CN112954695A - Method and device for distributing network for sound box, computer equipment and storage medium - Google Patents

Method and device for distributing network for sound box, computer equipment and storage medium Download PDF

Info

Publication number
CN112954695A
CN112954695A CN202110102758.6A CN202110102758A CN112954695A CN 112954695 A CN112954695 A CN 112954695A CN 202110102758 A CN202110102758 A CN 202110102758A CN 112954695 A CN112954695 A CN 112954695A
Authority
CN
China
Prior art keywords
information
target information
network
sound box
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110102758.6A
Other languages
Chinese (zh)
Inventor
卢婉贞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoguang Electric Co Ltd
Original Assignee
Guoguang Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoguang Electric Co Ltd filed Critical Guoguang Electric Co Ltd
Priority to CN202110102758.6A priority Critical patent/CN112954695A/en
Publication of CN112954695A publication Critical patent/CN112954695A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The embodiment of the invention provides a method and a device for distributing a network for sound boxes, computer equipment and a storage medium, wherein the method comprises the following steps: scanning a two-dimensional code configured on the sound box to convert the two-dimensional code into first login information; accessing a wireless access point opened by the sound box according to the first login information so as to establish wireless connection with the sound box; collecting voice signals; carrying out voice recognition on a voice signal to obtain text information; mapping the text information into second login information of the designated network; and sending the second login information to the sound box through wireless connection, wherein the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information. Wireless connection with the loudspeaker box is achieved through code scanning, the obtained second login information is sent to the loudspeaker box, distribution of the loudspeaker box is completed, tedious steps that a user manually operates a button and inputs network information are reduced, convenience of distribution of the loudspeaker box is improved, and distribution efficiency is improved; meanwhile, the interestingness and entertainment of the sound box distribution network are increased, and the user experience is improved.

Description

Method and device for distributing network for sound box, computer equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of sound boxes, in particular to a method and a device for distributing a network for a sound box, computer equipment and a storage medium.
Background
With the development of the internet of things, the networking demand of the intelligent loudspeaker box is gradually increased. In the prior art, the loudspeaker box is connected to the designated network by the following means: the method comprises the steps that an application program corresponding to a sound box is opened in a terminal, the sound box is added to a connecting device on an interface of the application program, the application program prompts a user to input an account number and a password of a designated network, the user manually inputs the account number and the password, the application program sends the account number and the password to the sound box through a mobile phone, and the sound box logs in the network according to the account number and the password. In the process, a user needs to manually operate to connect the sound box to the terminal and manually input an account number and a password of a network on an interface of an application program, so that the problem of complicated steps of a distribution network process can occur, and poor user experience can be caused particularly for special users (old or too small, poor eyesight).
Disclosure of Invention
The embodiment of the invention provides a method and a device for distributing a network for a sound box, computer equipment and a storage medium, and aims to solve the problem that the operation of a user for the network for distributing the sound box is too complicated.
In a first aspect, an embodiment of the present invention provides a method for distributing a network for sound boxes, where the method includes:
scanning a two-dimensional code configured on a sound box to convert the two-dimensional code into first login information;
accessing a wireless access point opened by the sound box according to the first login information to establish wireless connection with the sound box;
collecting voice signals;
carrying out voice recognition on the voice signal to obtain text information;
mapping the text information into second login information of a specified network;
and sending the second login information to the sound box through the wireless connection, wherein the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information.
Optionally, the second login information includes a service set identifier and a password, and the voice signal includes a first target signal and a second target signal;
the collecting voice signal comprises:
playing first prompt information, wherein the first prompt information is used for prompting a user to input a service set identifier;
after the first prompt message is played, collecting a voice signal as a first target signal;
when an interrupt signal is detected in the process of collecting the first target signal, playing second prompt information, wherein the second prompt information is used for prompting a user to input a password;
and after the second prompt message is played, acquiring a voice signal as a second target signal.
Optionally, the text information includes first target information and second target information;
the performing speech recognition on the speech signal to obtain text information includes:
performing voice recognition on the first target signal to obtain first target information representing the service set identifier;
and performing voice recognition on the second target signal to obtain second target information representing the password.
Optionally, the second login information includes a service set identifier and a password, and the text information includes first target information representing the service set identifier and second target information representing the password;
the mapping the text information to second login information of a specified network includes:
identifying a first language type of the first target information;
expanding the first target information according to the first language type;
if the expansion is completed, converting the first target information into a regular expression serving as a service set identifier of a specified network, wherein the regular expression is used for searching the service set identifier matched with the regular expression;
identifying a second language type of second target information;
converting the second target information according to the second language type so as to enable the second target information to conform to the specification of a password;
and if the conversion is finished, setting the second target information as the password of the appointed network.
Optionally, the expanding the first target information according to the first language type includes:
if the first language type is English letters, expanding the first target information into English letters containing capital letters and lowercase letters;
if the first language type is Chinese number, expanding the first target information into Chinese number and Arabic number;
the converting the second target information according to the second language type to make the second target information conform to the specification of the password comprises:
if the second language type is Chinese number, converting the second target information into Arabic number;
if the second language type is a Chinese symbol, converting the second target information into a symbol;
and if the second language type is the combination of the Chinese quantifier and the number, removing second target information representing the Chinese quantifier, and copying the second target information representing the number until the number reaches the Chinese quantifier.
Optionally, the mapping the text information to second login information of a specified network further includes:
searching the password of other previously accessed networks as third target information;
calculating a hamming distance between the third target information and the second target information;
if the hamming distance is smaller than a preset threshold value, extracting a first character and a second character which have differences, wherein the first character is the character of the third target information, and the second character is the character of the second target information;
and if the second character is similar to the first character in pronunciation, setting the third target information as a password of a specified network.
Optionally, the accessing, according to the first login information, the wireless access point opened by the sound box to establish a wireless connection with the sound box includes:
detecting whether a wireless fidelity module is started or not;
if the wireless fidelity module is started, detecting whether to access a wireless fidelity network;
if the wireless fidelity network is accessed, disconnecting the connection with the wireless fidelity network, and accessing a wireless access point opened by the sound box by using the first login information so as to establish wireless connection with the sound box;
if the wireless fidelity network is not accessed, the first login information is used for accessing a wireless access point opened by the sound box so as to establish wireless connection with the sound box;
and if the wireless fidelity module is not started, generating prompt information, wherein the prompt information is used for prompting a user to start the wireless fidelity module and returning to execute whether the detection starts the wireless fidelity module.
In a second aspect, an embodiment of the present invention further provides a device for a distribution network of speakers, where the device includes:
the first login information acquisition module is used for scanning the two-dimensional code configured on the sound box so as to convert the two-dimensional code into first login information;
the wireless connection establishing module is used for accessing a wireless access point opened by the sound box according to the first login information so as to establish wireless connection with the sound box;
the voice signal acquisition module is used for acquiring voice signals;
the voice signal recognition module is used for carrying out voice recognition on the voice signal to obtain text information;
the second login information acquisition module is used for mapping the text information into second login information of the designated network;
and the second login information sending module is used for sending the second login information to the sound box through the wireless connection, and the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information.
Optionally, the second login information includes a service set identifier and a password, and the voice signal includes a first target signal and a second target signal;
the voice signal acquisition module comprises:
the first prompt information playing submodule is used for playing first prompt information, and the first prompt information is used for prompting a user to input a service set identifier;
the first target signal obtaining submodule is used for collecting a voice signal as a first target signal after the first prompt message is played;
the second prompt information playing submodule is used for playing second prompt information when an interrupt signal is detected in the process of acquiring the first target signal, and the second prompt information is used for prompting a user to input a password;
and the second target signal obtaining submodule is used for collecting the voice signal as a second target signal after the second prompt message is played.
Optionally, the text information includes first target information and second target information;
the voice signal recognition module comprises:
a first target information obtaining submodule, configured to perform voice recognition on the first target signal, and obtain first target information indicating the service set identifier;
and the second target information obtaining submodule is used for carrying out voice recognition on the second target signal to obtain second target information representing the password.
Optionally, the second login information includes a service set identifier and a password, and the text information includes first target information representing the service set identifier and second target information representing the password;
the second login information obtaining module includes:
the first language type identification submodule is used for identifying a first language type of the first target information;
the first target information expansion submodule is used for expanding the first target information according to the first language type;
the first target information conversion sub-module is used for converting the first target information into a regular expression as a service set identifier of a specified network if the expansion is completed, and the regular expression is used for searching the service set identifier matched with the regular expression;
the second language type identification submodule is used for identifying a second language type of the second target information;
the second target information conversion submodule is used for converting the second target information according to the second language type so as to enable the second target information to conform to the code specification;
and the second target information setting submodule is used for setting the second target information as the password of the appointed network if the conversion is finished.
Optionally, the first target information expansion sub-module includes:
the English letter expansion unit is used for expanding the first target information into English letters containing capital letters and lowercase letters if the first language type is English letters;
the Chinese number expansion unit is used for expanding the first target information into Chinese numbers and Arabic numbers if the first language type is the Chinese numbers;
the second target information conversion sub-module includes:
a Chinese number conversion unit, configured to convert the second target information into arabic numbers if the second language type is a Chinese number;
a Chinese symbol conversion unit, configured to convert the second target information into a symbol if the second language type is a Chinese symbol;
and the combination conversion unit is used for removing second target information representing the Chinese quantifier and copying the second target information representing the number until the number reaches the Chinese quantifier if the second language type is the combination of the Chinese quantifier and the number.
Optionally, the second login information obtaining module further includes:
a third target information obtaining submodule for searching the password of the other network accessed in advance as third target information;
a Hamming distance calculation submodule for calculating a Hamming distance between the third target information and the second target information;
the character extraction sub-module is used for extracting a first character and a second character which have differences if the Hamming distance is smaller than a preset threshold value, wherein the first character is the character of the third target information, and the second character is the character of the second target information;
and the third target information setting submodule is used for setting the third target information as a password of a specified network if the second character is similar to the first character in pronunciation.
Optionally, the wireless connection establishing module includes:
the first detection submodule is used for detecting whether the wireless fidelity module is started or not;
the second detection submodule is used for detecting whether to access the wireless fidelity network if the wireless fidelity module is started;
the wireless fidelity network disconnection submodule is used for disconnecting the connection with the wireless fidelity network if the wireless fidelity network is accessed, and accessing the wireless access point opened by the sound box by using the first login information so as to establish wireless connection with the sound box;
the wireless access point access sub-module is used for accessing the wireless access point opened by the sound box by using the first login information to establish wireless connection with the sound box if the wireless fidelity network is not accessed;
and the prompt information generation submodule is used for generating prompt information if the wireless fidelity module is not started, and the prompt information is used for prompting a user to start the wireless fidelity module and returning to execute whether the detection starts the wireless fidelity module or not.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
a memory for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the method for distribution of enclosures as described in the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method for configuring a loudspeaker box network according to the first aspect is implemented.
In this embodiment, the two-dimensional code configured on the sound box is scanned to convert the two-dimensional code into first login information, the wireless access point opened by the sound box is accessed according to the first login information to establish wireless connection with the sound box, a voice signal is collected, voice recognition is performed on the voice signal to obtain text information, the text information is mapped to second login information of a specified network, the second login information is sent to the sound box through wireless connection, and the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information. The method comprises the steps that a code scanning mode is adopted to obtain first login information so as to establish wireless connection with a sound box, and after second login information of a specified network is obtained, the second login information can be sent to the sound box through the wireless connection, so that the sound box can log in the network according to the second login information, and therefore the distribution network of the sound box is achieved; the second login information for logging in the designated network is obtained by collecting and identifying the voice signals, so that the interestingness and the entertainment of the sound box distribution network are increased, and the experience of a user is improved.
Drawings
Fig. 1 is a flowchart of a method for distributing a network for sound boxes according to an embodiment of the present invention;
fig. 2 is a flowchart of a distribution network for speakers according to a first embodiment of the present invention;
fig. 3 is a flowchart of a method for distributing a network for sound boxes according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for a distribution network of sound boxes according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a method for configuring a network for a sound box according to an embodiment of the present invention, where the method is applicable to scanning a two-dimensional code of a sound box body to implement a network configuration for the sound box, and the method may be executed by a sound box network configuration device, and the sound box network configuration device may be implemented by software and/or hardware, and may be configured in a computer device, such as a mobile phone, a tablet computer, a wearable device (e.g., a smart watch, smart glasses, and the like).
Fig. 2 provides a flow chart of a speaker distribution network. The user turns on the sound box APP in the mobile phone, clicks the button of scanning and connecting the sound box, the APP displays the scanning frame in the interface, at this time, the user can scan the scanning frame of the mobile phone aiming at the two-dimensional code of the sound box, if the scanning is not successful, the APP prompts the user to 'please scan the two-dimensional code again', if the scanning is successful, the APP detects whether the mobile phone has turned on WiFi (Wireless Fidelity), if not, the user is prompted to turn on WiFi, if the WiFi has been turned on, the user is further detected whether the mobile phone has connected WiFi, because the code is scanned to enable the mobile phone to establish Wireless connection with the sound box, if the mobile phone has connected WiFi, the connection of WiFi is disconnected, the mobile phone can be connected with the sound box, if the WiFi is not connected, the user is prompted to speak the WiFi account number and the password, meanwhile, the APP collects and identifies the voice signal sent by the user, so as to analyze the WiFi account number and the password spoken by the user from the voice signal, further, APP will obtain WiFi account number and password through sweep the wireless connection that sign indicating number and audio amplifier were established and send to the audio amplifier after, disconnection and the wireless connection of audio amplifier to make the audio amplifier can be connected to the appointed wiFi of user based on account number and password of receipt.
The loudspeaker box network distribution method of the embodiment specifically comprises the following steps:
step 101, scanning a two-dimensional code configured on a sound box to convert the two-dimensional code into first login information.
In the present embodiment, the speaker refers to a screened or unshielded speaker including a communication component (including a wireless fidelity module, etc.) that implements a networking function; a two-dimensional code is configured on the body of the sound box, wherein the two-dimensional code comprises first login information of a wireless access point which can be accessed to open the sound box, and the login information comprises a login account and a password of the wireless access point; the APP (Application ) of audio amplifier can be installed to the cell-phone, and the user can open the APP of audio amplifier on the cell-phone when joining in marriage the net to the audio amplifier to scan the two-dimensional code of configuration on the audio amplifier, after APP scans successfully, can convert the two-dimensional code into first login information.
And 102, accessing a wireless access point opened by the sound box according to the first login information to establish wireless connection with the sound box.
After the APP obtains first login information by scanning the two-dimensional code on the sound box, the mobile phone can be accessed into a wireless access point opened by the sound box according to the first login information, and therefore wireless connection between the mobile phone and the sound box is established.
In practical situations, before establishing a Wireless connection with a speaker, the mobile phone needs to determine a current WLAN (Wireless Local Area Network) connection condition. Illustratively, the APP can detect whether the mobile phone starts the wireless fidelity module, and if the wireless fidelity module is started, detect whether the wireless fidelity network is accessed; if the wireless fidelity network is accessed, the connection with the wireless fidelity network is disconnected, and the first login information is used for accessing a wireless access point opened by the sound box so as to establish wireless connection with the sound box; if the wireless fidelity network is not accessed, the first login information is used for accessing a wireless access point opened by the sound box so as to establish wireless connection with the sound box; and if the wireless fidelity module is not started, generating prompt information, wherein the prompt information is used for prompting a user to start the wireless fidelity module and returning to execute to detect whether the wireless fidelity module is started or not.
In addition, in this embodiment, after the sound box is powered on, it is also automatically detected whether the local computer is already connected to the wireless network, if so, the distribution network mode is not started, and if not, the distribution network mode is started. Compared with the traditional loudspeaker box which can start the distribution network mode only by pressing a key, the method reduces the complex operation of a user distribution network, and embodies the intellectualization of the distribution network.
And step 103, collecting voice signals.
In this embodiment, in order to increase interest and entertainment of the user when the audio amplifier is in the network, the APP can acquire the login information of the wireless network by acquiring the voice signal sent by the user and analyzing the voice signal.
Illustratively, after the wireless connection between the mobile phone and the loudspeaker box is established, the user speaks a login account and a login password of the designated network towards the APP, and at this time, the APP can collect the voice signal and obtain the login account and the login password of the designated network from the collected voice signal.
And step 104, performing voice recognition on the voice signals to obtain text information.
In this embodiment, after the APP collects a voice signal sent by a user, the APP performs voice recognition on the voice signal, so as to obtain text information.
And step 105, mapping the text information into second login information of the designated network.
Because voice recognition may have errors, and a difference exists between text information obtained after recognition and texts of the service set identifier and the password of the designated network, the text information can be mapped to obtain second login information of the designated network, the second login information comprises the service set identifier and the password of the designated network, and the sound box can log in the designated network according to the second login information.
And 106, sending the second login information to the sound box through wireless connection, wherein the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information.
After the APP obtains the second login information, the APP sends the second login information to the sound box through the wireless connection established between the mobile phone and the sound box, the sound box breaks the wireless connection with the mobile phone after receiving the second login information, and logs in a user-specified network according to the second login information, so that the operation of a distribution network is completed.
In this embodiment, the two-dimensional code configured on the sound box is scanned to convert the two-dimensional code into first login information, the wireless access point opened by the sound box is accessed according to the first login information to establish wireless connection with the sound box, a voice signal is collected, voice recognition is performed on the voice signal to obtain text information, the text information is mapped to second login information of a specified network, the second login information is sent to the sound box through wireless connection, and the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information. The method comprises the steps that a code scanning mode is adopted to obtain first login information so as to establish wireless connection with a sound box, and after second login information of a specified network is obtained, the second login information can be sent to the sound box through the wireless connection, so that the sound box can log in the network according to the second login information, and therefore the distribution network of the sound box is achieved; the second login information for logging in the designated network is obtained by collecting and identifying the voice signals, so that the interestingness and the entertainment of the sound box distribution network are increased, and the experience of a user is improved.
Example two
Fig. 3 is a flowchart of a network distribution method for a sound box according to a second embodiment of the present invention, where the present embodiment further details an operation of obtaining second login information from a voice signal based on the foregoing embodiment, and the method specifically includes the following steps:
step 301, scanning the two-dimensional code configured on the sound box to convert the two-dimensional code into first login information.
And step 302, accessing a wireless access point opened by the sound box according to the first login information so as to establish wireless connection with the sound box.
And step 303, playing the first prompt message.
The APP can obtain second login information by collecting voice signals sent by a user, wherein the voice signals comprise first target signals and second target signals, the second login information comprises service set identification and passwords, the collected first target signals are used for obtaining the service set identification, and the collected second target signals are used for obtaining the second target signals.
When the APP collects the voice signal of the user, first prompt information can be played, and the first prompt information is used for prompting the user to input a service set identifier.
In an example of this embodiment, the first prompt message may be that "please speak the name of the connection network" is displayed in a pop-up box of the APP interface, or the APP may issue a prompt audio "please speak the name of the connection network". After receiving the first prompt message, the user may speak to the APP the name of the designated network to which the user wants to connect, which is the service set identifier of the network.
And step 304, after the first prompt message is played, acquiring a voice signal as a first target signal.
After the first prompt signal is played, the APP collects voice signals spoken by the user, and the collected voice is used as a first target signal for obtaining a service set identifier for logging in the designated network.
For example, after receiving the first prompt message "please say the name of the connected network", the user says "zgjy underline 68" with the APP, and the APP may use "zgjy underline 68" as the first target signal.
And 305, playing second prompt information when an interrupt signal is detected in the process of collecting the first target signal.
The user can have the pause of short time between the speech signal of saying the service set sign and the password of logging in appointed network, and at this moment, APP can detect the interrupt signal when pausing, if detect the interrupt signal, then show that first target signal gathers the end to play second prompt information, this second prompt information is used for prompting the user to input the password.
In detecting the interrupt signal, a Voice Activity Detection (VAD) method may be adopted, for example, a speech segment may be divided into a silence segment, a transition segment, a speech segment, and an end, and a breakpoint may be detected based on a dual-threshold endpoint of short-time energy and zero-crossing rate. Specifically, a low threshold and a high threshold are set for short-time energy and a zero-crossing rate respectively, in a mute section, if the energy or the zero-crossing rate exceeds the low threshold, a starting point of a voice signal is marked, and a transition section is entered, if the energy or the zero-crossing rate in the transition section exceeds the high threshold, a voice section is entered, and in the voice section, if the energy or the zero-crossing rate is lower than the low threshold and the total duration is greater than the shortest time threshold, an end point of the voice signal is marked, and the voice signal at the end point is an interrupt signal.
It should be noted that the above-mentioned interrupt signal detection method is only an example, and the method for detecting the interrupt signal is not limited in this embodiment.
In an example of this embodiment, the second prompt message may be that "please speak the password for connecting to the network" is displayed in a pop-up box on the APP interface, or the APP sends a prompt audio "please speak the password for connecting to the network," and after receiving the second prompt message, the user may speak the password for the specified network to which the user wants to connect to the APP.
And step 306, after the second prompt message is played, acquiring a voice signal as a second target signal.
After the APP plays the second prompt signal, the APP collects the voice signal spoken by the user, and uses the collected user voice as a second target signal for obtaining a password for logging in the designated network.
Illustratively, after receiving the second prompt message "please say the network connection password", the user speaks "lighting.2020" to the APP, and then the APP takes "lighting.2020" as the second target signal.
Step 307, performing voice recognition on the first target signal to obtain first target information representing the service set identifier.
The APP can perform voice recognition on a voice signal collected by a user, so as to obtain text information, wherein the text information comprises first target information representing service set identification and second target information representing password.
Specifically, the APP performs voice recognition on the first target signal, may obtain first target information indicating a service set identifier, and obtains the service set identifier for logging in the designated network based on the first target information.
And 308, performing voice recognition on the second target signal to obtain second target information representing the password.
The APP can perform voice recognition on the second target signal while recognizing the first target signal, so that second target information representing a password is obtained, and then the password for logging in the designated network can be obtained according to the second target information.
Step 309, identify a first language type of the first target information.
After obtaining the text information including the first target information and the second target information, the APP may obtain second login information of the login-designated network in a mapping manner, where the second login information includes a service set identifier and a password.
Because the first target information is used for representing the service set identification, and the service set identification is formed by arranging and combining Chinese, letters, numbers, symbols and the like, the first language type can be identified for the first target information representing the service set identification, so that the first target information can be correspondingly expanded according to the first language type, and the mapping accuracy is improved.
Step 310, expanding the first target information according to the first language type.
In the present embodiment, the first language type includes english alphabets and chinese numerals, and since the english alphabets may be capital alphabets or small alphabets, the numerals may be chinese numerals or arabic numerals. For the first target information in the text information obtained after the speech recognition by the APP may not be consistent with the service set identifier of the designated network that the user wants to input, and meanwhile, in order to improve the mapping efficiency of the first target information to the service set identifier of the designated network, in this embodiment, the service set identifier of the network may be designated in a fuzzy search manner, specifically, the first target information may be extended according to the first language type, and the extended first target information is searched and matched in the local area network, so as to determine the service set identifier of the login-designated network.
In one example, if the first language type is english alphabets, the first target information is expanded to include upper case and lower case english alphabets; if the first language type is Chinese number, the first target information is expanded into Chinese number and Arabic number. For example, for the first target information "a 03", it may be augmented to "a 03", "a 0 three", "a zero 3", "a zero three", and the like.
Step 311, converting the first target information into a regular expression as a service set identifier of the specified network.
Since the regular expression is a logical formula operating on a character string including general characters (e.g., letters between a and z) and special characters (called "meta characters"), that is, a "regular character string" is formed by using specific characters defined in advance and a combination of the specific characters, and the "regular character string" is used to express a filtering logic for the character string, the regular expression is a text pattern describing one or more character strings to be matched when searching for text. Therefore, in this embodiment, if the expansion is completed, the expanded first target information may be converted into a regular expression, and the regular expression is used as a service set identifier of the specified network, where the regular expression is used to search for a service set identifier matching with the regular expression.
It should be noted that, after the same first target information is expanded, a plurality of regular expressions are obtained, each regular expression can be used as a service set identifier of a specific network, meanwhile, the APP obtains service set identifiers of all networks in a network where the mobile phone is located, matches the regular expression with all the obtained service set identifiers, and if matching is successful, uses a server identifier of the network as a service set identifier of the specific network.
Illustratively, the first target information "a 03" is augmented to obtain "a 03", "a 0 three", "a zero 3", "a zero three", and the like, and the "a 03", "a 0 three", "a zero 3", "a zero three", and the like, which are respectively converted into regular expressions a03, a0 three, a zero 3, a zero three, and the like, service set identifiers of networks where the mobile phone is located are B19, a zero 3, c27, and the like, and when matching, a03 may be used as the service set identifier of the specified network to match with B19, a zero 3, and c27, or a zero 3 may be used as the service set identifier of the specified network to match with B19, a zero 3, and c27, and through the above steps, a zero 3 may be determined as a regular expression that matching is successful, and a zero 3 may be used as the service set identifier of the specified network that is finally determined.
Step 312, identify a second language type of the second target information.
Since the second target information is used for representing the password, and the password can be formed by arranging and combining numbers, letters and symbols, the second language type can be identified for the second target information, so that the second target information can be converted according to the second language type, and the accuracy in voice recognition is improved.
Step 313, converting the second target information according to the second language type.
After the second voice type of the second target information is identified, because the second target information is used for representing the password, and meanwhile, in order to improve the mapping efficiency of the second target information to the password of the designated network, the embodiment may convert the second target information according to the second language type, so that the second target information conforms to the specification of the password, and further improve the mapping accuracy.
Specifically, in one case, if the second language type is chinese numerals, the second target information is converted into arabic numerals. For example, if the second target information includes chinese numerals such as "twelve", "dong", etc., they are converted into arabic numerals "12", "1", respectively.
In another case, if the second language type is a Chinese symbol, the second target information is converted into a symbol. Illustratively, if the second target signal contains "dot" and "underline", the "dot" is converted to "-", and the "underline" is converted to "-".
In another case, if the second language type is a combination of a Chinese quantifier and a number, the second target information representing the Chinese quantifier is removed, and the second target information representing the number is copied until the number reaches the Chinese quantifier. For example, the second target information includes "three 0", the "three" representing the chinese quantifier is removed, and the remaining "0" is copied three times, thereby obtaining "000".
And step 314, setting the second target information as a password of the specified network.
In this embodiment, if the second target information is completely converted according to the second language type, the second target information may be set as a password for specifying a network.
For example, the second target information is "a underline three six", and the converted second target information is "a _ 666", so that "a _ 666" can be used as a password for logging in a specific network.
In order to improve the accuracy of obtaining the password, the embodiment may further obtain the password of the designated network by:
step 315, finding the password of the other network accessed in advance as the third target information.
In practice, the handset may store the service set identification and password of the previously accessed network, and therefore, the voice signal sent by the user may include the password of the previously accessed network.
Therefore, in this embodiment, the APP may search for a password of another network previously accessed and stored in the mobile phone, and use the searched password as the third target information, so as to increase a way of obtaining the password, thereby improving the accuracy of mapping.
And step 316, calculating the Hamming distance between the third target information and the second target information.
The hamming distance is the number of different characters at the corresponding positions of two equal-length character strings, and if the number is smaller, the two character strings are more similar. Therefore, in the present embodiment, after the third target information is obtained, the hamming distance between the third target information and the second target information can be calculated.
Step 317, extracting the first character and the second character with difference.
In this embodiment, a threshold may be preset for the hamming distance, and if the hamming distance is smaller than the preset threshold, it may be considered that the third target information may be a password of a designated network, and at this time, a first character and a second character that are different may be extracted, where the first character is a character of the third target information, and the second character is a character of the second target information.
For example, if the preset threshold is 2, the second target information is "123456", and the third target information is "123789", the calculated hamming distance is 3, and if the calculated hamming distance is greater than the preset threshold 2, the found third target information "123789" is discarded; if the third target information is "123476", the calculated hamming distance is 1, and is less than the preset threshold 2, and then the first character "7" and the second character "5" with differences are extracted from the third target information and the second target, respectively.
And step 318, if the pronunciation of the second character is similar to that of the first character, setting the third target information as the password of the specified network.
In the present embodiment, it is possible for the extracted first character and second character to be similar in pronunciation, and in this case, the third target information may be set as a password specifying a network, such as an upper case "a" and a lower case "a" or the like. It should be noted that the mapping relationship between two characters similar in pronunciation may be preset by a skilled person based on experience.
And 319, sending the second login information to the sound box through wireless connection, wherein the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information.
In this embodiment, the APP may obtain, through steps 303 to 318, second login information including the service set identifier and the password, and further send the second login information to the sound box through the wireless connection established between the mobile phone and the sound box, after receiving the second login information, the sound box disconnects the wireless connection with the mobile phone, and logs in the network specified by the user according to the second login information, thereby implementing the network distribution.
In this embodiment, by playing the first prompt information, after the playing of the first prompt information is completed, acquiring a voice signal as a first target signal, playing the second prompt information when an interrupt signal is detected during the process of acquiring the first target signal, after the playing of the second prompt information is completed, acquiring a voice signal as a second target signal, performing voice recognition on the first target signal and the second target signal respectively to obtain first target information representing a service set identifier and second target information representing a password, expanding the first target information according to the first language type by recognizing the first language type of the first target information, converting the first target information into a regular expression and serving as the service set identifier of the designated network, and simultaneously recognizing the second language type of the second target information, converting the second target information according to the second language type, the second target information is set as the password of the appointed network, so that second login information for the loudspeaker box to login the appointed network is obtained, the passwords of other networks which are accessed in advance are searched to serve as third target information, the Hamming distance between the third target information and the second target information is calculated, the first character and the second character which are different are extracted, and if the second character and the first character are similar in pronunciation, the third target information is set as the password of the appointed network; on the other hand, the accuracy of the second registration information determined from the voice signal is improved by processing each target information by the recognized language type.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
EXAMPLE III
Fig. 4 is a block diagram of a structure of a device for a distribution network of sound boxes according to a third embodiment of the present invention, which may specifically include the following modules:
a first login information obtaining module 401, configured to scan a two-dimensional code configured on a sound box, so as to convert the two-dimensional code into first login information;
a wireless connection establishing module 402, configured to access a wireless access point opened by the sound box according to the first login information to establish a wireless connection with the sound box;
a voice signal collecting module 403, configured to collect a voice signal;
a voice signal recognition module 404, configured to perform voice recognition on the voice signal to obtain text information;
a second login information obtaining module 405, configured to map the text information to second login information of a specified network;
and a second login information sending module 406, configured to send the second login information to the sound box through the wireless connection, where the sound box is configured to disconnect the wireless connection and log in the network according to the second login information.
In one embodiment of the invention, the second login information comprises a service set identifier and a password, and the voice signal comprises a first target signal and a second target signal;
the voice signal collecting module 403 includes:
the first prompt information playing submodule is used for playing first prompt information, and the first prompt information is used for prompting a user to input a service set identifier;
the first target signal obtaining submodule is used for collecting a voice signal as a first target signal after the first prompt message is played;
the second prompt information playing submodule is used for playing second prompt information when an interrupt signal is detected in the process of acquiring the first target signal, and the second prompt information is used for prompting a user to input a password;
and the second target signal obtaining submodule is used for collecting the voice signal as a second target signal after the second prompt message is played.
In one embodiment of the invention, the text information comprises first target information and second target information;
the speech signal recognition module 404 includes:
a first target information obtaining submodule, configured to perform voice recognition on the first target signal, and obtain first target information indicating the service set identifier;
and the second target information obtaining submodule is used for carrying out voice recognition on the second target signal to obtain second target information representing the password.
In one embodiment of the invention, the second login information comprises a service set identifier and a password, and the text information comprises first target information representing the service set identifier and second target information representing the password;
the second login information obtaining module 405 includes:
the first language type identification submodule is used for identifying a first language type of the first target information;
the first target information expansion submodule is used for expanding the first target information according to the first language type;
the first target information conversion sub-module is used for converting the first target information into a regular expression as a service set identifier of a specified network if the expansion is completed, and the regular expression is used for searching the service set identifier matched with the regular expression;
the second language type identification submodule is used for identifying a second language type of the second target information;
the second target information conversion submodule is used for converting the second target information according to the second language type so as to enable the second target information to conform to the code specification;
and the second target information setting submodule is used for setting the second target information as the password of the appointed network if the conversion is finished.
In an embodiment of the present invention, the first target information expansion submodule includes:
the English letter expansion unit is used for expanding the first target information into English letters containing capital letters and lowercase letters if the first language type is English letters;
the Chinese number expansion unit is used for expanding the first target information into Chinese numbers and Arabic numbers if the first language type is the Chinese numbers;
the second target information conversion sub-module includes:
a Chinese number conversion unit, configured to convert the second target information into arabic numbers if the second language type is a Chinese number;
a Chinese symbol conversion unit, configured to convert the second target information into a symbol if the second language type is a Chinese symbol;
and the combination conversion unit is used for removing second target information representing the Chinese quantifier and copying the second target information representing the number until the number reaches the Chinese quantifier if the second language type is the combination of the Chinese quantifier and the number.
In an embodiment of the present invention, the second login information obtaining module 405 further includes:
a third target information obtaining submodule for searching the password of the other network accessed in advance as third target information;
a Hamming distance calculation submodule for calculating a Hamming distance between the third target information and the second target information;
the character extraction sub-module is used for extracting a first character and a second character which have differences if the Hamming distance is smaller than a preset threshold value, wherein the first character is the character of the third target information, and the second character is the character of the second target information;
and the third target information setting submodule is used for setting the third target information as a password of a specified network if the second character is similar to the first character in pronunciation.
In an embodiment of the present invention, the wireless connection establishing module 402 includes:
the first detection submodule is used for detecting whether the wireless fidelity module is started or not;
the second detection submodule is used for detecting whether to access the wireless fidelity network if the wireless fidelity module is started;
the wireless fidelity network disconnection submodule is used for disconnecting the connection with the wireless fidelity network if the wireless fidelity network is accessed, and accessing the wireless access point opened by the sound box by using the first login information so as to establish wireless connection with the sound box;
the wireless access point access sub-module is used for accessing the wireless access point opened by the sound box by using the first login information to establish wireless connection with the sound box if the wireless fidelity network is not accessed;
and the prompt information generation submodule is used for generating prompt information if the wireless fidelity module is not started, and the prompt information is used for prompting a user to start the wireless fidelity module and returning to execute whether the detection starts the wireless fidelity module or not.
The device for the sound box distribution network provided by the embodiment of the invention can execute the method for the sound box distribution network provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example four
Fig. 5 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention. FIG. 5 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in FIG. 5 is only an example and should not bring any limitations to the functionality or scope of use of embodiments of the present invention.
As shown in FIG. 5, computer device 12 is in the form of a general purpose computing device. The components of computer device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computer device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via network adapter 20. As shown, network adapter 20 communicates with the other modules of computer device 12 via bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes programs stored in the system memory 28 to execute various functional applications and data processing, for example, to implement the method for distributing sound boxes according to the embodiment of the present invention.
EXAMPLE five
The fifth embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the method for configuring a network for a sound box, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
A computer readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A method for distributing a network for sound boxes is characterized by comprising the following steps:
scanning a two-dimensional code configured on a sound box to convert the two-dimensional code into first login information;
accessing a wireless access point opened by the sound box according to the first login information to establish wireless connection with the sound box;
collecting voice signals;
carrying out voice recognition on the voice signal to obtain text information;
mapping the text information into second login information of a specified network;
and sending the second login information to the sound box through the wireless connection, wherein the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information.
2. The method of claim 1, wherein the second login information comprises a service set identifier, a password, and wherein the voice signal comprises a first target signal, a second target signal;
the collecting voice signal comprises:
playing first prompt information, wherein the first prompt information is used for prompting a user to input a service set identifier;
after the first prompt message is played, collecting a voice signal as a first target signal;
when an interrupt signal is detected in the process of collecting the first target signal, playing second prompt information, wherein the second prompt information is used for prompting a user to input a password;
and after the second prompt message is played, acquiring a voice signal as a second target signal.
3. The method of claim 2, wherein the text information comprises first target information, second target information;
the performing speech recognition on the speech signal to obtain text information includes:
performing voice recognition on the first target signal to obtain first target information representing the service set identifier;
and performing voice recognition on the second target signal to obtain second target information representing the password.
4. The method according to any one of claims 1 to 3, wherein the second login information comprises a service set identifier and a password, and the text information comprises first target information representing the service set identifier and second target information representing the password;
the mapping the text information to second login information of a specified network includes:
identifying a first language type of the first target information;
expanding the first target information according to the first language type;
if the expansion is completed, converting the first target information into a regular expression serving as a service set identifier of a specified network, wherein the regular expression is used for searching the service set identifier matched with the regular expression;
identifying a second language type of second target information;
converting the second target information according to the second language type so as to enable the second target information to conform to the specification of a password;
and if the conversion is finished, setting the second target information as the password of the appointed network.
5. The method of claim 4, wherein said augmenting the first target information according to the first language type comprises:
if the first language type is English letters, expanding the first target information into English letters containing capital letters and lowercase letters;
if the first language type is Chinese number, expanding the first target information into Chinese number and Arabic number;
the converting the second target information according to the second language type to make the second target information conform to the specification of the password comprises:
if the second language type is Chinese number, converting the second target information into Arabic number;
if the second language type is a Chinese symbol, converting the second target information into a symbol;
and if the second language type is the combination of the Chinese quantifier and the number, removing second target information representing the Chinese quantifier, and copying the second target information representing the number until the number reaches the Chinese quantifier.
6. The method of claim 4, wherein mapping the textual information to second login information for a specified network further comprises:
searching the password of other previously accessed networks as third target information;
calculating a hamming distance between the third target information and the second target information;
if the hamming distance is smaller than a preset threshold value, extracting a first character and a second character which have differences, wherein the first character is the character of the third target information, and the second character is the character of the second target information;
and if the second character is similar to the first character in pronunciation, setting the third target information as a password of a specified network.
7. The method according to any one of claims 1-3 and 5-6, wherein the accessing the wireless access point opened by the speaker to establish a wireless connection with the speaker according to the first login information comprises:
detecting whether a wireless fidelity module is started or not;
if the wireless fidelity module is started, detecting whether to access a wireless fidelity network;
if the wireless fidelity network is accessed, disconnecting the connection with the wireless fidelity network, and accessing a wireless access point opened by the sound box by using the first login information so as to establish wireless connection with the sound box;
if the wireless fidelity network is not accessed, the first login information is used for accessing a wireless access point opened by the sound box so as to establish wireless connection with the sound box;
and if the wireless fidelity module is not started, generating prompt information, wherein the prompt information is used for prompting a user to start the wireless fidelity module and returning to execute whether the detection starts the wireless fidelity module.
8. The utility model provides a device that net was joined in marriage to audio amplifier which characterized in that includes:
the first login information acquisition module is used for scanning the two-dimensional code configured on the sound box so as to convert the two-dimensional code into first login information;
the wireless connection establishing module is used for accessing a wireless access point opened by the sound box according to the first login information so as to establish wireless connection with the sound box;
the voice signal acquisition module is used for acquiring voice signals;
the voice signal recognition module is used for carrying out voice recognition on the voice signal to obtain text information;
the second login information acquisition module is used for mapping the text information into second login information of the designated network;
and the second login information sending module is used for sending the second login information to the sound box through the wireless connection, and the sound box is used for disconnecting the wireless connection and logging in the network according to the second login information.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
a memory for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method for distribution of enclosures of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method for distribution of enclosures as claimed in any one of claims 1 to 7.
CN202110102758.6A 2021-01-26 2021-01-26 Method and device for distributing network for sound box, computer equipment and storage medium Pending CN112954695A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110102758.6A CN112954695A (en) 2021-01-26 2021-01-26 Method and device for distributing network for sound box, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110102758.6A CN112954695A (en) 2021-01-26 2021-01-26 Method and device for distributing network for sound box, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112954695A true CN112954695A (en) 2021-06-11

Family

ID=76236888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110102758.6A Pending CN112954695A (en) 2021-01-26 2021-01-26 Method and device for distributing network for sound box, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112954695A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021511A1 (en) * 2000-09-09 2002-03-14 Mailcode Inc. Voice-enabled directory look-up
US20150120723A1 (en) * 2013-10-24 2015-04-30 Xerox Corporation Methods and systems for processing speech queries
CN108831476A (en) * 2018-05-31 2018-11-16 平安科技(深圳)有限公司 Voice acquisition method, device, computer equipment and storage medium
CN109769247A (en) * 2018-11-30 2019-05-17 百度在线网络技术(北京)有限公司 The distribution of voice-based smart machine and device
CN111935802A (en) * 2020-07-24 2020-11-13 深圳创维数字技术有限公司 Equipment network distribution method and device and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021511A1 (en) * 2000-09-09 2002-03-14 Mailcode Inc. Voice-enabled directory look-up
US20150120723A1 (en) * 2013-10-24 2015-04-30 Xerox Corporation Methods and systems for processing speech queries
CN108831476A (en) * 2018-05-31 2018-11-16 平安科技(深圳)有限公司 Voice acquisition method, device, computer equipment and storage medium
CN109769247A (en) * 2018-11-30 2019-05-17 百度在线网络技术(北京)有限公司 The distribution of voice-based smart machine and device
CN111935802A (en) * 2020-07-24 2020-11-13 深圳创维数字技术有限公司 Equipment network distribution method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
JP6857699B2 (en) Wake-up methods, equipment, equipment, storage media, and programs for voice dialogue equipment
US10614803B2 (en) Wake-on-voice method, terminal and storage medium
US10593333B2 (en) Method and device for processing voice message, terminal and storage medium
KR102351670B1 (en) Method of construction and registration of gates and device therefor
US8606581B1 (en) Multi-pass speech recognition
CN105931644B (en) A kind of audio recognition method and mobile terminal
WO2021051544A1 (en) Voice recognition method and device
JP2019046468A (en) Interface smart interactive control method, apparatus, system and program
TWI711967B (en) Method, device and equipment for determining broadcast voice
US10529340B2 (en) Voiceprint registration method, server and storage medium
US20240021202A1 (en) Method and apparatus for recognizing voice, electronic device and medium
CN111402861B (en) Voice recognition method, device, equipment and storage medium
CN106453043A (en) Multi-language conversion-based instant communication system
CN112115706A (en) Text processing method and device, electronic equipment and medium
US11404052B2 (en) Service data processing method and apparatus and related device
CN108831477B (en) Voice recognition method, device, equipment and storage medium
CN108509416B (en) Sentence meaning identification method and device, equipment and storage medium
WO2020024620A1 (en) Voice information processing method and device, apparatus, and storage medium
US9251808B2 (en) Apparatus and method for clustering speakers, and a non-transitory computer readable medium thereof
CN106713111B (en) Processing method for adding friends, terminal and server
CN110992955A (en) Voice operation method, device, equipment and storage medium of intelligent equipment
JP2015055979A (en) Data conversion device and method
TW201337911A (en) Electrical device and voice identification method
CN112669842A (en) Man-machine conversation control method, device, computer equipment and storage medium
CN113782026A (en) Information processing method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210611

RJ01 Rejection of invention patent application after publication