CN110007747B - Control method and control device - Google Patents

Control method and control device Download PDF

Info

Publication number
CN110007747B
CN110007747B CN201910250177.XA CN201910250177A CN110007747B CN 110007747 B CN110007747 B CN 110007747B CN 201910250177 A CN201910250177 A CN 201910250177A CN 110007747 B CN110007747 B CN 110007747B
Authority
CN
China
Prior art keywords
user
information
power
electronic device
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910250177.XA
Other languages
Chinese (zh)
Other versions
CN110007747A (en
Inventor
郝京阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910250177.XA priority Critical patent/CN110007747B/en
Publication of CN110007747A publication Critical patent/CN110007747A/en
Application granted granted Critical
Publication of CN110007747B publication Critical patent/CN110007747B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • G06F1/3293Power saving characterised by the action undertaken by switching to a less power-consuming processor, e.g. sub-CPU
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a control method and a control device, wherein the control method is applied to an electronic device, and the method comprises the following steps: acquiring first information of a user when the electronic equipment is at a first power; determining a response policy of the electronic device to the user when at a second power based on the first information, wherein the first power is greater than the second power. Namely, by acquiring first information of a user when the electronic device is at a first power; a response policy of the electronic device to the user while at a second power can be determined based on the first information, wherein the first power is greater than the second power. That is, the response policy to the user when the electronic device is at the second power can be determined according to the first information of the user when the electronic device operates at the first power, so that the electronic device can interact with the user in a relatively low-power operating state, and the user experience is improved.

Description

Control method and control device
Technical Field
The embodiment of the application relates to the field of intelligent equipment, in particular to a control method and a control device.
Background
Windows Modern Standby is a new technology, which can make PC (personal electronic device) always in active Standby state, which is equivalent to the screen-off state of the mobile phone. In the Modern Standby state, a user can wake up the PC by voice, but because the system is locked, the user can only use voice and the PC to make some simple communication without log-in (entering the system), such as asking weather and asking a calendar, and if more complex requirements are involved (such as searching a map, opening a certain program and the like), log-in entering the system is required to be completed, so that the requirement of interaction between the user and the PC in the screen state is limited.
Content of application
The embodiment of the application provides a control method capable of enriching man-machine interaction content in a screen-off state of electronic equipment and a control device applying the method.
In order to solve the above technical problem, an embodiment of the present application provides the following technical solutions: a control method is applied to an electronic device, and the method comprises the following steps:
acquiring first information of a user when the electronic equipment is at a first power;
determining a response policy of the electronic device to the user when at a second power based on the first information, wherein the first power is greater than the second power.
In some embodiments of the present application, the obtaining first information of the user when the electronic device is at the first power includes:
historical interaction information of a user and the electronic equipment when the electronic equipment is at a first power is obtained, wherein the historical interaction information represents interaction conditions of the user and the electronic equipment.
In some embodiments of the present application, the determining, based on the first information, a response policy of the electronic device to the user when at the second power includes:
determining a function module and/or an application to respond to the user when the electronic device is at a second power based on the historical interaction information.
In some embodiments of the present application, the function module and/or the application program for responding to the user can respond through a control component corresponding to the function module and/or the application program, the control component is different from a central processor of the electronic device, and the control component can work independently from the central processor.
In some embodiments of the present application, the control method further comprises:
receiving a control instruction of a user and identifying identity information of the user;
obtaining a response strategy corresponding to the identity information based on the identity information;
and responding to the control instruction by using a response strategy corresponding to the identity information based on the control instruction.
In some embodiments of the present application, the receiving a manipulation instruction of a user and identifying identity information of the user includes:
acquiring a voice instruction of a user;
and determining the identity information of the user based on the voice instruction.
An embodiment of the present application further provides a control device, including:
the acquisition module is used for acquiring first information of a user when the electronic equipment is at a first power;
a processing module to determine a response policy of the electronic device to the user when at a second power based on the first information, wherein the first power is greater than the second power.
In some embodiments of the present application, the obtaining module is specifically configured to:
historical interaction information of a user and the electronic equipment when the electronic equipment is at a first power is obtained, wherein the historical interaction information represents interaction conditions of the user and the electronic equipment.
In some embodiments of the present application, the processing module is specifically configured to:
determining a function module and/or an application to respond to the user when the electronic device is at a second power based on the historical interaction information.
In some embodiments of the present application, the control device further includes:
the receiving and identifying module is used for receiving a control instruction of a user and identifying identity information of the user;
an obtaining module, configured to obtain, based on the identity information, a response policy corresponding to the identity information;
a response module, configured to respond to the manipulation instruction with a response policy corresponding to the identity information based on the manipulation instruction.
Based on the disclosure of the above embodiments, it can be known that the embodiments of the present application have the following beneficial effects: the method comprises the steps of obtaining first information of a user when the electronic equipment is at a first power; a response policy of the electronic device to the user while at a second power can be determined based on the first information, wherein the first power is greater than the second power. That is, the response policy to the user when the electronic device is at the second power can be determined according to the first information of the user when the electronic device operates at the first power, so that the electronic device can interact with the user in a relatively low-power operating state, and the user experience is improved.
Drawings
Fig. 1 is a flowchart of a control method according to an embodiment of the present application;
fig. 2 is a block diagram of a control device according to an embodiment of the present application.
Detailed Description
Specific embodiments of the present application will be described in detail below with reference to the accompanying drawings, but the present application is not limited thereto.
It will be understood that various modifications may be made to the embodiments disclosed herein. The following description is, therefore, not to be taken in a limiting sense, but is made merely as an exemplification of embodiments. Other modifications will occur to those skilled in the art within the scope and spirit of the disclosure.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely examples of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and structures have not been described in detail so as not to obscure the present disclosure with unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
Hereinafter, embodiments of the present application will be described in detail with reference to the accompanying drawings.
The embodiment of the application provides a control method, which is applied to an electronic device and comprises the following steps:
acquiring first information of a user when the electronic equipment is at a first power;
determining a response policy of the electronic device to the user when at a second power based on the first information, wherein the first power is greater than the second power.
According to the control method, first information of a user when the electronic equipment is at the first power is acquired; a response policy of the electronic device to the user while at a second power can be determined based on the first information, wherein the first power is greater than the second power. That is, the response policy to the user when the electronic device is at the second power can be determined according to the first information of the user when the electronic device operates at the first power, so that the electronic device can interact with the user in a relatively low-power operating state, and the user experience is improved.
In order to understand the above technical solutions more simply and in detail, the following describes the above control method in detail with reference to the embodiments and the accompanying drawings.
As shown in fig. 1, fig. 1 is a flowchart of a control method provided in an embodiment of the present application, where the control method is applied to an electronic device, where the electronic device may be a tablet computer, a notebook computer, a mobile phone, a pda (personal digital assistant), a self-service terminal, and the like, and the control method includes the following steps:
step 101: first information of a user when the electronic equipment is at a first power is acquired. The first information may be information related to the electronic device for performing, and may include, but is not limited to, operation information performed by a user when using the electronic device, preference information during use, image information of the user acquired through a camera of the electronic device, voiceprint information and voice information of the user acquired through a voice acquisition device, fingerprint information acquired through a fingerprint collector, time information and frequency information of using an application program, and the like, which are not specifically limited herein.
In some embodiments of the present application, the obtaining first information of the user when the electronic device is at the first power includes: historical interaction information of a user and the electronic equipment when the electronic equipment is at a first power is obtained, wherein the historical interaction information represents interaction conditions of the user and the electronic equipment. In this embodiment, when obtaining the historical interaction information between the user and the electronic device, obtaining information that can be used to verify the identity of the user, such as one or more of voiceprint information, fingerprint information, and image information, may also be included. For example, taking the electronic device as a computer as an example, the usage information of the user when using the computer in the past may be obtained, and at the same time, one or more of fingerprint information, voiceprint information or image information, which is input when the user logs in the computer, may also be obtained.
Step 102: determining a response policy of the electronic device to the user when at a second power based on the first information, wherein the first power is greater than the second power. When the electronic device is in the first frequency, the electronic device may be in a specific standby mode, and the specific standby mode indicates that a control component of at least a part of function modules and/or application programs in the electronic device is capable of responding to a user, where the control component is different from a central processing unit of the electronic device, and the control component is capable of working independently from the central processing unit.
In some embodiments of the present application, the determining, based on the first information, a response policy of the electronic device to the user when at the second power includes: determining a function module and/or an application to respond to the user when the electronic device is at a second power based on the historical interaction information. The functional module and/or the application program for responding to the user may respectively determine the functional module and/or the application program corresponding to the user for responding to different identity information according to different identity information of the user. As an example, if a user a, a user B, and an office computer of the user a are taken as an example and the computer has a voice collecting device, the user a often uses the office computer, so that the time length and the frequency of the office computer used by the user a are much longer than those of the user B, that is, the time length and the frequency of the use of the user a are higher than those of the user B in the history interactive information of the office computer, in this embodiment, it can be set whether the accumulated time length of the user using the electronic device can reach the preset time length and whether the use frequency reaches the preset frequency, at this time, the user a satisfies the corresponding preset time length and the preset frequency, and the user B does not satisfy one of the corresponding preset time length and the preset frequency, for example, for using a map viewing program in the office computer, when the user A says ' please open the map and plan the route from S to D ' for the office computer ', the office computer displays the map and plans the corresponding route on the map, and if the user B says ' please open the map and plan the route from S to D ', the office computer does not respond.
In some embodiments of the present application, the function module and/or the application program for responding to the user can respond through a control component corresponding to the function module and/or the application program, the control component is different from a central processor of the electronic device, and the control component can work independently from the central processor. As an example, when the electronic device is a notebook computer, the corresponding functional module and/or application program may be any one of a document, a camera, and a speaker, where in the case of the document, the document may open a file in a read-only manner to respond to a user for reference, in the case of the camera, the camera may respond to the user in a manner of being capable of taking pictures, recognizing images, or taking pictures, and in the case of the speaker, the speaker may play music while responding to an instruction of the user.
In some embodiments of the present application, the control method further comprises: receiving a control instruction of a user and identifying identity information of the user; obtaining a response strategy corresponding to the identity information based on the identity information; and responding to the control instruction by using a response strategy corresponding to the identity information based on the control instruction. The response policy corresponding to the identity information may be a functional module and/or an application program capable of performing operations corresponding to the identity information, and a response mode of the functional module and/or the application program capable of performing responses to the user operation. As an example, taking a user a and a user b respectively use a computer, the computer has a document read-write function, a camera function and a speaker function, if the user a uses the computer with a higher frequency and a longer duration, and the user b uses the computer with a lower frequency and a shorter duration, then after the computer receives the operation instruction of the user a and recognizes the identity of the user a, it may be determined that the user a can use the document read-write function and edit the document, and at the same time, it may also use the camera function and the speaker function of the computer, and after the computer receives the operation instruction of the user b and recognizes the identity of the user b, it may be determined that the user b can use the document read-write function and the speaker function as well and cannot use the camera function, and the user b can only use the document read-only function in the document read-write function, but cannot edit the document, or may determine that the user b cannot use the document read-write function and only allow the user b to use the speaker function. That is, it may be that an application having a higher security level is allowed to be used only by a user having a higher authority user identity based on the user identity information. In addition, as another example, if the user a uses an office computer with a camera function in a public area, if the user a frequently uses the office computer to review files, when the user a arrives at the office computer, an operation instruction may be issued through a sliding gesture or a body shake, so that the camera module of the office computer acquires an instruction formed by the sliding gesture or the body shake, and then the user a is identified (may be facial identified) through the camera module, and then the identity information of the user a is determined, and a response policy corresponding to the identity information of the user a is obtained, if the frequency of document review by the user a using the office computer is very high and exceeds a preset frequency value, then the office computer may directly display a corresponding interface capable of document review on a display screen, for the user A to consult; when the user B uses the office computer in the public area, because the user B does not use the office computer frequently or the user B is a new employee, after the camera module of the office computer obtains an instruction formed by a sliding gesture or a body shaking of the user B, the user B is also identified (for facial identification) by the camera module, so as to determine the identity information of the user B and obtain a response policy corresponding to the identity information of the user B.
In some embodiments of the present application, the receiving a manipulation instruction of a user and identifying identity information of the user includes: acquiring a voice instruction of a user; and determining the identity information of the user based on the voice instruction. The electronic equipment has a voice acquisition function, acquires voiceprint information of a user in the process that the user uses the electronic equipment, and can identify the voiceprint information of the user based on the voice instruction of the user when the user sends the voice instruction to the electronic equipment so as to determine the identity of the user. For example, when a user uses a search application, a voice instruction "e.g. opening XX search application" may be directly issued to an electronic device (e.g. a notebook computer), the electronic device receives the voice instruction and determines identity information of the user, and if the XX search application can respond to the identity information of the user, the XX search application responds to the voice instruction of the user and opens the XX search application.
An embodiment of the present application further provides a control device, as shown in fig. 2, including:
the electronic device comprises an acquisition module 1, a power control module and a power control module, wherein the acquisition module is used for acquiring first information of a user when the electronic device is at a first power;
a processing module 2, configured to determine, based on the first information, a response policy of the electronic device to the user when the electronic device is at a second power, wherein the first power is greater than the second power.
In some embodiments of the present application, the obtaining module 1 is specifically configured to: historical interaction information of a user and the electronic equipment when the electronic equipment is at a first power is obtained, wherein the historical interaction information represents interaction conditions of the user and the electronic equipment.
In some embodiments of the present application, the processing module 2 is specifically configured to: determining a function module and/or an application to respond to the user when the electronic device is at a second power based on the historical interaction information.
In some embodiments of the present application, the function module and/or the application program for responding to the user can respond through a control component corresponding to the function module and/or the application program, the control component is different from a central processor of the electronic device, and the control component can work independently from the central processor.
In some embodiments of the present application, the control device further includes: the receiving and identifying module is used for receiving a control instruction of a user and identifying identity information of the user; an obtaining module, configured to obtain, based on the identity information, a response policy corresponding to the identity information; a response module, configured to respond to the manipulation instruction with a response policy corresponding to the identity information based on the manipulation instruction.
In some embodiments of the present application, the receiving identification module is further configured to: acquiring a voice instruction of a user through an acquisition module 1; and determining the identity information of the user based on the voice instruction.
Since the control device described in this embodiment is a control device corresponding to the control method in this embodiment, a specific implementation of the control device and various modifications thereof in this embodiment can be understood by those skilled in the art based on the control method in this embodiment, and therefore, a detailed description of the control device is omitted here. The control device of the control method in the embodiments of the present application is within the scope of the protection of the present application as long as the person skilled in the art implements the control method.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processing module of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing module of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above embodiments are only exemplary embodiments of the present application, and are not intended to limit the present application, and the protection scope of the present application is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present application and such modifications and equivalents should also be considered to be within the scope of the present application.

Claims (6)

1. A control method is applied to an electronic device, and the method comprises the following steps:
acquiring first information of a user when the electronic equipment is at a first power, wherein the first information comprises historical interaction information of the user and the electronic equipment and information which can be used for verifying the identity of the user;
determining, based on the first information, a response policy of the electronic device to the user when at a second power, wherein the first power is greater than the second power;
wherein determining a response policy of the electronic device to the user while at the second power based on the first information comprises:
and respectively determining the functional modules and/or the application programs corresponding to the users for responding to different identity information according to different identity information of the users based on the historical interaction information.
2. The control method according to claim 1, wherein the function module and/or application program for responding to the user can respond through a control component corresponding to the function module and/or application program, the control component being different from a central processor of the electronic device, the control component being capable of working independently from the central processor.
3. The control method according to claim 1, further comprising:
receiving a control instruction of a user and identifying identity information of the user;
obtaining a response strategy corresponding to the identity information based on the identity information;
and responding to the control instruction by using a response strategy corresponding to the identity information based on the control instruction.
4. The control method according to claim 3, wherein the receiving of the user's manipulation instruction and the identifying of the user's identity information comprises:
acquiring a voice instruction of a user;
and determining the identity information of the user based on the voice instruction.
5. A control device, comprising:
the electronic device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring first information of a user when the electronic device is at a first power, and the first information comprises historical interaction information of the user and the electronic device and information which can be used for verifying the identity of the user;
a processing module to determine a response policy of the electronic device to the user when at a second power based on the first information, wherein the first power is greater than the second power;
wherein determining a response policy of the electronic device to the user while at the second power based on the first information comprises:
and respectively determining the functional modules and/or the application programs corresponding to the users for responding to different identity information according to different identity information of the users based on the historical interaction information.
6. The control device of claim 5, further comprising:
the receiving and identifying module is used for receiving a control instruction of a user and identifying identity information of the user;
an obtaining module, configured to obtain, based on the identity information, a response policy corresponding to the identity information;
a response module, configured to respond to the manipulation instruction with a response policy corresponding to the identity information based on the manipulation instruction.
CN201910250177.XA 2019-03-29 2019-03-29 Control method and control device Active CN110007747B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910250177.XA CN110007747B (en) 2019-03-29 2019-03-29 Control method and control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910250177.XA CN110007747B (en) 2019-03-29 2019-03-29 Control method and control device

Publications (2)

Publication Number Publication Date
CN110007747A CN110007747A (en) 2019-07-12
CN110007747B true CN110007747B (en) 2021-11-16

Family

ID=67168944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910250177.XA Active CN110007747B (en) 2019-03-29 2019-03-29 Control method and control device

Country Status (1)

Country Link
CN (1) CN110007747B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
JP2016149069A (en) * 2015-02-13 2016-08-18 株式会社リコー Information processing device, information processing system, information processing method, information processing program, and storage medium
CN107222914A (en) * 2017-06-14 2017-09-29 广东欧珀移动通信有限公司 Application control method and related product
CN108205616A (en) * 2016-12-16 2018-06-26 北京小米移动软件有限公司 Identity information method of calibration and device
CN109388224A (en) * 2018-09-26 2019-02-26 广东小天才科技有限公司 A kind of power consumption optimization method of smart machine, system and smart machine

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012018657A (en) * 2010-06-11 2012-01-26 Nintendo Co Ltd Information processing terminal, information processing system, and information processing program
JP2012121194A (en) * 2010-12-07 2012-06-28 Ricoh Co Ltd Image forming apparatus, operation control method, and program
CN108898046B (en) * 2018-04-25 2022-03-11 努比亚技术有限公司 Method for controlling power consumption of fingerprint under screen, terminal and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
JP2016149069A (en) * 2015-02-13 2016-08-18 株式会社リコー Information processing device, information processing system, information processing method, information processing program, and storage medium
CN108205616A (en) * 2016-12-16 2018-06-26 北京小米移动软件有限公司 Identity information method of calibration and device
CN107222914A (en) * 2017-06-14 2017-09-29 广东欧珀移动通信有限公司 Application control method and related product
CN109388224A (en) * 2018-09-26 2019-02-26 广东小天才科技有限公司 A kind of power consumption optimization method of smart machine, system and smart machine

Also Published As

Publication number Publication date
CN110007747A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
TWI684886B (en) Method and device for generating security problems and identity verification
CN104270404B (en) A kind of login method and device based on terminal iidentification
DE102016125494A1 (en) The secure execution of speech features using context-sensitive signals
CN109684047A (en) Event-handling method, device, equipment and computer storage medium
CN107437416A (en) A kind of consultation service processing method and processing device based on speech recognition
US9131374B1 (en) Knowledge-based authentication for restricting access to mobile devices
US8121359B2 (en) Fingerprint identification system and method of an electronic device
CN103729120A (en) Method for generating thumbnail image and electronic device thereof
US9854439B2 (en) Device and method for authenticating a user of a voice user interface and selectively managing incoming communications
CN104899490A (en) Terminal positioning method and user terminal
CN107622246B (en) Face recognition method and related product
CN105338391A (en) Intelligent television control method and mobile terminal
CN104078045B (en) Identifying method and electronic device
CN109272320A (en) Personal identification method, device and equipment based on user behavior characteristics
CN103809854A (en) Data processing method and electronic equipment
CN107655154A (en) Terminal control method, air conditioner and computer-readable recording medium
CN110290280B (en) Terminal state identification method and device and storage medium
CN110546641B (en) Access control method and device, intelligent device and storage medium
EP3826008A1 (en) Voice processing method and apparatus, storage medium, and electronic device
CN111370004A (en) Man-machine interaction method, voice processing method and equipment
CN113342170A (en) Gesture control method, device, terminal and storage medium
CN113065879A (en) Data stream quality inspection method and system
CN110007747B (en) Control method and control device
US20150248548A1 (en) Increasing access security with time since last access
CN108874467A (en) A kind of application function starting method, apparatus and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant