CN110888724A - Method and device for setting personal differentiation, electronic equipment and readable storage medium - Google Patents

Method and device for setting personal differentiation, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN110888724A
CN110888724A CN201911143195.4A CN201911143195A CN110888724A CN 110888724 A CN110888724 A CN 110888724A CN 201911143195 A CN201911143195 A CN 201911143195A CN 110888724 A CN110888724 A CN 110888724A
Authority
CN
China
Prior art keywords
application
setting
instruction
target
splitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911143195.4A
Other languages
Chinese (zh)
Other versions
CN110888724B (en
Inventor
张雅萍
周荣刚
谭北平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Beijing Mininglamp Software System Co ltd
Original Assignee
Beihang University
Beijing Mininglamp Software System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University, Beijing Mininglamp Software System Co ltd filed Critical Beihang University
Priority to CN201911143195.4A priority Critical patent/CN110888724B/en
Publication of CN110888724A publication Critical patent/CN110888724A/en
Application granted granted Critical
Publication of CN110888724B publication Critical patent/CN110888724B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present application relates to the field of terminal technologies, and in particular, to a method and an apparatus for setting a personal identification number, an electronic device, and a readable storage medium. The method and the device have the advantages that the body-splitting application of the target application is created under the current system by responding to the trigger event for splitting the target application, the corresponding setting can be carried out on the body-splitting application by responding to the setting instruction for the created body-splitting application, the setting instruction comprises the instruction for setting the awakening verification information of the body-splitting application, and further, the body-splitting application is displayed under the current system so as to be used by the user who passes the awakening verification. Based on the mode, a plurality of personal applications of the target application can be additionally arranged on the same system, so that different users can use different personal applications through the awakening verification information set by the users, and the safety of the privacy information of the users can be guaranteed while the operation steps are simplified.

Description

Method and device for setting personal differentiation, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method and an apparatus for setting a personal identification number, an electronic device, and a readable storage medium.
Background
The voice interaction equipment is equipment with a voice interaction function, and a user can interact with the equipment through voice. In recent years, more and more devices with voice interaction functions are used, and the voice interaction devices are widely applied, such as intelligent sound boxes, intelligent televisions, intelligent refrigerators, intelligent air conditioners and the like.
In daily life, the same voice interaction device can be used by a plurality of family members and sometimes by visitors, however, each family member may have own setting preference when using the voice interaction device, and the user can record the use trace in the device after using, and the preference and the record may contain the privacy information of the user, so that the privacy of the user may be leaked.
In order to improve the security of the user privacy information, two sets of systems are usually arranged on the voice interaction device, but in the actual operation process, the two sets of systems cannot meet the requirements of more than two persons for using the voice interaction device, and the user needs to frequently switch the systems, which causes inconvenience in the user operation process.
Disclosure of Invention
In view of this, an object of the embodiments of the present application is to provide a method and an apparatus for setting a personal identification number, an electronic device, and a readable storage medium, which can ensure security of private information of a user while simplifying operation steps.
Mainly comprises the following aspects:
in a first aspect, an embodiment of the present application provides a method for setting a body by body, where the method for setting a body by body includes:
in response to a trigger event for separating a target application, creating a separate application of the target application under a current system;
responding to a setting instruction for the created body-divided application, and performing corresponding setting on the body-divided application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application;
and displaying the self-body application under the current system so as to wake up the user passing the verification to use the self-body application.
In one possible embodiment, the triggering event includes any one of the following events:
clicking an event of the body separating icon;
receiving an event of a voice instruction for separating the target application;
and receiving an event of a gesture instruction for separating the target application.
In a possible embodiment, the wake-up verification information includes one of the following information:
voiceprint authentication information; wake up word verification information; digital password authentication information; gesture verification information; fingerprint authentication information.
In one possible embodiment, the gesture verification information includes any one of the following information:
knocking the target part by preset times;
and holding the target part with preset force.
In a possible embodiment, the setting instruction further includes an instruction to perform a functional modification on the avatar application; the responding to the setting instruction of the created self-body-separating application, and correspondingly setting the self-body-separating application, wherein the setting instruction comprises the following steps:
starting or closing the target function on a function name list interface; or the like, or, alternatively,
dragging the function icon of the target function into or out of the split application; or the like, or, alternatively,
pressing the function icon for a long time, and adding or deleting the target function; or the like, or, alternatively,
and adding or deleting the target function through a voice instruction.
In a possible implementation, the body-splitting setting method further includes:
and matching a corresponding operation mode according to the setting of the personal application.
In a possible implementation, the body-splitting setting method further includes:
and in response to a deletion instruction of the body-divided application, deleting the application icon of the body-divided application and deleting the data generated by the body-divided application.
In a second aspect, an embodiment of the present application further provides a setting device for separating body, where the setting device for separating body includes:
the system comprises a creating module, a processing module and a processing module, wherein the creating module is used for responding to a trigger event for dividing a target application and creating the divided application of the target application under a current system;
the setting module is used for responding to a setting instruction for the created body-divided application and carrying out corresponding setting on the body-divided application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application;
and the display module is used for displaying the self-body-splitting application under the current system so as to enable a user who passes the awakening verification to use the self-body-splitting application.
In one possible embodiment, the triggering event includes any one of the following events:
clicking an event of the body separating icon;
receiving an event of a voice instruction for separating the target application;
and receiving an event of a gesture instruction for separating the target application.
In a possible embodiment, the wake-up verification information includes one of the following information:
voiceprint authentication information; wake up word verification information; digital password authentication information; gesture verification information; fingerprint authentication information.
In one possible embodiment, the gesture verification information includes any one of the following information:
knocking the target part by preset times;
and holding the target part with preset force.
In a possible embodiment, the setting instruction further includes an instruction to perform a functional modification on the avatar application; the setting module is used for correspondingly setting the personal application according to the following steps:
starting or closing the target function on a function name list interface; or the like, or, alternatively,
dragging the function icon of the target function into or out of the split application; or the like, or, alternatively,
pressing the function icon for a long time, and adding or deleting the target function; or the like, or, alternatively,
and adding or deleting the target function through a voice instruction.
In a possible embodiment, the body-splitting setting device further includes:
and the matching module is used for matching the corresponding operation mode according to the setting of the personal application.
In a possible embodiment, the body-splitting setting device further includes:
and the deleting module is used for responding to a deleting instruction of the self-body application, deleting the application icon of the self-body application and deleting the data generated by the self-body application.
In a third aspect, an embodiment of the present application further provides an electronic device, including: a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, the processor and the memory communicate with each other through the bus when the electronic device runs, and the machine-readable instructions are executed by the processor to perform the steps of the avatar setting method according to the first aspect or any one of the possible implementation manners of the first aspect.
In a fourth aspect, this application provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program performs the steps of the method for setting the avatar according to the first aspect or any one of the possible implementation manners of the first aspect.
In the embodiment of the application, the body-splitting application of the target application is created under the current system by responding to the trigger event for splitting the body of the target application, and corresponding setting can be performed on the body-splitting application by responding to the setting instruction for the created body-splitting application, wherein the setting instruction comprises an instruction for setting the awakening verification information of the body-splitting application, and further, the body-splitting application is displayed under the current system so as to be used by a user who passes the awakening verification. Based on the mode, a plurality of personal applications of the target application can be additionally arranged on the same system, so that different users can use different personal applications through the awakening verification information set by the users, and the safety of the privacy information of the users can be guaranteed while the operation steps are simplified.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating a method for setting a split setting according to an embodiment of the present application;
fig. 2 is a functional block diagram of a separation setting device according to an embodiment of the present application;
fig. 3 shows a second functional block diagram of a setup device according to an embodiment of the present application;
fig. 4 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Description of the main element symbols:
in the figure: 200-setting up the device according to the body; 210-a creation module; 220-setting the module; 230-a display module; 240-matching module; 250-a deletion module; 400-an electronic device; 410-a processor; 420-a memory; 430-bus.
Detailed Description
To make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for illustrative and descriptive purposes only and are not used to limit the scope of protection of the present application. Additionally, it should be understood that the schematic drawings are not necessarily drawn to scale. The flowcharts used in this application illustrate operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be performed out of order, and that steps without logical context may be performed in reverse order or concurrently. One skilled in the art, under the guidance of this application, may add one or more other operations to, or remove one or more operations from, the flowchart.
In addition, the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
To enable those skilled in the art to utilize the present disclosure, the following embodiments are presented in conjunction with a specific application scenario "personal setting", and it will be apparent to those skilled in the art that the general principles defined herein may be applied to other embodiments and application scenarios without departing from the spirit and scope of the present disclosure.
The method, apparatus, electronic device or computer-readable storage medium described in the embodiments of the present application may be applied to any scenario that requires the avatar setting, and the embodiments of the present application do not limit specific application scenarios, and any scheme that uses the method and apparatus provided in the embodiments of the present application is within the scope of the present application.
It is worth noting that before the application is provided, in the existing scheme, two sets of systems are arranged on the voice interaction device, however, in the actual operation process, the two sets of systems cannot meet the requirement that more than two persons use the voice interaction device, and the user needs to frequently switch the systems, which causes inconvenience in the user operation process.
In view of the above problems, in the embodiment of the present application, a split application of a target application is created in a current system in response to a trigger event for splitting the target application, and a setting instruction for the created split application is responded, so that the split application can be set correspondingly, where the setting instruction includes an instruction for setting wake-up verification information of the split application, and further, the split application is displayed in the current system, so that a user who passes wake-up verification uses the split application. Based on the mode, a plurality of personal applications of the target application can be additionally arranged on the same system, so that different users can use different personal applications through the awakening verification information set by the users, and the safety of the privacy information of the users can be guaranteed while the operation steps are simplified.
It should be noted that the voice interaction device is a device with a voice interaction function, and a user can interact with such a device through voice. In recent years, more and more devices with voice interaction functions are used, and the voice interaction devices are widely applied, such as intelligent sound boxes, intelligent televisions, intelligent refrigerators, intelligent air conditioners and the like. In daily life, the same voice interaction device can be used by a plurality of family members and sometimes by visitors, each family member can have own setting preference when using the voice interaction device, a user can record a use trace on the device after using the voice interaction device, and the preference and the record can contain privacy information of the user, so that the privacy of the user is possibly leaked. By the adoption of the method for setting the personal individuation, one voice interaction device can serve as a device common to all family members, and an independent personal individuation application can be set for each family member, so that not only can one device meet the private and public requirements of all family members, but also the requirement of using the voice interaction device under the condition that the family privacy is not revealed when a visitor visits at home.
For the convenience of understanding of the present application, the technical solutions provided in the present application will be described in detail below with reference to specific embodiments.
Fig. 1 is a flowchart of a split setting method according to an embodiment of the present application. As shown in fig. 1, the method for setting a personal identification in an embodiment of the present application includes the following steps:
s101: and in response to a trigger event for separating the target application, creating a separate application of the target application under the current system.
In specific implementation, when a trigger event for separating the target application operated by a user is detected, the separate application of the target application is created under the current system in response to the trigger event. Here, the target application may be an application installed on the voice interaction device, and the created avatar application of the target application is the same sub-application as the target application.
Here, only one avatar application may be created at a time, or multiple avatar applications may be created at the same time, specifically, when the target application is created, a number setting option may pop up on a display screen of the voice interaction device, and a user may set the number setting option as needed. The user can set a name for the self-service application, so that the user can identify the self-service application created by the user according to the set name.
It should be noted that, by creating at least one body-splitting application identical to the target application on the voice interaction device, a voice interaction device can be used as a device common to all family members, and an independent body-splitting application can be set for each family member, so that not only can one device meet the private and public requirements of all family members, but also the requirement of using the voice interaction device without revealing the family privacy when a visitor visits at home. In addition, according to the scheme provided by the application, at least one body-separated application is created in the same system of the voice interaction device, namely the body-separated application and the target application are installed in the same system, a user can use different body-separated applications and target applications without switching the system, and the safety of privacy information of the user can be guaranteed while operation steps are simplified.
Further, the trigger event includes any one of the following events: clicking an event of the body separating icon; receiving an event of a voice instruction for separating the target application; and receiving an event of a gesture instruction for separating the target application.
In specific implementation, there may be multiple triggering events for triggering the body-splitting of the target application, specifically, a body-splitting icon may be preset on the voice interaction device, where the body-splitting icon is used to create the body-splitting application of the target application, and thus, when an event that the body-splitting icon is clicked is detected, the creation of the body-splitting application of the target application is triggered; the voice instruction for triggering the creation of the body-divided application of the target application can also be preset, and when the received voice instruction for performing body division on the target application is the same as the preset voice instruction, the creation of the body-divided application of the target application is triggered; and a gesture instruction for triggering the creation of the body-splitting application of the target application can be preset, and when the received gesture instruction for carrying out body splitting on the target application is the same as the preset gesture instruction, the creation of the body-splitting application of the target application is triggered.
It should be noted that the application provides that multiple trigger events can trigger the creation of the avatar application of the target application, so that the diversity of trigger modes can be improved, a user can trigger different trigger events to realize the creation of the avatar application of the target application, and the experience of the user is improved.
S102: responding to a setting instruction for the created body-divided application, and performing corresponding setting on the body-divided application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application.
In specific implementation, after the build of the body-divided application of the target application is completed, when a setting instruction for the built body-divided application is received, the setting instruction is responded, and the body-divided application is set according to the setting instruction, here, the setting instruction can be an instruction for setting the wake-up verification information of the body-divided application, a user can wake up the body-divided application through the wake-up verification information set by the user, the user can be understood as encrypting the body-divided application, and only the user who knows the wake-up verification information for waking up the body-divided application can wake up the body-divided application, so that the user can control and operate the voice interaction device by using the body-divided application.
Further, the wake-up verification information includes one of the following information: voiceprint authentication information; wake up word verification information; digital password authentication information; gesture verification information; fingerprint authentication information.
In specific implementation, the scheme provides multiple wake-up verification modes, the verification modes comprise a voiceprint verification mode, a wake-up word verification mode, a digital password verification mode and a gesture verification mode, different users can select different wake-up verification modes to wake up and encrypt the personal application, of course, different users can also select the same wake-up verification mode to verify, specifically, the user can wake up the personal application through corresponding verification information, namely, only the user who passes the wake-up verification can use the personal application, and therefore, each personal application can be used by one user, and the purpose of protecting the privacy of the user is achieved.
It should be noted that the voiceprints of different users are different, so that the identity of the user can be verified through the voiceprints, and when the pre-stored verification voiceprint corresponding to the body-splitting application is matched with the voiceprint sent by the current user, the body-splitting application can be awakened, so that the user can control the voice interaction device through the body-splitting application; different user-set wake-up words are different, so that the identity of the user can be verified through the wake-up words, and the split application can be woken up only when the pre-stored wake-up words corresponding to the split application are the same as the wake-up words provided by the current user, so that the user can control the voice interaction device through the split application; the digital passwords set by different users are different, so that the identity of the user can be verified through the digital passwords, and the personal application can be awakened when the pre-stored digital password corresponding to the personal application is the same as the digital password provided by the current user, so that the user can control the voice interaction equipment through the personal application; different gestures set by different users are different, so that the identity of the user can be verified through the gestures, and the personal application can be awakened when the pre-stored gesture corresponding to the personal application is the same as the gesture provided by the current user, so that the user can control the voice interaction equipment through the personal application; the fingerprints set by different users are different, so that the identity of the user can be verified through the fingerprints, and the personal application can be awakened only when the pre-stored fingerprint corresponding to the personal application is the same as the fingerprint provided by the current user, so that the user can control the voice interaction device through the personal application.
It should be further noted that the target application can be used by a plurality of users, and for users with privacy security requirements, the target application can create self-owned applications, so that not only can one voice interaction device meet the private and public requirements of all family members, but also the requirement of using the voice interaction device under the condition of not revealing the family privacy when a visitor visits at home.
Further, the gesture verification information includes any one of the following information: knocking the target part by preset times; and holding the target part with preset force.
In specific implementation, the gesture verification information may be that a target portion of the voice interaction device is tapped for a preset number of times, and then, the user may wake up the corresponding body-divided application by tapping the target portion of the voice interaction device, where the preset number of times may be set according to actual needs, for example, tapping the voice interaction device three times, tapping the voice interaction device two times, and the like; the gesture verification information may also be that the target portion of the voice interaction device is held with a preset force, and then the user may wake up the corresponding body-separated application by holding the target portion of the voice interaction device.
It should be noted that the gesture verification is implemented by installing a pressure sensor and a counting sensor at a position corresponding to a target portion of the voice interaction device.
Further, the setting instruction further comprises an instruction for carrying out function modification on the split application; in step S102, the responding to the setting instruction for the created avatar application performs corresponding setting on the avatar application, including:
starting or closing the target function on a function name list interface; or dragging the function icon of the target function into or out of the body-divided application; or, pressing the function icon for a long time, and adding or deleting the target function; or, the target function is added or deleted through a voice instruction.
In a specific implementation, a user may further modify a function of the avatar application, where the function modification includes function addition and/or function deletion, and when the avatar application is initially created, the function of the avatar application is the same as that of the target application, and the user may add and delete part of the function on this basis.
It should be noted that, on the basis of all functions of the voice interaction device, a user may add a commonly used/desired function to the avatar application in multiple ways, or delete a function that is not desired to be used in the avatar application from the avatar application in multiple ways, so as to meet a setting requirement of the user for preferences.
S103: and displaying the self-body application under the current system so as to wake up the user passing the verification to use the self-body application.
In specific implementation, after the created body-separating application is set, the body-separating application can be displayed on the voice interaction device in a graphic mark mode under the current system, so far, the setting of the body-separating application is completed, when the user uses the body-separating application, the user needs to use verification information to verify the identity, and after the verification passes, the body-separating application can be awakened, and then the body-separating application is used for controlling the voice interaction device.
It should be noted that, after the user finishes using the body-separated application, the body-separated application may be exited, and the target application may be exited after the body-separated application is exited first; the target application and the self-service application can also be simultaneously quitted at one time, so that the voice interaction equipment is in a standby state.
Further, the body-splitting setting method further includes: and matching a corresponding operation mode according to the setting of the personal application.
In specific implementation, different operation modes are automatically matched for different personal applications according to the number of functions added to or operated in the personal applications, wherein the operation modes include an energy-saving mode, a normal mode and a high-power mode, and different current supply levels can be set in a power adapter of the voice interaction device, and power supplies of different levels are automatically matched according to the number of functions added to or operated in each personal application, so that the setting of the multi-personal application of the voice interaction device, the energy consumption of which is matched with and can be dynamically adjusted, is obtained.
Further, the body-splitting setting method further includes: and in response to a deletion instruction of the body-divided application, deleting the application icon of the body-divided application and deleting the data generated by the body-divided application.
In a specific implementation, the avatar application may be deleted, for example, when a guest accesses, the avatar application is used and added to the voice interaction device, and when the guest is ready to leave, the guest deletes the avatar application, specifically, the avatar application may be deleted through an application icon of the deleted avatar application, and at the same time, data generated by the avatar application, for example, a browsing trace and the like, may be deleted, so that data occupying a storage space of the voice interaction device may be reduced, and performance of the voice interaction device may be improved.
It should be noted that the deletion of the body-splitting application may be implemented in various ways, including deleting data generated by the body-splitting application through password authentication information, deleting data generated by the body-splitting application through gesture authentication information, and deleting data generated by the body-splitting application through a voice instruction.
It should be noted that, by the method for setting personal individuation provided by the present application, each private individuation application in the voice interaction device can independently record the personal use trace, use preference, and personal private information of the user matching with the dedicated voiceprint of the individuation application; the user can use the function in the personal application independently and can wake up the target application and the personal application at the same time; when the user uses the personal application alone, the function which is not willing to use can be excluded, and the purpose of energy saving and consumption reduction can be realized by self-adaptive matching of energy consumption; when the user simultaneously wakes up the target application and the personal application, the user can use the target application according to personal preference, in addition, the operation steps can be saved by waking up the target application and the dedicated personal application at one time, and the usability of the voice interaction equipment is improved; the requirement that a plurality of users use the same voice interaction device according to own preference can be met, and privacy safety is guaranteed at the same time.
In the embodiment of the application, the body-splitting application of the target application is created under the current system by responding to a trigger event for splitting the body of the target application, and corresponding setting can be performed on the body-splitting application by responding to a setting instruction for the created body-splitting application, wherein the setting instruction comprises an instruction for setting the awakening verification information of the body-splitting application, and further, the body-splitting application is displayed under the current system so as to be used by a user who passes the awakening verification. Based on the mode, a plurality of personal applications of the target application can be additionally arranged on the same system, so that different users can use different personal applications through the awakening verification information set by the users, and the safety of the privacy information of the users can be guaranteed while the operation steps are simplified.
Based on the same application concept, a body-separating setting device corresponding to the body-separating setting method is further provided in the embodiment of the present application, and because the principle of solving the problem of the device in the embodiment of the present application is similar to that of the body-separating setting method in the embodiment of the present application, the implementation of the device can refer to the implementation of the method, and repeated details are omitted.
Referring to fig. 2 and 3, fig. 2 is a functional block diagram of a body-splitting setting device 200 according to an embodiment of the present disclosure; fig. 3 is a second functional block diagram of a setup device 200 according to an embodiment of the present disclosure.
As shown in fig. 2 and 3, the body-separating setting apparatus 200 includes:
the creating module 210 is configured to create an avatar application of a target application under a current system in response to a trigger event for performing avatar on the target application;
a setting module 220, configured to perform corresponding setting on the avatar application in response to a setting instruction for the created avatar application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application;
a display module 230, configured to display the avatar application under the current system, so as to enable a user who has passed the wake-up verification to use the avatar application.
In one possible embodiment, the triggering event includes any one of the following events:
clicking an event of the body separating icon;
receiving an event of a voice instruction for separating the target application;
and receiving an event of a gesture instruction for separating the target application.
In a possible embodiment, the wake-up verification information includes one of the following information:
voiceprint authentication information; wake up word verification information; digital password authentication information; gesture verification information; fingerprint authentication information.
In one possible embodiment, the gesture verification information includes any one of the following information:
knocking the target part by preset times;
and holding the target part with preset force.
In a possible embodiment, the setting instruction further includes an instruction to perform a functional modification on the avatar application; as shown in fig. 2 and fig. 3, the setting module 220 is configured to perform corresponding setting on the avatar application according to the following steps:
starting or closing the target function on a function name list interface; or the like, or, alternatively,
dragging the function icon of the target function into or out of the split application; or the like, or, alternatively,
pressing the function icon for a long time, and adding or deleting the target function; or the like, or, alternatively,
and adding or deleting the target function through a voice instruction.
In one possible embodiment, as shown in fig. 3, the body-splitting setting device 200 further includes:
and the matching module 240 is configured to match the corresponding operation mode according to the setting of the body-splitting application.
In one possible embodiment, as shown in fig. 3, the body-splitting setting device 200 further includes:
a deleting module 250, configured to, in response to a deleting instruction for the avatar application, delete the application icon of the avatar application, and delete data generated by the avatar application.
In this embodiment of the application, the creation module 210 creates the avatar application of the target application under the current system in response to a trigger event for performing avatar segmentation on the target application, the setting module 220 responds to a setting instruction for the created avatar application, and corresponding setting can be performed on the avatar application, where the setting instruction includes an instruction for setting wake-up verification information of the avatar application, and further, the display module 230 displays the avatar application under the current system, so that a user who passes wake-up verification uses the avatar application. Based on the mode, a plurality of personal applications of the target application can be additionally arranged on the same system, so that different users can use different personal applications through the awakening verification information set by the users, and the safety of the privacy information of the users can be guaranteed while the operation steps are simplified.
Based on the same application concept, referring to fig. 4, a schematic structural diagram of an electronic device 400 provided in the embodiment of the present application includes: a processor 410, a memory 420 and a bus 430, wherein the memory 420 stores machine-readable instructions executable by the processor 410, when the electronic device 400 is operated, the processor 410 communicates with the memory 420 via the bus 430, and the machine-readable instructions are executed by the processor 410 to perform the steps of the avatar setting method according to any one of the embodiments.
In particular, the machine readable instructions, when executed by the processor 410, may perform the following:
in response to a trigger event for separating a target application, creating a separate application of the target application under a current system;
responding to a setting instruction for the created body-divided application, and performing corresponding setting on the body-divided application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application;
and displaying the self-body application under the current system so as to wake up the user passing the verification to use the self-body application.
In particular, the machine readable instructions, when executed by the processor 410, may further perform the following:
clicking an event of the body separating icon;
receiving an event of a voice instruction for separating the target application;
and receiving an event of a gesture instruction for separating the target application.
In particular, the machine readable instructions, when executed by the processor 410, may further perform the following:
knocking the target part by preset times;
and holding the target part with preset force.
In particular, the machine readable instructions, when executed by the processor 410, may further perform the following:
starting or closing the target function on a function name list interface; or the like, or, alternatively,
dragging the function icon of the target function into or out of the split application; or the like, or, alternatively,
pressing the function icon for a long time, and adding or deleting the target function; or the like, or, alternatively,
and adding or deleting the target function through a voice instruction.
In particular, the machine readable instructions, when executed by the processor 410, may further perform the following:
and matching a corresponding operation mode according to the setting of the personal application.
In particular, the machine readable instructions, when executed by the processor 410, may further perform the following:
and in response to a deletion instruction of the body-divided application, deleting the application icon of the body-divided application and deleting the data generated by the body-divided application.
In the embodiment of the application, the body-splitting application of the target application is created under the current system by responding to a trigger event for splitting the body of the target application, and corresponding setting can be performed on the body-splitting application by responding to a setting instruction for the created body-splitting application, wherein the setting instruction comprises an instruction for setting the awakening verification information of the body-splitting application, and further, the body-splitting application is displayed under the current system so as to be used by a user who passes the awakening verification. Based on the mode, a plurality of personal applications of the target application can be additionally arranged on the same system, so that different users can use different personal applications through the awakening verification information set by the users, and the safety of the privacy information of the users can be guaranteed while the operation steps are simplified.
Based on the same application concept, embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method for setting the avatar provided in the above embodiments are performed.
Specifically, the storage medium may be a general storage medium, such as a mobile disk, a hard disk, and the like, and when a computer program on the storage medium is executed, the above-mentioned method for setting the self-identity can be executed, so that different users can use different self-identity applications through the wakening verification information set by themselves, and the security of the privacy information of the users can be ensured while the operation steps are simplified.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A body-splitting setting method is characterized by comprising the following steps:
in response to a trigger event for separating a target application, creating a separate application of the target application under a current system;
responding to a setting instruction for the created body-divided application, and performing corresponding setting on the body-divided application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application;
and displaying the self-body application under the current system so as to wake up the user passing the verification to use the self-body application.
2. The split-body setting method according to claim 1, wherein the triggering event comprises any one of the following events:
clicking an event of the body separating icon;
receiving an event of a voice instruction for separating the target application;
and receiving an event of a gesture instruction for separating the target application.
3. The split-body setting method of claim 1, wherein the wake-up verification information comprises one of the following information:
voiceprint authentication information; wake up word verification information; digital password authentication information; gesture verification information; fingerprint authentication information.
4. The avatar setting method according to claim 3, wherein the gesture verification information includes any one of the following information:
knocking the target part by preset times;
and holding the target part with preset force.
5. The avatar setting method of claim 1, wherein the setting instruction further includes an instruction to perform a functional modification on the avatar application; the responding to the setting instruction of the created self-body-separating application, and correspondingly setting the self-body-separating application, wherein the setting instruction comprises the following steps:
starting or closing the target function on a function name list interface; or the like, or, alternatively,
dragging the function icon of the target function into or out of the split application; or the like, or, alternatively,
pressing the function icon for a long time, and adding or deleting the target function; or the like, or, alternatively,
and adding or deleting the target function through a voice instruction.
6. The avatar setting method according to claim 1, further comprising:
and matching a corresponding operation mode according to the setting of the personal application.
7. The avatar setting method according to claim 1, further comprising:
and in response to a deletion instruction of the body-divided application, deleting the application icon of the body-divided application and deleting the data generated by the body-divided application.
8. The utility model provides a setting device of dividing one's body, its characterized in that, setting device of dividing one's body includes:
the system comprises a creating module, a processing module and a processing module, wherein the creating module is used for responding to a trigger event for dividing a target application and creating the divided application of the target application under a current system;
the setting module is used for responding to a setting instruction for the created body-divided application and carrying out corresponding setting on the body-divided application; the setting instruction comprises an instruction for setting the awakening verification information of the personal application;
and the display module is used for displaying the self-body-splitting application under the current system so as to enable a user who passes the awakening verification to use the self-body-splitting application.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the electronic device is operated, the machine-readable instructions when executed by the processor performing the steps of the avatar setting method of any of claims 1 to 7.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, performs the steps of the avatar setting method according to any of claims 1 to 7.
CN201911143195.4A 2019-11-20 2019-11-20 Split setting method and device, electronic equipment and readable storage medium Active CN110888724B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911143195.4A CN110888724B (en) 2019-11-20 2019-11-20 Split setting method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911143195.4A CN110888724B (en) 2019-11-20 2019-11-20 Split setting method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110888724A true CN110888724A (en) 2020-03-17
CN110888724B CN110888724B (en) 2023-05-02

Family

ID=69748111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911143195.4A Active CN110888724B (en) 2019-11-20 2019-11-20 Split setting method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110888724B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468643A (en) * 2020-11-23 2021-03-09 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium
CN112783579A (en) * 2021-01-05 2021-05-11 北京小米松果电子有限公司 Application program control method, device and storage medium
CN112988353A (en) * 2021-03-12 2021-06-18 北京明朝万达科技股份有限公司 Operation control method and device for application program
CN113835663A (en) * 2021-09-24 2021-12-24 北京字节跳动网络技术有限公司 Display control method, device, system, electronic apparatus, medium, and program product

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130111241A1 (en) * 2011-10-26 2013-05-02 Samsung Electronics Co. Ltd. Power saving apparatus and method for mobile terminal
CN105224322A (en) * 2015-09-25 2016-01-06 维沃移动通信有限公司 A kind of attend to anything else method and terminal of application program
CN105404382A (en) * 2015-11-30 2016-03-16 小米科技有限责任公司 Power saving mode setting method and apparatus
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
CN106203036A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 The operation copy hidden method opened based on application and device more
CN106293478A (en) * 2016-08-22 2017-01-04 宇龙计算机通信科技(深圳)有限公司 Application starts method and device
CN106484518A (en) * 2016-10-10 2017-03-08 广东欧珀移动通信有限公司 A kind of display methods, device and terminal for opening application more
CN106502499A (en) * 2016-10-21 2017-03-15 宇龙计算机通信科技(深圳)有限公司 The method and device that a kind of application is opened
CN108337138A (en) * 2018-01-10 2018-07-27 喻建琦 A kind of intelligent domestic system based on Internet of Things
CN109062492A (en) * 2018-07-16 2018-12-21 维沃移动通信有限公司 A kind of application access method and terminal
CN110049537A (en) * 2019-04-23 2019-07-23 广东小天才科技有限公司 Power saving method, device, equipment and storage medium for intelligent wearable equipment
US20210173626A1 (en) * 2019-12-05 2021-06-10 Sap Se Fencing execution of external tools during software changes

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130111241A1 (en) * 2011-10-26 2013-05-02 Samsung Electronics Co. Ltd. Power saving apparatus and method for mobile terminal
CN105224322A (en) * 2015-09-25 2016-01-06 维沃移动通信有限公司 A kind of attend to anything else method and terminal of application program
CN105404382A (en) * 2015-11-30 2016-03-16 小米科技有限责任公司 Power saving mode setting method and apparatus
CN106203036A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 The operation copy hidden method opened based on application and device more
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
CN106293478A (en) * 2016-08-22 2017-01-04 宇龙计算机通信科技(深圳)有限公司 Application starts method and device
CN106484518A (en) * 2016-10-10 2017-03-08 广东欧珀移动通信有限公司 A kind of display methods, device and terminal for opening application more
CN106502499A (en) * 2016-10-21 2017-03-15 宇龙计算机通信科技(深圳)有限公司 The method and device that a kind of application is opened
CN108337138A (en) * 2018-01-10 2018-07-27 喻建琦 A kind of intelligent domestic system based on Internet of Things
CN109062492A (en) * 2018-07-16 2018-12-21 维沃移动通信有限公司 A kind of application access method and terminal
CN110049537A (en) * 2019-04-23 2019-07-23 广东小天才科技有限公司 Power saving method, device, equipment and storage medium for intelligent wearable equipment
US20210173626A1 (en) * 2019-12-05 2021-06-10 Sap Se Fencing execution of external tools during software changes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JON_LO: "Android应用分身的实现和解析" *
MARTINS: "Clone/Duplicate Applications" *
王建阔: "浅谈Android手机的应用双开实现原理及风险" *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468643A (en) * 2020-11-23 2021-03-09 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium
CN112783579A (en) * 2021-01-05 2021-05-11 北京小米松果电子有限公司 Application program control method, device and storage medium
CN112988353A (en) * 2021-03-12 2021-06-18 北京明朝万达科技股份有限公司 Operation control method and device for application program
CN113835663A (en) * 2021-09-24 2021-12-24 北京字节跳动网络技术有限公司 Display control method, device, system, electronic apparatus, medium, and program product

Also Published As

Publication number Publication date
CN110888724B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN110888724A (en) Method and device for setting personal differentiation, electronic equipment and readable storage medium
EP3493056B1 (en) Information displaying method for terminal device, and terminal device
US9075967B2 (en) Mobile device security using multiple profiles
CN112802468B (en) Interaction method and device of automobile intelligent terminal, computer equipment and storage medium
CN111831099B (en) Electronic device
WO2019019816A1 (en) Method and device for reducing power consumption of mobile terminal, storage medium and mobile terminal
US20140189604A1 (en) Method and system for unlocking a touchscreen of an electronic device
CN107450839B (en) Control method and device based on black screen gesture, storage medium and mobile terminal
US20130326582A1 (en) Above-lock notes
WO2015057466A1 (en) Secure remote modification of device credentials using device-generated credentials
WO2017118317A1 (en) Information image display method, a barcode payment method, and device
CN103488481A (en) Application program control method, terminal equipment and remote control system
CN104834449A (en) Mobile terminal icon managing method and device
WO2019184631A1 (en) Information processing method and apparatus, computer-readable storage medium, and terminal
CN105956436A (en) Permission control method of application program, and terminal
CN107423585A (en) The concealed application method and system of a kind of application
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN106170794A (en) A kind of information processing method and mobile terminal
JP2019523466A (en) Method and apparatus for unlocking terminal screen
WO2016131181A1 (en) Fingerprint event processing method, apparatus, and terminal
KR20050063174A (en) Personal terminal with multiple password system and control method thereof
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN112580095B (en) Data display method, device, computer equipment and storage medium
CN108021350A (en) A kind of terminal output volume method of adjustment and system
CN103207972A (en) Device and method for recovering and analyzing login password of computer operation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant