Publication number
CN109547990B
CN109547990B CN201811543683.XA CN201811543683A CN109547990B CN 109547990 B CN109547990 B CN 109547990B CN 201811543683 A CN201811543683 A CN 201811543683A CN 109547990 B CN109547990 B CN 109547990B
Authority
CN
China
Prior art keywords
unlocking
voice data
terminal
unlocking control
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811543683.XA
Other languages
Chinese (zh)
Other versions
CN109547990A (en
Inventor
余晓晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811543683.XA priority Critical patent/CN109547990B/en
Publication of CN109547990A publication Critical patent/CN109547990A/en
Application granted granted Critical
Publication of CN109547990B publication Critical patent/CN109547990B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The application relates to a method, a device, computer equipment and a storage medium for controlling unlocking of a terminal, wherein the method relates to the technical field of terminal security, and the method comprises the following steps: acquiring a current Bluetooth search list; when the device identification corresponding to the unlocking control device exists in the Bluetooth searching list and the distance between the unlocking control device and the terminal is smaller than or equal to a preset threshold value, establishing a Bluetooth connection relation between the unlocking control device and the Bluetooth searching list; initiating a voice matching request to the unlocking control equipment; receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request; and when the unlocking voice data is matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal. By adopting the method, the privacy security of the terminal can be improved.

Description

Method and device for controlling terminal unlocking, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for controlling unlocking of a terminal, a computer device, and a computer-readable storage medium.
Background
At present, a common method for unlocking a screen of a user terminal is generally unlocking by using a password, the password unlocking not only requires a user to remember the password, but also has the risk of stealing the password, once the password is stolen, information in the user terminal is stolen, so that a large potential safety hazard exists, and the user is required to input the password during unlocking every time, so that the operation is complicated.
The mode of utilizing user's sound information to unblock has appeared at present, when unblock at every turn, needs the user to type one section pronunciation, unlocks after comparing the pronunciation of type-in and user's voiceprint characteristic, but this kind of mode has following problem: lawless persons may forge voice data of users or steal voice data of users to unlock terminals, and privacy security of terminals cannot be guaranteed.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a computer device and a storage medium for controlling unlocking of a terminal, which can improve security of privacy of the terminal.
A method for controlling unlocking of a terminal, the method comprising:
acquiring a current Bluetooth search list;
when the Bluetooth search list has a device identifier corresponding to the unlocking control device and the distance between the unlocking control device and the terminal is smaller than or equal to a preset threshold value, determining that the distance between the unlocking control device and the terminal is smaller than or equal to the preset threshold value
Establishing a Bluetooth connection relation with the unlocking control equipment;
initiating a voice matching request to the unlocking control equipment;
receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
and when the unlocking voice data is matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal.
In one embodiment, before the step of obtaining the current bluetooth search list, the method further comprises:
when an authorization operation instruction for designating unlocking control equipment is detected, displaying a latest Bluetooth pairing list according to the authorization operation instruction;
acquiring the equipment identifier selected from the latest Bluetooth pairing list;
and taking the Bluetooth equipment corresponding to the selected equipment identification as unlocking control equipment.
In one embodiment, after the step of receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request, the method further comprises:
calling a voice acquisition module on the terminal;
acquiring voice data input by a current user through the voice acquisition module;
matching the recorded voice data with unlocking voice data fed back by the unlocking control equipment;
when the unlocking voice data is matched with the voice data acquired from the local, the triggering of the instruction for unlocking the terminal comprises the following steps:
and when the recorded voice data is matched with unlocking voice data fed back by the unlocking control equipment, triggering an instruction for unlocking the terminal.
In one embodiment, after the step of triggering the instruction for unlocking the terminal, the method further comprises:
carrying out voice recognition on the recorded voice data to obtain corresponding characters;
extracting keywords matched with a locally installed application program from the characters;
generating a calling instruction for calling the application program according to the keyword;
and directly calling the application program according to the calling instruction and displaying a main interface of the application program.
In one embodiment, the method further comprises:
when the recorded voice data is not matched with the unlocking voice data fed back by the unlocking control equipment, prompting the current user to record the voice data again;
returning to the step of executing the calling of the voice acquisition module on the terminal until the recorded voice data is matched with the unlocking voice data fed back by the unlocking control equipment;
and when the recorded latest voice data is not matched with the unlocking voice data fed back by the unlocking control equipment and the matching times reach the preset times, prompting the current user to delay the unlocking operation.
In one embodiment, after the step of receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request, the method further comprises:
acquiring a user account for logging in a locally specified application program;
determining a user identifier associated with the user account;
sending a voice assistance unlocking request to a user terminal which logs in the application program by the user identification;
when receiving the assistant unlocking voice data fed back by the user terminal, then
Extracting voiceprint features from the unlocking-assisting voice data;
matching the extracted voiceprint features with unlocking voice data fed back by the unlocking control equipment;
when the unlocking voice data is matched with the voice data acquired from the local, the triggering of the instruction for unlocking the terminal comprises the following steps:
and when the unlocking voice data is matched with the extracted voiceprint characteristics, triggering an instruction for unlocking the terminal.
In one embodiment, after the step of triggering the instruction for unlocking the terminal, the method further includes:
triggering screen locking countdown when the Bluetooth connection is detected to be disconnected;
and when the screen locking countdown is finished, executing an instruction for locking the screen of the terminal.
An apparatus for controlling unlocking of a terminal, the apparatus comprising:
the acquisition module is used for acquiring a current Bluetooth search list;
the connection module is used for establishing a Bluetooth connection relation with the unlocking control equipment when an equipment identifier corresponding to the unlocking control equipment exists in the Bluetooth search list and the distance between the unlocking control equipment and the terminal is less than or equal to a preset threshold value;
the request module is used for initiating a voice matching request to the unlocking control equipment;
the receiving module is used for receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
and the unlocking module is used for triggering an instruction for unlocking the terminal when the unlocking voice data is matched with the voice data acquired from the local.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
acquiring a current Bluetooth search list;
when the device identification corresponding to the unlocking control device exists in the Bluetooth search list and the distance between the unlocking control device and the terminal is smaller than or equal to a preset threshold value, determining that the distance between the unlocking control device and the terminal is smaller than or equal to the preset threshold value
Establishing a Bluetooth connection relation with the unlocking control equipment;
initiating a voice matching request to the unlocking control equipment;
receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
and when the unlocking voice data is matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring a current Bluetooth search list;
when the device identification corresponding to the unlocking control device exists in the Bluetooth search list and the distance between the unlocking control device and the terminal is smaller than or equal to a preset threshold value, determining that the distance between the unlocking control device and the terminal is smaller than or equal to the preset threshold value
Establishing a Bluetooth connection relation with the unlocking control equipment;
initiating a voice matching request to the unlocking control equipment;
receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
and when the unlocking voice data is matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal.
According to the method, the device, the computer equipment and the storage medium for controlling the terminal to be unlocked, the current Bluetooth search list is obtained, when the equipment identification corresponding to the unlocking control equipment exists in the Bluetooth search list and the distance between the unlocking control equipment and the terminal is smaller than or equal to the preset threshold value, the Bluetooth connection relation between the Bluetooth search list and the unlocking control equipment is established, and therefore the Bluetooth connection with the unlocking control equipment which is within the preset distance range from the terminal can only be established during unlocking. Further, the terminal initiates a voice matching request to the unlocking control device, receives unlocking voice data fed back by the unlocking control device, and automatically triggers an instruction for unlocking the terminal when the received unlocking voice data is matched with the voice data acquired from the local, so that the terminal is automatically unlocked. Compared with the situation that unlocking is directly carried out by comparing voiceprint characteristics, the method and the device match the locally acquired voice data with the unlocking voice data fed back by the unlocking control device, can ensure the safety of the unlocking voice data serving as a matching standard, and therefore improve the privacy safety of the terminal.
Drawings
Fig. 1 is an application scenario diagram of a method for controlling unlocking of a terminal in an embodiment;
fig. 2 is a schematic flowchart of a method for controlling unlocking of a terminal in one embodiment;
fig. 3 is a schematic flowchart of a method for controlling unlocking of a terminal in another embodiment;
FIG. 4 is a block diagram of an apparatus for controlling unlocking of a terminal according to an embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for controlling unlocking of the terminal can be applied to the application environment shown in fig. 1. Wherein, the terminal 102 communicates with the unlocking control device 104 through the network through the bluetooth signal. The terminal 102 may obtain a current bluetooth search list, when a device identifier corresponding to the unlocking control device 104 exists in the bluetooth search list and a distance between the unlocking control device 104 and the terminal 102 is smaller than or equal to a preset threshold, the terminal 102 may establish a bluetooth connection with the unlocking control device 104 and initiate a voice matching request to the unlocking control device 104, the terminal 102 receives unlocking voice data fed back by the unlocking control device 104 in response to the voice matching request, and when the unlocking voice data matches with the voice data obtained locally, the terminal 102 automatically triggers an instruction for unlocking the terminal 102. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the unlocking control device 104 may be, but is not limited to, a smart headset with a bluetooth function, a smart watch, smart glasses, a smart bracelet, and the like.
In one embodiment, as shown in fig. 2, a method for controlling unlocking of a terminal is provided, which is described by taking the application of the method to the terminal 102 in fig. 1 as an example, and includes the following steps:
in step 202, a current bluetooth search list is obtained.
The Bluetooth search list comprises device identifications of connectable Bluetooth devices. Specifically, in this embodiment, when the terminal is in the screen lock state, the bluetooth of the terminal may be turned on, the terminal may directly receive bluetooth signals sent by each nearby bluetooth device, and obtain device identifiers of each bluetooth device according to the bluetooth signals, where the device identifiers form a bluetooth search list, and the terminal may obtain a bluetooth search list formed by the device identifiers of the currently latest connectable bluetooth devices.
And 204, when the device identification corresponding to the unlocking control device exists in the Bluetooth search list and the distance between the unlocking control device and the terminal is less than or equal to a preset threshold value, establishing a Bluetooth connection relation with the unlocking control device.
The unlocking control device is a bluetooth device used for unlocking the terminal, and the unlocking control device can be a preset device designated by a user in advance. The terminal can compare the device identification in the Bluetooth search list with the device identification corresponding to the unlocking control device, when the device identification corresponding to the unlocking control device exists in the Bluetooth search list, the terminal judges the distance between the terminal and the unlocking control device, and when the distance between the terminal and the unlocking control device is smaller than or equal to a preset threshold value, bluetooth connection is established between the terminal and the unlocking control device. In the process of establishing Bluetooth connection, the terminal sends a connection request to the unlocking control device, the connection request is used for connecting the terminal and the unlocking control device through Bluetooth, the connection request comprises a Bluetooth address of the unlocking control device, the unlocking control device extracts the Bluetooth address from the connection request after receiving the connection request, the extracted Bluetooth address is judged to be the same as the Bluetooth address of the unlocking control device, and if yes, the terminal is connected with the terminal through the Bluetooth.
In some embodiments, the terminal may directly obtain the device identifier input in the interface for adding the unlocking control device, and use the bluetooth device corresponding to the device identifier as the unlocking control device for unlocking the current terminal.
In some embodiments, prior to the step 202 of obtaining a current bluetooth search listing, the method further comprises: when an authorized operation instruction for designating unlocking control equipment is detected, displaying a latest Bluetooth pairing list according to the authorized operation instruction; acquiring an equipment identifier selected from the latest Bluetooth pairing list; and taking the Bluetooth equipment corresponding to the selected equipment identification as unlocking control equipment.
The bluetooth pairing list is a list formed by device identifications of bluetooth devices which establish bluetooth connection with the terminal. The terminal can add the device identifier corresponding to the bluetooth device to the bluetooth pairing list after establishing bluetooth connection with the bluetooth device each time. Specifically, when detecting an authorized operation instruction for designating an unlocking control device, the terminal displays the latest bluetooth pairing list, acquires an input device identifier selected from the latest bluetooth pairing list, and takes the bluetooth device corresponding to the device identifier as the unlocking control device.
In some embodiments, the terminal may also store the device identifier corresponding to the device in the bluetooth pairing list after establishing bluetooth connection with one device each time, prompt the user whether to continue an authorization operation for specifying unlocking of the control device, and if the user selects yes, perform a step of presenting the latest bluetooth pairing list to the user according to the authorization operation instruction.
It can be understood that the process of designating the unlocking control device is to essentially store the device identifier of one bluetooth device in correspondence with the current terminal to form a correspondence. Because the unlocking control device is a preset device which is designated by a user in advance and is a trusted device, if the device identification corresponding to the unlocking control device does not exist in the current Bluetooth search list, the whole process is ended, and the terminal is not triggered to be automatically unlocked. In order to ensure that the unlocking control equipment is the equipment which is currently visible for the user and further ensure the safety of the unlocking control equipment, if the distance between the unlocking control equipment and the terminal is greater than a preset threshold value, the whole process is ended, and the terminal is not triggered to be automatically unlocked.
The preset condition regarding the distance between the unlocking control apparatus and the terminal may be that the distance is less than a preset threshold value. For example, it may be less than 0.2 to 0.5 m.
In some embodiments, the terminal may estimate the distance according to the strength of the bluetooth signal sent by the unlocking control device, and specifically, the distance between the terminal and the unlocking control device may be estimated according to the following formula:
Figure BDA0001908824420000071
wherein d represents the distance between the terminal and the unlocking control equipment, RSSI represents the strength of the received Bluetooth signal sent by the unlocking control equipment, A represents the signal strength when the unlocking control equipment is 1 meter away from the terminal, and n represents an environmental attenuation factor which can be obtained through testing.
Step 206, a voice matching request is initiated to the unlock control device.
Further, before the step 206 of initiating the voice matching request to the unlocking control device, the terminal may also detect a current device state, if the current device state is a locked state, a data matching request is initiated to the currently connected unlocking control device, and if the current device state is an unlocked state, no other operation needs to be performed, and the entire process is ended.
And step 208, receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request.
Wherein the unlock voice data is voice data for use as a security verification condition. In the present embodiment, the unlock voice data is data fed back by the unlock control device currently connected to the terminal in response to the voice matching request transmitted by the terminal. It is to be understood that the unlocking voice data is data stored in advance on the unlocking control device designated by the user, the unlocking voice data may be one or more pieces, and the unlocking voice data may also include voice data of different persons. In some embodiments, the user may enter a plurality of pieces of unlocking voice data, and in step 210, the terminal may match the locally acquired voice data with each piece of unlocking voice data, and as long as any one of the pieces of unlocking voice data can be successfully matched, trigger an instruction for unlocking the terminal.
Step 210, when the unlocking voice data is matched with the voice data acquired from the local, an instruction for unlocking the terminal is triggered.
Specifically, the terminal may match the unlocking voice data with the voice data acquired from the local after obtaining the unlocking voice data fed back by the unlocking control device, and if the matching is successful, the terminal automatically triggers an unlocking instruction. If the matching cannot be successfully carried out, the whole process is ended, and an instruction for unlocking the terminal is not triggered.
The matching process may be matching the voiceprint feature corresponding to the unlocked voice data with the voiceprint feature of the voice data locally acquired from the terminal, or matching the text content corresponding to the unlocked voice data with the text content of the voice data locally acquired.
In one embodiment, after the step of triggering the instruction for unlocking the terminal, the method further includes: when the disconnection of the Bluetooth connection is detected, triggering screen locking countdown; and when the screen locking countdown is finished, executing a screen locking instruction for the terminal.
Specifically, after the terminal is unlocked, the terminal can monitor whether the Bluetooth connection is disconnected, and when the unlocking control device closes the Bluetooth function or the Bluetooth signal sent by the unlocking control device is weaker, the Bluetooth connection is disconnected for a certain time length, the terminal can be triggered to automatically lock the screen.
According to the method for controlling the terminal to be unlocked, the current Bluetooth search list is obtained, when the equipment identification corresponding to the unlocking control equipment exists in the Bluetooth search list and the distance between the unlocking control equipment and the terminal is smaller than or equal to the preset threshold value, bluetooth connection is established with the unlocking control equipment, and therefore the condition that during unlocking, bluetooth connection can only be established with the unlocking control equipment within the preset distance range from the terminal is limited. Further, the terminal initiates a voice matching request to the unlocking control device, receives unlocking voice data fed back by the unlocking control device, and automatically triggers an instruction for unlocking the terminal when the received unlocking voice data is matched with the voice data acquired from the local, so that the terminal is automatically unlocked. Compared with the situation that unlocking is directly carried out by comparing voiceprint characteristics, the method and the device match the locally acquired voice data with the unlocking voice data fed back by the unlocking control device, can ensure the safety of the unlocking voice data serving as a matching standard, and therefore improve the privacy safety of the terminal.
In one embodiment, after the step of receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request, the method further comprises: calling a voice acquisition module on the terminal; acquiring voice data input by a current user through a voice acquisition module; matching the recorded voice data with unlocking voice data fed back by the unlocking control equipment; when the unlocking voice data is matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal comprises the following steps: and when the recorded voice data are matched with unlocking voice data fed back by the unlocking control equipment, triggering an instruction for unlocking the terminal.
Specifically, the voice data acquired locally by the terminal may be temporarily entered. The terminal can call a voice acquisition module on the terminal after receiving unlocking voice data fed back by the unlocking control equipment, and acquires voice data input by a current user through a semantic acquisition module, wherein the voice acquisition module can be a microphone on the terminal. Therefore, the terminal can match the currently recorded voice data with the unlocking voice data fed back by the unlocking control equipment, and when the matching is successful, an instruction for unlocking the terminal is triggered.
In the above embodiment, matching the recorded voice data with the unlocking voice data fed back by the unlocking control device may be matching voiceprint features, or matching specific contents of voice.
In one embodiment, after the step of triggering the instruction for unlocking the terminal, the method further comprises: carrying out voice recognition on the recorded voice data to obtain corresponding characters; extracting keywords matched with the locally installed application program from the characters; generating a calling instruction for calling the application program according to the keyword; and directly calling the application program according to the calling instruction and displaying the main interface of the application program.
Specifically, the method further comprises the step of directly calling an application program on the terminal after triggering the instruction for unlocking the terminal. The terminal can perform voice recognition on the recorded voice data, convert the voice data into corresponding characters, and extract keywords matched with the locally installed application program from the characters. For example, the voice data is converted into a corresponding text, namely a "phone number of dad", and a corresponding application program is an "address book" according to the "phone number" in the text, so that the terminal generates a call instruction for calling the "address book", directly opens the "address book", and displays a main page of the "address book" to the user.
In one embodiment, the method further comprises: when the recorded voice data are not matched with the unlocking voice data fed back by the unlocking control equipment, prompting the current user to record the voice data again; returning to the step of executing the voice acquisition module on the calling terminal until the recorded voice data is matched with the unlocking voice data fed back by the unlocking control equipment; and when the recorded latest voice data is not matched with the unlocking voice data fed back by the unlocking control equipment and the matching times reach the preset times, prompting the current user to delay the unlocking operation.
In the above embodiment, the current user may enter voice data for multiple times according to a prompt of the terminal, and the terminal may match the voice data entered each time with the unlocking voice data fed back by the unlocking control device. If the matching times reach the preset times, the terminal can prompt the current user to delay unlocking operation and does not trigger automatic unlocking to ensure the safety of the terminal.
In one embodiment, after the step of receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request, the method further comprises: acquiring a user account for logging in a locally specified application program; determining a user identifier associated with a user account; sending a voice assistance unlocking request to a user terminal logging in an application program by using a user identifier; when assisted unlocking voice data fed back by a user terminal is received, extracting voiceprint features from the assisted unlocking voice data; matching the extracted voiceprint features with unlocking voice data fed back by the unlocking control equipment; when the unlocking voice data is matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal comprises the following steps: and when the unlocking voice data is matched with the extracted voiceprint characteristics, triggering an instruction for unlocking the terminal.
In this embodiment, the method further comprises the step of obtaining voice data from the terminal from another user terminal. Wherein the voice-assisted unlocking request is an instruction for requesting assistance in unlocking from a user associated with the current user. Specifically, the terminal may obtain a user account logged in a certain specified local application program, and determine a user identifier associated with the user account, for example, the specified application program may be a social application program, and the user identifier associated with the user account may be a user identifier of a friend who is the user account, so that the terminal may initiate a voice assistance unlocking request to the user terminal that logs in the specified application program with the user identifier, and after receiving the voice assistance unlocking request, the user terminal may feed back assistance unlocking voice data to the terminal. The terminal can extract voiceprint characteristics from the received coordinated unlocking voice data, match the extracted voiceprint characteristics with the voiceprint characteristics of the unlocking voice data fed back by the unlocking control device, and trigger an instruction for unlocking the terminal when the matching is successful.
In a specific embodiment, as shown in fig. 3, the method for controlling unlocking of the terminal specifically includes the following steps:
step 302, detecting an authorized operation for designating an unlocking control device;
step 304, displaying the latest Bluetooth pairing list according to the authorization operation;
step 306, acquiring the equipment identifier selected from the latest Bluetooth pairing list;
step 308, taking the bluetooth device corresponding to the selected device identifier as an unlocking control device;
step 310, acquiring a current Bluetooth search list;
step 312, when the device identifier corresponding to the unlocking control device exists in the bluetooth search list and the distance between the unlocking control device and the terminal is less than or equal to the preset threshold, establishing a bluetooth connection relationship with the unlocking control device;
step 314, initiating a voice matching request to the unlocking control device;
step 316, receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
step 318, calling a voice acquisition module on the terminal;
step 320, collecting voice data input by a current user through a voice collecting module;
step 322, judging whether the recorded voice data is matched with unlocking voice data fed back by the unlocking control equipment, if so, executing step 328; if not, go to step 324;
step 324, when the matching frequency is determined to reach the preset frequency, if yes, go to step 326; if not, return to step 318;
step 326, prompting the current user to delay unlocking operation;
step 328, triggering an instruction for unlocking the terminal;
step 330, performing voice recognition on the recorded voice data to obtain corresponding characters;
step 332, extracting keywords matched with the locally installed application program from the characters;
step 334, generating a calling instruction for calling the application program according to the keyword;
step 336, directly calling the application program according to the calling instruction and displaying a main interface of the application program;
step 338, when detecting that the bluetooth connection is disconnected, triggering screen locking countdown;
and 340, executing a screen locking instruction for the terminal when the screen locking countdown is finished.
According to the method for controlling the terminal to unlock, the current Bluetooth search list is obtained, when the equipment identification corresponding to the unlocking control equipment exists in the Bluetooth search list and the distance between the unlocking control equipment and the terminal is smaller than or equal to the preset threshold value, bluetooth connection is established with the unlocking control equipment, and therefore the condition that Bluetooth connection can only be established with the unlocking control equipment within the preset distance range from the terminal during unlocking is limited. Further, the terminal initiates a voice matching request to the unlocking control device, receives unlocking voice data fed back by the unlocking control device, and automatically triggers an instruction for unlocking the terminal when the received unlocking voice data is matched with the voice data acquired from the local, so that the terminal is automatically unlocked. Compared with the situation that unlocking is directly carried out by comparing voiceprint characteristics, the method and the device match the locally acquired voice data with the unlocking voice data fed back by the unlocking control device, can ensure the safety of the unlocking voice data serving as a matching standard, and therefore improves the privacy safety of the terminal.
It should be understood that, although the steps in the flowcharts of fig. 2 and 3 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 3 may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided an apparatus 400 for controlling unlocking of a terminal, including: an obtaining module 402, a connecting module 404, a requesting module 406, a receiving module 408 and an unlocking module 410, wherein:
an obtaining module 402, configured to obtain a current bluetooth search list;
a connection module 404, configured to establish a bluetooth connection relationship with the unlocking control device when a device identifier corresponding to the unlocking control device exists in the bluetooth search list and a distance between the unlocking control device and the terminal is less than or equal to a preset threshold;
a request module 406, configured to initiate a voice matching request to the unlocking control device;
a receiving module 408, configured to receive unlocking voice data fed back by the unlocking control device in response to the voice matching request;
and an unlocking module 410, configured to trigger an instruction for unlocking the terminal when the unlocking voice data matches the voice data acquired from the local.
In one embodiment, the apparatus 400 for controlling unlocking of a terminal further includes an unlocking control device setting module, configured to, when an authorized operation instruction for designating an unlocking control device is detected; displaying a latest Bluetooth pairing list according to an authorization operation instruction; acquiring an equipment identifier selected from the latest Bluetooth pairing list; and taking the Bluetooth equipment corresponding to the selected equipment identification as unlocking control equipment.
In one embodiment, the apparatus 400 for controlling unlocking of a terminal further includes a voice data entry module, where the voice data entry module is used to call a voice acquisition module on the terminal; acquiring voice data input by a current user through a voice acquisition module; matching the recorded voice data with unlocking voice data fed back by the unlocking control equipment; the unlocking module 410 is further configured to trigger an instruction for unlocking the terminal when the recorded voice data matches the unlocking voice data fed back by the unlocking control device.
In one embodiment, the apparatus 400 for controlling terminal unlocking further includes an application program calling module, where the application program calling module is configured to perform voice recognition on the recorded voice data to obtain corresponding characters; extracting keywords matched with the locally installed application program from the characters; generating a calling instruction for calling the application program according to the keyword; and directly calling the application program according to the calling instruction and displaying the main interface of the application program.
In one embodiment, the voice data entry module is further configured to prompt the current user to enter the voice data again when the entered voice data does not match the unlocking voice data fed back by the unlocking control device; returning to the step of executing the voice acquisition module on the calling terminal until the recorded voice data is matched with the unlocking voice data fed back by the unlocking control equipment; and when the recorded latest voice data is not matched with the unlocking voice data fed back by the unlocking control equipment and the matching times reach the preset times, prompting the current user to delay the unlocking operation.
In one embodiment, the apparatus 400 for controlling unlocking of a terminal further includes a voice data receiving module, where the voice data receiving module is further configured to obtain a user account for logging in a locally specified application; determining a user identifier associated with a user account; sending a voice assistance unlocking request to a user terminal logging in an application program by using a user identifier; when assisted unlocking voice data fed back by a user terminal is received, extracting voiceprint features from the assisted unlocking voice data; matching the extracted voiceprint features with unlocking voice data fed back by the unlocking control equipment; the unlocking module 410 is further configured to trigger an instruction for unlocking the terminal when the unlocking voice data matches the extracted voiceprint feature.
In one embodiment, the apparatus 400 for controlling unlocking of a terminal further includes a screen locking module, where the screen locking module is configured to trigger a screen locking countdown when the disconnection of the bluetooth connection is detected; and when the screen locking countdown is finished, executing a screen locking instruction for the terminal.
The apparatus 400 for controlling unlocking of a terminal obtains a current bluetooth search list, and establishes bluetooth connection with an unlocking control device when a device identifier corresponding to the unlocking control device exists in the bluetooth search list and the distance between the unlocking control device and the terminal is less than or equal to a preset threshold, so that it is limited that bluetooth connection can only be established with the unlocking control device within a preset distance range from the terminal during unlocking. Further, the terminal initiates a voice matching request to the unlocking control device, receives unlocking voice data fed back by the unlocking control device, and automatically triggers an instruction for unlocking the terminal when the received unlocking voice data is matched with the voice data acquired from the local, so that the terminal is automatically unlocked. Compared with the situation that unlocking is directly carried out by comparing voiceprint characteristics, the method and the device match the locally acquired voice data with the unlocking voice data fed back by the unlocking control device, can ensure the safety of the unlocking voice data serving as a matching standard, and therefore improves the privacy safety of the terminal.
For specific limitations of the apparatus 400 for controlling unlocking of a terminal, reference may be made to the above limitations of the method for controlling unlocking of a terminal, and details are not described herein again. The above-mentioned modules in the apparatus 400 for controlling unlocking of a terminal may be implemented in whole or in part by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal 102, the internal structure of which may be as shown in fig. 5. The computer equipment comprises a processor, a memory, a network interface, a Bluetooth interface, a display screen and a voice acquisition device which are connected through a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The bluetooth interface of the computer device is used for communicating with an external terminal through bluetooth connection. The computer program is executed by a processor to implement a method of controlling unlocking of a terminal. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the voice acquisition device of the computer equipment can be a microphone and the like.
It will be appreciated by those skilled in the art that the configuration shown in fig. 5 is a block diagram of only a portion of the configuration associated with the present application, and is not intended to limit the computing device to which the present application may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the apparatus 400 for controlling unlocking of a terminal provided in the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 5. The memory of the computer device may store various program modules constituting the apparatus for controlling unlocking of a terminal 400, such as an acquisition module 402, a connection module 404, a request module 406, a reception module 408 and an unlocking module 410 shown in fig. 4. The computer program constituted by the program modules causes the processor to execute the steps of the method for controlling unlocking of the terminal according to the embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 5 may execute step 202 through the obtaining module 402 in the apparatus 400 for controlling unlocking of a terminal shown in fig. 4. The computer device may perform step 204 through the connection module 404. The computer device may perform step 206 by requesting module 406. The computer device may perform step 208 via the receiving module 408. The computer device may perform step 210 by unlocking module 410.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the above-mentioned steps of the method of controlling unlocking of a terminal. The steps of the method for controlling unlocking of the terminal herein may be steps of the methods for controlling unlocking of the terminal of the various embodiments described above.
In one embodiment, a computer-readable storage medium is provided, which stores a computer program that, when executed by a processor, causes the processor to perform the steps of the above-described method for controlling unlocking of a terminal. The steps of the method for controlling unlocking of the terminal may be steps of the method for controlling unlocking of the terminal in the various embodiments described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for controlling unlocking of a terminal, the method comprising:
acquiring a current Bluetooth search list;
when the device identification corresponding to the unlocking control device exists in the Bluetooth search list and the distance between the unlocking control device and the terminal is smaller than or equal to the threshold value, then
Establishing a Bluetooth connection relation with the unlocking control equipment;
initiating a voice matching request to the unlocking control equipment;
receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
when the unlocking voice data are matched with the voice data acquired from the local, triggering an instruction for unlocking the terminal, wherein the voice data acquired from the local comprise the voice data input by the current user;
carrying out voice recognition on the recorded voice data to obtain corresponding characters;
extracting keywords matched with a locally installed application program from the characters;
generating a calling instruction for calling the application program according to the keyword;
and directly calling the application program according to the calling instruction and displaying a main interface of the application program.
2. The method of claim 1, wherein prior to the step of obtaining the current bluetooth search listing, the method further comprises:
when an authorized operation instruction for appointing to unlock the control equipment is detected, displaying a latest Bluetooth pairing list according to the authorized operation instruction;
acquiring the equipment identifier selected from the latest Bluetooth pairing list;
and taking the Bluetooth equipment corresponding to the selected equipment identification as unlocking control equipment.
3. The method of claim 1, wherein after the step of receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request, the method further comprises:
calling a voice acquisition module on the terminal;
acquiring voice data input by a current user through the voice acquisition module;
matching the recorded voice data with unlocking voice data fed back by the unlocking control equipment;
when the unlocking voice data is matched with the voice data acquired from the local, the triggering of the instruction for unlocking the terminal comprises the following steps:
and when the recorded voice data is matched with unlocking voice data fed back by the unlocking control equipment, triggering an instruction for unlocking the terminal.
4. The method of claim 3, further comprising:
when the recorded voice data is not matched with the unlocking voice data fed back by the unlocking control equipment, prompting the current user to record the voice data again;
returning to the step of executing the calling of the voice acquisition module on the terminal until the recorded voice data is matched with the unlocking voice data fed back by the unlocking control equipment;
and when the recorded latest voice data is not matched with the unlocking voice data fed back by the unlocking control equipment and the matching times reach the preset times, prompting the current user to delay the unlocking operation.
5. The method of claim 1, wherein after the step of receiving unlocking voice data fed back by the unlocking control device in response to the voice matching request, the method further comprises:
acquiring a user account for logging in a locally specified application program;
determining a user identification associated with the user account;
sending a voice assistance unlocking request to a user terminal which logs in the application program by the user identification;
when receiving the assisted unlocking voice data fed back by the user terminal, then
Extracting voiceprint features from the assisted unlocking voice data;
matching the extracted voiceprint features with unlocking voice data fed back by the unlocking control equipment;
when the unlocking voice data is matched with the voice data acquired from the local, the triggering of the instruction for unlocking the terminal comprises the following steps:
and when the unlocking voice data is matched with the extracted voiceprint characteristics, triggering an instruction for unlocking the terminal.
6. The method according to any of claims 1 to 4, characterized in that after the step of triggering an instruction for unlocking the terminal, it further comprises:
triggering screen locking countdown when the Bluetooth connection is detected to be disconnected;
and when the screen locking countdown is finished, executing an instruction for locking the screen of the terminal.
7. An apparatus for controlling unlocking of a terminal, the apparatus comprising:
the acquisition module is used for acquiring a current Bluetooth search list;
the connection module is used for establishing a Bluetooth connection relation with the unlocking control equipment when an equipment identifier corresponding to the unlocking control equipment exists in the Bluetooth search list and the distance between the unlocking control equipment and the terminal is less than or equal to a preset threshold value;
the request module is used for initiating a voice matching request to the unlocking control equipment;
the receiving module is used for receiving unlocking voice data fed back by the unlocking control equipment in response to the voice matching request;
the unlocking module is used for triggering an instruction for unlocking the terminal when the unlocking voice data are matched with the voice data acquired from the local, wherein the voice data acquired from the local comprise the voice data input by the current user;
the application program calling module is used for carrying out voice recognition on the recorded voice data to obtain corresponding characters; extracting keywords matched with a locally installed application program from the characters; generating a calling instruction for calling the application program according to the keyword; and directly calling the application program according to the calling instruction and displaying a main interface of the application program.
8. The apparatus of claim 7, further comprising:
the unlocking control equipment setting module is used for displaying a latest Bluetooth pairing list according to an authorized operation instruction when the authorized operation instruction for appointing unlocking control equipment is detected; acquiring the equipment identifier selected from the latest Bluetooth pairing list; and taking the Bluetooth equipment corresponding to the selected equipment identification as unlocking control equipment.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN201811543683.XA 2018-12-17 2018-12-17 Method and device for controlling terminal unlocking, computer equipment and storage medium Active CN109547990B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811543683.XA CN109547990B (en) 2018-12-17 2018-12-17 Method and device for controlling terminal unlocking, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811543683.XA CN109547990B (en) 2018-12-17 2018-12-17 Method and device for controlling terminal unlocking, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109547990A CN109547990A (en) 2019-03-29
CN109547990B true CN109547990B (en) 2022-11-18

Family

ID=65855224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811543683.XA Active CN109547990B (en) 2018-12-17 2018-12-17 Method and device for controlling terminal unlocking, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109547990B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191206B (en) * 2019-12-23 2023-01-10 东莞宇龙通信科技有限公司 Unlocking verification method and device, storage medium and terminal
CN112566088A (en) * 2020-12-11 2021-03-26 深圳市沃特沃德股份有限公司 Microphone connection method and device of intelligent telephone, computer equipment and storage medium
CN112669585B (en) * 2020-12-15 2022-08-16 广州极飞科技股份有限公司 Method for device pairing, processor, mobile terminal and server
CN115484101A (en) * 2022-09-16 2022-12-16 深圳市齐奥通信技术有限公司 Safe box encryption method and system based on voice voiceprint recognition

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103531200B (en) * 2013-10-29 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Voice unlocking method and terminal
CN106155297B (en) * 2015-04-20 2019-06-21 阿里巴巴集团控股有限公司 A kind of unlocking method and equipment of mobile terminal
CN106023370A (en) * 2016-05-20 2016-10-12 北京小米移动软件有限公司 Unlocking method and device for NFC equipment
CN106653033A (en) * 2016-10-28 2017-05-10 努比亚技术有限公司 Voice unlocking device, terminal and method

Also Published As

Publication number Publication date
CN109547990A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN109547990B (en) Method and device for controlling terminal unlocking, computer equipment and storage medium
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
KR102188983B1 (en) Authentication for application
CN105553928B (en) Communication method, device and system based on biological feature recognition
CN105337997B (en) Login method of application client and related equipment
US11663306B2 (en) System and method for confirming a person's identity
US20160234024A1 (en) Leveraging Multiple Biometrics For Enabling User Access To Security Metadata
EP3130727A1 (en) Locking control device, locking control system, and locking control method
CN110086799B (en) Identity verification method and device
CN109788463B (en) Method and device for controlling terminal unlocking, computer equipment and storage medium
CN108108599B (en) Screen unlocking method based on password, communication terminal and related medium product
CN106126986B (en) Unlocking processing method and device for locked data partition
CN112615722A (en) Smart watch searching method and device, computer equipment and storage medium
CN102722427A (en) Data information backup method and data information backup system
CN105857246A (en) Control method, device and system for automobile starting lock
CN110969727A (en) Method for controlling intelligent door lock, mobile terminal and computer readable storage medium
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN115604707A (en) Natural language user interface
CN113487779A (en) Access control method, access terminal and storage medium
CN111086485A (en) Vehicle door lock control method, vehicle machine and vehicle
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
CN109413034B (en) Application program data display method and device, computer equipment and storage medium
CN113569218B (en) Vehicle-mounted account authorization method and vehicle-mounted terminal
CN112261632B (en) Equipment unlocking method, equipment unlocking device, control system and computer readable medium
CN111559342B (en) Vehicle control method and device and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant