CN113918916A - Data migration method, terminal device and readable storage medium - Google Patents

Data migration method, terminal device and readable storage medium Download PDF

Info

Publication number
CN113918916A
CN113918916A CN202111257661.9A CN202111257661A CN113918916A CN 113918916 A CN113918916 A CN 113918916A CN 202111257661 A CN202111257661 A CN 202111257661A CN 113918916 A CN113918916 A CN 113918916A
Authority
CN
China
Prior art keywords
user
data migration
space
migration
voiceprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111257661.9A
Other languages
Chinese (zh)
Inventor
王�华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN202111257661.9A priority Critical patent/CN113918916A/en
Publication of CN113918916A publication Critical patent/CN113918916A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/214Database migration support

Abstract

The application discloses a data migration method, a terminal device and a readable storage medium, wherein the data migration method comprises the following steps: s11, receiving the voice information and obtaining the voiceprint characteristics; s12, matching the voiceprint features with preset voiceprint features; and S13, when the voiceprint feature is matched with the preset voiceprint feature, executing data migration operation according to the voice information. According to the method and the device, the user can realize two purposes of user identity identification and data migration only by inputting the corresponding data migration instruction without executing complex operation, and the data migration is realized more safely, conveniently and efficiently.

Description

Data migration method, terminal device and readable storage medium
Technical Field
The present application relates to the field of data migration technologies, and in particular, to a data migration method, a terminal device, and a readable storage medium.
Background
In some implementations, the mobile phone starts a multi-user mode and creates a second user space (hereinafter, we collectively refer to an initial user as user 1 and a newly created user as user 2), sets a screen locking password or enters a number of fingerprints for user 1 in the first user setting, and sets a screen locking password or enters a number of fingerprints for user 2 in the second user setting. When the space data of the user 1 is imported into the space of the user 2, the screen locking password or fingerprint of the user 1 needs to be verified; when the user 2 space data is imported into the user 1 space, the screen locking password or fingerprint of the user 2 needs to be verified.
In the course of conceiving and implementing the present application, the applicant found that at least the following problems exist: the above data migration scheme is inconvenient, for example: if the user 1 has a plurality of contacts or a plurality of applications, the user 2 wants to import the contacts or the applications into the user space of the user, the data needing to be imported needs to be found in all the contacts and all the applications during import, the search is inconvenient, another user password needs to be verified after the data are found, and the operation is very inconvenient; as another example, the safety is not high: the screen locking password is used as a security certificate, and if the screen locking password is set to be too simple or is known by another user in some cases, data in the user space of the user can be accessed by other people, so that unnecessary troubles can be caused.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
In view of the above technical problems, the present application provides a data migration method, a terminal device and a readable storage medium, so that a user can realize two purposes of user identification and data migration only by inputting a corresponding data migration instruction, and data migration is realized more safely, conveniently and efficiently.
In order to solve the above technical problem, the present application provides a data migration method, including the following steps:
s11, receiving the voice information and obtaining the voiceprint characteristics;
s12, matching the voiceprint features with preset voiceprint features;
and S13, when the voiceprint feature is matched with the preset voiceprint feature, executing data migration operation according to the voice information.
Optionally, before the step of S11, the method includes: starting a preset mode; setting an initial user as a first user, and creating at least one second user; optionally, at least one group of voice data of the first user and the second user is obtained; processing the at least one group of voice data to obtain a first voiceprint feature of the first user and a second voiceprint feature of the second user; and taking the first voiceprint feature and the second voiceprint feature as the preset voiceprint feature.
Optionally, the preset mode may be a multi-user mode, a security mode, or the like.
Optionally, the step of S11 further includes: processing the voice information; extracting at least one of wavelength, frequency, intensity, and rhythm from the processed signal; and taking the extracted features as the voiceprint features.
Optionally, the step of S12, including: comparing the voiceprint features with the preset voiceprint features; detecting whether the matching value of each target migration space in the voiceprint features and the preset voiceprint features meets a matching threshold value or not; if so, acquiring a migration target from the target migration space according to the voice information; and/or if the matching result does not meet the requirement, outputting voiceprint feature matching failure reminding information.
Optionally, the step of S13, including: judging whether the current user space is a space corresponding to the voiceprint feature; if not, switching to a space corresponding to the input voiceprint feature; and/or if so, executing the step of executing data migration operation according to the voice information.
Optionally, the data migration operation is performed according to the voice information, and includes: performing semantic analysis on the voice information to obtain a migration target; detecting whether the migration target is successfully migrated; if the migration is successful, outputting a migration success prompt message; and/or outputting migration failure prompt information if the migration fails.
Optionally, the step of S13, including: performing semantic analysis on the voice information to acquire a target space to be migrated; judging whether the target space exists or not; if so, binding the current space with the target space; and/or if the target space does not exist, outputting the information of the target-free space.
Optionally, the step of S13, including: acquiring current user authority information; judging whether the authority of the current user meets the data migration operation; if yes, executing the data migration operation; and/or if the authority is not satisfied, outputting the authority acquisition prompt message.
The present application further provides a terminal device, including: the data migration method comprises a storage and a processor, wherein the storage is stored with a data migration program, and the data migration program realizes the steps of any one of the data migration methods when being executed by the processor.
The present application also provides a computer-readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the data migration method as described in any one of the above.
As described herein, according to the data migration method of the present application, after a data migration instruction is input by a user through voice, whether the user is an existing user on the terminal is verified according to voiceprint feature comparison, after the user identity verification is successful, the user intention is identified through semantic parsing, and then a data migration operation is performed. The user can realize the two purposes of user identity identification and data migration by inputting a corresponding data migration instruction without executing complex operation. The voiceprint feature comparison result is used as a user identity identification verification result, the user intention is identified through semantic analysis, and data migration is achieved simply, quickly, definitely and safely.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic hardware structure diagram of a mobile terminal implementing various embodiments of the present application;
fig. 2 is a communication network system architecture diagram according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a data migration method according to an embodiment of the present application;
FIG. 4 is a specific flowchart of a data migration method according to an embodiment of the present application;
FIG. 5 is a schematic interface diagram of a data migration method according to an embodiment of the present application;
FIG. 6 is a schematic interface diagram illustrating a data migration method according to an embodiment of the present application;
FIG. 7 is a flowchart illustrating a data space detection processing method according to an embodiment of the present application;
fig. 8 is a block diagram illustrating a configuration of a data migration apparatus according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings. With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or," "and/or," "including at least one of the following," and the like, as used herein, are to be construed as inclusive or mean any one or any combination. For example, "includes at least one of: A. b, C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C ", again for example," A, B or C "or" A, B and/or C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C'. An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that step numbers such as S11 and S12 are used herein for the purpose of more clearly and briefly describing the corresponding content, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S12 first and then S11 in specific implementation, which should be within the scope of the present application.
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
The terminal device may be implemented in various forms. For example, the terminal devices described in the present application may include mobile terminals such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and fixed terminals such as a Digital TV, a desktop computer, and the like.
The following description will be given taking a mobile terminal as an example, and it will be understood by those skilled in the art that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present application, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex-Long Term Evolution), TDD-LTE (Time Division duplex-Long Term Evolution, Time Division Long Term Evolution), 5G, and so on.
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope of not changing the essence of the application.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Optionally, the light sensor includes an ambient light sensor that may adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 1061 and/or the backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Alternatively, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Optionally, the touch detection device detects a touch orientation of a user, detects a signal caused by a touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Optionally, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited thereto.
Alternatively, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a program storage area and a data storage area, and optionally, the program storage area may store an operating system, an application program (such as a sound playing function, an image playing function, and the like) required by at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor and a modem processor, optionally, the application processor mainly handles operating systems, user interfaces, application programs, etc., and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present application, a communication network system on which the mobile terminal of the present application is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present disclosure, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Optionally, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Alternatively, the eNodeB2021 may be connected with other enodebs 2022 through a backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. Optionally, the MME2031 is a control node that handles signaling between the UE201 and the EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present application is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network system (5G), and the like.
Based on the above mobile terminal hardware structure and communication network system, various embodiments of the present application are provided.
First embodiment
Referring to fig. 3, fig. 3 is a flowchart illustrating a data migration method according to an embodiment of the present application. As shown in fig. 3, the present application provides a data migration method, including the following steps:
s11, receiving the voice information and obtaining the voiceprint characteristics;
s12, matching the voiceprint features with preset voiceprint features;
and S13, when the voiceprint feature is matched with the preset voiceprint feature, executing data migration operation according to the voice information.
Alternatively, the voice information input by the user may be collected by a microphone or the like, and the voice information includes: and (5) voice instructions. The system recognizes the received voice information through a voice recognition engine. The voice command is to complete some operations through voice. Such as starting an application, turning on or off a flight mode, etc. The task of voiceprint feature extraction is to extract and select acoustic or language features with characteristics of strong distinguishability, high stability and the like for the voiceprint of a speaker. Unlike speech recognition, the features of voiceprint recognition must be "personalized" features, while the features of speaker recognition must be "generic" to the speaker. Although most voiceprint recognition systems use acoustic level features, the features characterizing a person should be multi-level and may include: (1) acoustic features related to the anatomy of human pronunciation mechanisms (e.g., spectrum, cepstrum, formants, fundamental tones, reflection coefficients, etc.), nasal sounds, profound breath sounds, humble, laughing, etc.; (2) semantics, paraphrasing, pronunciation, language habits, etc., which are influenced by social and economic conditions, education level, place of birth, etc.; (3) personal characteristics or characteristics of rhythm, speed, intonation, volume, etc. affected by the parent. From the standpoint of modeling by mathematical methods, the features that can be used by the voiceprint automatic recognition model include: (1) acoustic features (cepstrum); (2) lexical features (speaker dependent word n-grams, phoneme n-grams); (3) prosodic features (pitch and energy "poses" described by n-grams); (4) language, dialect and accent information; (5) channel information (what channel to use); and so on. By the mode, when the migration instruction of the user is received, the identity of the user is confirmed through voiceprint feature matching, and when the identity matching is successful, corresponding operation is carried out according to the voice instruction. The user can realize two purposes of user identity identification and data migration execution only by inputting a corresponding data migration instruction (which can be extensive or specific) without executing complex operation, and the data migration is realized more safely, conveniently and efficiently.
Alternatively, semantic recognition of the user input speech by speech recognition techniques may allow the machine to convert the speech signal into corresponding text or commands through a recognition and understanding process. The voice recognition technology mainly comprises the following steps: feature extraction technology, pattern matching criterion and model training technology.
Optionally, when the terminal opens the preset mode and creates at least one user, the terminal performs operations such as identity recognition and semantic analysis according to the received voice information, and thus, corresponding operations can be performed based on the voice information. Therefore, the attributes of identity recognition, instruction operation and the like carried by the voice information can be fully utilized to execute data migration operation, the data migration efficiency can be improved, and the data migration safety can be improved.
Optionally, the preset mode may be a multi-user mode, a security mode, or the like.
By the method, when the voice information is received, the voiceprint characteristics are obtained; matching the voiceprint features with preset voiceprint features, identifying the user identity, and performing semantic identification and analysis on voice information; and after the user identity is confirmed, executing data migration operation according to the voice instruction analyzed by the voice information. Therefore, the user can realize the dual effects of verifying the user identity and executing the migration action only by sending a voice command, and the method is safer and more efficient.
Optionally, before the step of S11, the method includes: starting a preset mode; an initial user is set as a first user and at least one second user is created.
Optionally, the preset mode is that at least one user can be created on one terminal, and each user has its own corresponding user space and/or storage space. The first user is the initial user, and the second user is all users except the initial user. For example, the initial user of the mobile phone is a, the second user is B, the third user is C, and the like.
Alternatively, the space corresponding to each user may be on the terminal, may be on the server, or may exist in both the terminal and the server.
Optionally, before the step S11, the method further includes: acquiring at least one group of voice data of the first user and the second user; processing the multiple groups of voice data to acquire a first voiceprint feature of the first user and a second voiceprint feature of the second user; and taking the first voiceprint feature and the second voiceprint feature as the preset voiceprint feature.
Optionally, at least one group of voice data of each user on the terminal may be acquired through a microphone and other devices, the voice data of each user is processed to obtain voiceprint features corresponding to each user, and the voiceprint features are bound with corresponding user identities and other information and then stored in a database as preset voiceprint features, so that in the data migration execution process, after the preset voiceprint features matched with the user are confirmed, the user identity can be confirmed through the preset voiceprint features. For example, there are two users a and B on the terminal, and the voice data of a and B are collected respectively in advance through the voice collection function. And then processing the voice data of the A and the B to obtain voice print characteristics of the A and the B, and storing the voice print characteristics of the A and the B into a database as preset voice print characteristics so as to judge whether the identity of the user is A or B or not through the voice print characteristics after receiving a voice data migration instruction of the user.
Optionally, the voice data of the user is collected to prevent the interference of environmental noise and recording equipment. The microphone is kept at a suitable distance from the recorded object.
Optionally, the step of S11 further includes: processing the voice information; extracting at least one of wavelength, frequency, intensity, and rhythm from the processed signal; and taking the extracted features as the voiceprint features.
Voiceprint (Voiceprint) is a sound wave spectrum which carries speech information and is displayed by an electroacoustic instrument, and the Voiceprint not only has specificity, but also has the characteristic of relative stability. After the adult, the voice of the human can be kept relatively stable and unchanged for a long time. Whether the speaker intentionally imitates the voice and tone of other people or speaks with whisper and whisper, even if the imitation is vivid, the voiceprint is always different. Based on the two characteristics of the voiceprint, the system can check and compare the acquired user voiceprint characteristics and the preset voiceprint in the database through a voiceprint identification technology, and quickly confirm whether the identity of the user is the user corresponding to the voiceprint characteristics stored in the database in advance.
Optionally, the step of S12, including: comparing the voiceprint features with the preset voiceprint features; detecting whether the matching value of each target migration space in the voiceprint features and the preset voiceprint features meets a matching threshold value or not; if so, acquiring a migration target from the target migration space according to the voice information; and/or if the matching result does not meet the requirement, outputting voiceprint feature matching failure reminding information.
If all compared features are completely matched; or the characteristics with strong stability are completely matched, but only the characteristics with poor stability are slightly different, and both characteristics can be regarded as the same user; if the compared features with strong stability have large difference, the samples can be supplemented for the comparison of the speech and the graph, and if the difference still exists and cannot be explained, a negative conclusion can be made. For example, after comparing the collected user voiceprint features with the preset voiceprint features one by one, when the matching value of the user voiceprint features with the preset voiceprint features a is 95%, the matching value of the user voiceprint features with the preset voiceprint features B is 60%, and the matching threshold value is 90%, it is determined that the voiceprint features of the user are successfully matched with the preset voiceprint features a, and the user identity is a. And when the matching value between the user voiceprint feature and the preset voiceprint features A and B is not detected to exceed 90%, outputting information such as voiceprint feature matching failure, user verification failure and the like.
Optionally, when the user voiceprint feature is matched with the preset voiceprint feature, the data migration operation may be performed according to the user voice information; and/or, when the user voiceprint characteristics do not match the preset voiceprint characteristics, the data migration operation cannot be executed.
Optionally, the step of S13, including: judging whether the current user space is a space corresponding to the voiceprint feature; if not, switching to a space corresponding to the input voiceprint feature; and/or if so, executing the operation of executing data migration according to the voice information.
And confirming the user identity according to the voiceprint characteristics, and then confirming the corresponding space according to the user identity. And finally, comparing the current space with the space corresponding to the user, and checking whether the current space is the same space.
Optionally, when the current space is the space corresponding to the user identity, the data migration operation in the voice information may be directly performed. For example, it is detected that the user identity is a, the space currently used by the terminal is a, and the space a and the user a are bound together, so that the space used by the terminal does not need to be switched. Optionally, when the current space is not the space corresponding to the user identity, the data migration operation corresponding to the voice information is executed after the space corresponding to the user needs to be switched. For example, after comparing the collected voiceprint features with preset voiceprint features, the user identity is confirmed to be A; when detecting that the space used by the terminal is space B (the space corresponding to the user B), the space needs to be switched from space B to space a.
Optionally, the voice information is analyzed to obtain identification information of a target space to be migrated and/or a target user, and the target user space is obtained according to the identification information, where the identification information includes: the number and name of the user space.
Optionally, the data migration operation is performed according to the voice information, and includes: performing semantic analysis on the voice information to obtain a migration target; detecting whether the migration target is successfully migrated; if the migration is successful, outputting a migration success prompt message; and/or outputting migration failure prompt information if the migration fails.
And analyzing the voice information to obtain text information or instructions and the like so as to obtain instruction information to be executed. Then, information such as a target to be migrated is acquired from the instruction information. For example, in user 2 space, user 2 says "import WeChat application into initial space". And acquiring the WeChat application from the user 2 space according to the voice instruction of the user, and sending the WeChat application to the initial space (namely the user 1 space) after the WeChat application is found in the user 2 space. And real-time monitoring is carried out in the migration process, so that the WeChat application is ensured to be imported into the user 1 space from the user 2 space. And after the migration is finished, outputting information of successful migration, and if an error occurs in the migration process and the migration fails, outputting information of failure migration.
Optionally, the data migration operation is performed according to the voice information, and includes:
judging whether the migration target exists in a target database or not;
if so, executing the data migration operation; and/or the presence of a gas in the gas,
if not, outputting error prompt information.
After confirming the migration target, judging whether target data to be migrated exist in the current space; if yes, migrating the target data to a target space; and/or if not, reminding the user that the target data does not exist in the current space.
Optionally, the step of S13, including: performing semantic analysis on the voice information to acquire a target space to be migrated; judging whether the target space exists or not; if so, binding the current space with the target space; and/or if the target space does not exist, outputting the information of the target-free space.
Optionally, a target space to which data is to be migrated is obtained according to the voice information, then whether the target space exists in the current terminal is detected, and when the target space is not detected, prompt information without the target space is output. For example, the user 2 says "import the wechat application into the user 3 space", but when only the user 1 space and the user 2 space exist on the current terminal, the reminding information is output to remind the user 2 that the current terminal does not have the user 3 space. Optionally, when the user space included in the user voice information is detected to exist in the current terminal, the current space is bound with the target space, so as to facilitate data migration. For example, user 2 says "import WeChat application into initial space" and binds user 2 space with user 1 space. Optionally, when it is detected that the target space in the user voice information does not exist in the current terminal, space creation confirmation information is output, after the user agrees, a space is newly created, and then the current space and the newly created space are bound.
Optionally, the step of S13, including: acquiring current user authority information; judging whether the authority of the current user meets the data migration operation; if yes, executing the data migration operation; and/or if the authority is not satisfied, outputting the authority acquisition prompt message.
When a user is created, various permissions may be configured for the user, and when the user does not have the permission of data migration, the data migration operation cannot be performed. For example, user 1 has data migration rights and user 2 does not. When the user 2 says 'import the wechat application to the initial space', the reminding information is output to remind the user 2 that the migration permission does not exist, and whether the migration permission needs to be requested or not is inquired. When the user 1 says "import the WeChat application into the user 2 space", the target data is migrated to the user 2 space.
Referring to fig. 4, fig. 4 is a specific flowchart of a data migration method according to an embodiment of the present application.
As shown in fig. 4, the data migration method shown in the embodiment of the present application specifically includes the following steps:
step S21: sets of user 1 and user 2 voice data are extracted.
Step S22: and processing the two groups of voice data to form the user voiceprint characteristics.
Alternatively, steps S21 and S22 collect voice data of the existing user on the terminal and form a voiceprint feature for the purpose of confirming user authentication in the subsequent steps.
Step S23: a voice is input.
Step S24: and (5) voice matching processing.
Step S25: and judging whether the matching with the user is successful.
Optionally, matching with the user is to match with the voiceprint features of the user 1 and the user 2 in step S21. When the matching is successful, the process proceeds to step S26; and/or, when the matching fails, performing step S23 to retrieve the input voice information.
Step S26: and (5) semantic recognition.
Step S27: a data migration action is performed.
Alternatively, the purpose of steps S26 and S27 is to respond to a voice input by the user.
For example, the handset turns on the multi-user mode and creates a second user (the initial user is user 1 and the newly created user is user 2). And extracting a plurality of groups of voice data of the user 1 and the user 2, and processing at least one group of extracted voice to form voiceprint characteristics of the user 1 and the user 2 so as to identify the user. And (3) carrying out the same voice processing on the voice input by the user, comparing the voice with the voiceprint characteristic generated in the step 1, and judging whether the voice meets the user identity matching threshold value. When the user identity matching threshold is met, semantic analysis is performed on voice input by a user, so that a user migration purpose (whether the user needs to perform data migration), a migration target (whether a file, a picture video, a contact or other data is migrated, and which data is specific) and a migration target space (in this example, a user 1 space or a user 2 space may be defaulted) are defined. A data migration action is performed. It may be a general migration of all data (e.g., migration of all contacts) or specific to a certain item (e.g., migration of contact "zhang san").
Two application scenarios based on the processing method of the present application are described below.
Fig. 5 is an interface diagram of a data migration method according to an embodiment of the present application. The illustrated scenario is a data migration scenario, and the example is described in which the user or the user space is on the same terminal. In fig. 5, (a) imports the wechat application into the a space for the voice information input by the user. In fig. 5, (b) the received voice information is processed to obtain the voiceprint feature of the user, then the user identity is identified according to the voiceprint feature, and after the user identity is successfully verified, the voice information is semantically identified to obtain the migration operation to be executed. Shown in fig. 5 (c) is a data migration process.
Fig. 6 is another interface diagram of the data migration method according to the embodiment of the present application. The illustrated scenario is an authentication failure scenario, and the example is described in which the user or the user space is on the same terminal. In fig. 6 (a) "import wechat application into a space" for user input of voice information. In fig. 6 (B), the voice information received is processed to obtain the voiceprint characteristics of the user, and then the user identity is identified according to the voiceprint characteristics, so as to determine whether the current user is an existing user (e.g., user a or user B) on the terminal. Shown in fig. 6 (c) is an authentication failure reminding message. For example, "no user identity detected," i.e., the current user is not an existing user on the terminal (e.g., user a and user B), prompts "you say, i hear. At this time, the user can re-input the voice.
According to the data migration method, the user can quickly perform data migration by inputting the voice command, and a simple and safe data migration mode is provided. The user voiceprint characteristics and the preset voiceprint characteristics are compared to obtain a result, the result is used as a user identity identification verification result, the user intention is identified through semantic analysis, the data migration operation needing to be executed is accurately obtained, and the data migration is simply, quickly, definitely and safely realized. And the user is not required to execute complex operation, and two purposes of user identity identification and data migration can be realized only by inputting a corresponding data migration instruction through voice.
Second embodiment
Referring to fig. 7, fig. 7 is a schematic flowchart illustrating a data space detection processing method according to another embodiment of the present application.
As shown in fig. 7, the present embodiment is different from the first embodiment in that the detection and processing of the user space in the terminal before the voiceprint matching are performed includes the following steps:
step S31: receiving voice information and acquiring the space quantity in the terminal;
step S32: when the space quantity is a preset quantity, outputting prompt information;
step S33: and responding to the selection operation, and performing response processing according to the selection result.
Through the mode, when the space quantity is the preset quantity (for example, the preset quantity is 1), different processing can be executed in response to the selection operation of the user, the user is not required to execute complex operation, and the method is safer and more convenient.
Optionally, the prompt message includes at least one of:
creating a second user space;
transferring the data to other user terminals;
the data transfer operation is ended.
In one scenario, when a user selects to create a second user space, users corresponding to the first user space and the second user space are both the same user. The data in the first user space is migrated to the second user space through the user instruction, so that the data can be quickly backed up, and data loss, mistaken deletion and the like are prevented. In one scenario, when a user selects data to be transferred to other user terminals, the output association device is used for the user to select, so that the user can confirm a target terminal to which the data is to be transferred, obtain target data to be transferred according to voice information, and transmit the target data to the target terminal after establishing connection with the target terminal, thereby being capable of rapidly transmitting terminal data.
Alternatively, the method steps as described in the first embodiment may be performed when the number of spaces exceeds a preset number.
Third embodiment
Referring to fig. 8, fig. 8 is a block diagram illustrating a data migration apparatus according to an embodiment of the present application.
As shown in fig. 8, the data migration apparatus includes: the voice recognition system comprises a voice receiving module 10, an identity recognition module 20, a semantic recognition module 30 and an execution module 40.
The voice receiving module 10 is configured to receive a data migration voice instruction input by a user.
Alternatively, when the user wants to perform a data migration operation, a voice instruction for data migration may be input to the data migration apparatus (for example, a voice such as "import WeChat application to initial space", "migrate contact Zhang III", or "migrate xx pictures to x space"). The data migration apparatus may receive a voice command input by a user through the voice receiving module 10 (e.g., a microphone, etc.).
The identity recognition module 20 is configured to obtain a user voice, extract a user voiceprint feature, compare the user voiceprint feature with a preset voiceprint feature, and confirm that identity matching and/or identity verification are successful when a matching value exceeds a threshold value.
And the semantic recognition module 30 converts the voice command input by the user into a text command.
And the execution module 40, the user executes the corresponding data migration operation according to the data migration instruction confirmed by the semantic recognition module 30.
Optionally, the data migration apparatus in this embodiment may perform any of the method steps described in the foregoing embodiments, and the details may refer to the foregoing embodiments.
The data migration device can verify the identity of the user after the user sends the voice command, and the data migration operation is executed according to the voice command and the identity of the user, so that the data migration device is safer and more efficient.
The application also provides a terminal device, which includes a memory and a processor, wherein the memory stores a data migration program, and the data migration program implements the steps of the data migration method in any of the above embodiments when executed by the processor.
The present application further provides a computer-readable storage medium, on which a data migration program is stored, and when executed by a processor, the data migration program implements the steps of the data migration method in any of the above embodiments.
In the embodiments of the terminal device and the computer-readable storage medium provided in the present application, all technical features of any one of the embodiments of the data migration method may be included, and the expanding and explaining contents of the specification are basically the same as those of the embodiments of the method, and are not described herein again.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method in the above various possible embodiments.
Embodiments of the present application further provide a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method in the above various possible embodiments.
It is to be understood that the foregoing scenarios are only examples, and do not constitute a limitation on application scenarios of the technical solutions provided in the embodiments of the present application, and the technical solutions of the present application may also be applied to other scenarios. For example, as can be known by those skilled in the art, with the evolution of system architecture and the emergence of new service scenarios, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device in the embodiment of the application can be merged, divided and deleted according to actual needs.
In the present application, the same or similar term concepts, technical solutions and/or application scenario descriptions will be generally described only in detail at the first occurrence, and when the description is repeated later, the detailed description will not be repeated in general for brevity, and when understanding the technical solutions and the like of the present application, reference may be made to the related detailed description before the description for the same or similar term concepts, technical solutions and/or application scenario descriptions and the like which are not described in detail later.
In the present application, each embodiment is described with emphasis, and reference may be made to the description of other embodiments for parts that are not described or illustrated in any embodiment.
The technical features of the technical solution of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present application should be considered as being described in the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, memory Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A method of data migration, comprising the steps of:
s11, receiving the voice information and obtaining the voiceprint characteristics;
s12, matching the voiceprint features with preset voiceprint features;
and S13, when the voiceprint feature is matched with the preset voiceprint feature, executing data migration operation according to the voice information.
2. The method of claim 1, wherein the step of S11 is preceded by the steps of:
starting a preset mode;
setting an initial user as a first user, and creating at least one second user;
acquiring at least one group of voice data of the first user and the second user;
processing the at least one group of voice data to obtain a first voiceprint feature of the first user and a second voiceprint feature of the second user;
and taking the first voiceprint feature and the second voiceprint feature as the preset voiceprint feature.
3. The method of claim 1, wherein the step of S11 further comprises:
processing the voice information;
extracting at least one of wavelength, frequency, intensity, and rhythm from the processed signal;
and taking the extracted features as the voiceprint features.
4. The method of claim 1, wherein the step of S12 includes:
comparing the voiceprint features with the preset voiceprint features;
detecting whether the matching value of the voiceprint features and the preset voiceprint features meets a matching threshold value;
if so, acquiring a migration target from a target migration space according to the voice information; and/or the presence of a gas in the gas,
and if not, outputting voiceprint feature matching failure reminding information.
5. The method of claim 4, wherein the step of S13 includes:
judging whether the current user space is a space corresponding to the voiceprint feature;
if not, switching to a space corresponding to the voiceprint feature of the input voice; and/or the presence of a gas in the gas,
and if so, executing the operation of executing data migration according to the voice information.
6. The method according to any of claims 1 to 5, wherein the step of performing a data migration operation based on the voice information comprises:
performing semantic analysis on the voice information to obtain a migration target;
detecting whether the migration target is successfully migrated;
if the migration is successful, outputting a migration success prompt message; and/or the presence of a gas in the gas,
and if the migration fails, outputting migration failure prompt information.
7. The method according to any one of claims 1 to 5, wherein the step of S13 further comprises:
performing semantic analysis on the voice information to acquire a target space to be migrated;
judging whether the target space exists or not;
if so, binding the current space with the target space; and/or the presence of a gas in the gas,
if not, the information of the target-free space is output.
8. The method according to any one of claims 1 to 5, wherein the step of S13 further comprises:
acquiring current user authority information;
judging whether the authority of the current user meets the data migration operation;
if yes, executing the data migration operation; and/or the presence of a gas in the gas,
if not, outputting the authority to acquire prompt information.
9. A terminal device, characterized in that the terminal device comprises: memory, a processor, wherein the memory has stored thereon a data migration program which when executed by the processor implements the steps of the data migration method of any of claims 1 to 8.
10. A readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the data migration method according to any one of claims 1 to 8.
CN202111257661.9A 2021-10-27 2021-10-27 Data migration method, terminal device and readable storage medium Pending CN113918916A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111257661.9A CN113918916A (en) 2021-10-27 2021-10-27 Data migration method, terminal device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111257661.9A CN113918916A (en) 2021-10-27 2021-10-27 Data migration method, terminal device and readable storage medium

Publications (1)

Publication Number Publication Date
CN113918916A true CN113918916A (en) 2022-01-11

Family

ID=79243056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111257661.9A Pending CN113918916A (en) 2021-10-27 2021-10-27 Data migration method, terminal device and readable storage medium

Country Status (1)

Country Link
CN (1) CN113918916A (en)

Similar Documents

Publication Publication Date Title
CN108289244B (en) Video subtitle processing method, mobile terminal and computer readable storage medium
CN107919138B (en) Emotion processing method in voice and mobile terminal
CN109086582B (en) Fingerprint authentication method, terminal and computer readable storage medium
CN109545221B (en) Parameter adjustment method, mobile terminal and computer readable storage medium
CN113704631B (en) Interactive instruction prompting method, intelligent device and readable storage medium
CN110827826A (en) Method for converting words by voice and electronic equipment
CN108012270B (en) Information processing method, equipment and computer readable storage medium
WO2021103449A1 (en) Interaction method, mobile terminal and readable storage medium
CN109167880B (en) Double-sided screen terminal control method, double-sided screen terminal and computer readable storage medium
CN111835522A (en) Audio processing method and device
CN113314120B (en) Processing method, processing apparatus, and storage medium
CN113326018A (en) Processing method, terminal device and storage medium
US20180182393A1 (en) Security enhanced speech recognition method and device
CN108174030B (en) Customized voice control implementation method, mobile terminal and readable storage medium
CN108537019A (en) A kind of unlocking method and device, storage medium
CN111931155A (en) Verification code input method, verification code input equipment and storage medium
CN115469949A (en) Information display method, intelligent terminal and storage medium
CN113918916A (en) Data migration method, terminal device and readable storage medium
CN113064536B (en) Processing method, processing device and readable storage medium
CN114065168A (en) Information processing method, intelligent terminal and storage medium
CN109151175B (en) Mobile terminal safety control method, mobile terminal and computer storage medium
CN109656658B (en) Editing object processing method and device and computer readable storage medium
CN112672213A (en) Video information processing method and device and computer readable storage medium
CN111897916A (en) Voice instruction recognition method and device, terminal equipment and storage medium
CN109471664A (en) Intelligent assistant's management method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication