CN114546093A - Control method, control device, electronic equipment and storage medium - Google Patents

Control method, control device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114546093A
CN114546093A CN202210196628.8A CN202210196628A CN114546093A CN 114546093 A CN114546093 A CN 114546093A CN 202210196628 A CN202210196628 A CN 202210196628A CN 114546093 A CN114546093 A CN 114546093A
Authority
CN
China
Prior art keywords
state
electronic equipment
target
electronic device
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210196628.8A
Other languages
Chinese (zh)
Inventor
张靖瑶
金明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202210196628.8A priority Critical patent/CN114546093A/en
Publication of CN114546093A publication Critical patent/CN114546093A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/28Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application discloses a control method, a control device, electronic equipment and a storage medium, and target information is obtained and used for triggering the electronic equipment to execute state switching operation; and if the target information is verified to pass, generating a trigger signal to trigger the electronic equipment to switch from a current first state to a second state, wherein the first state comprises a shutdown state, and the second state is different from the first state.

Description

Control method, control device, electronic equipment and storage medium
Technical Field
The present application relates to the field of control technologies, and in particular, to a control method and apparatus, an electronic device, and a storage medium.
Background
At present, when the electronic equipment is in a power-off state, the electronic equipment can only be started through a power-on key, and the intelligence is poor.
Disclosure of Invention
The application provides a control method, a control device, electronic equipment and a storage medium, and the control method comprises the following technical scheme:
a control method, the method comprising:
acquiring target information, wherein the target information is used for triggering electronic equipment to execute state switching operation;
and if the target information is verified to pass, generating a trigger signal to trigger the electronic equipment to be switched from a current first state to a second state, wherein the first state comprises a power-off state, and the second state is different from the first state.
The method preferably, the obtaining target information includes:
the target information is obtained through at least one input component, when the electronic equipment is in a shutdown state, the input component can be in a working state, and the input component belongs to or does not belong to the electronic equipment.
The above method, preferably, further comprises:
if the input component belongs to the electronic equipment, verifying the target information; or the like, or, alternatively,
and if the input component does not belong to the electronic equipment, obtaining a first verification result of the target information, or obtaining the target information collected by the input component not belonging to the electronic equipment and verifying the target information.
The method preferably, the generating a trigger signal includes:
generating a corresponding trigger signal based on the type and/or content of the target information; or the like, or, alternatively,
generating a corresponding trigger signal based on the verification result of the target information and the type and/or content of the target information;
wherein different trigger signals can trigger the electronic device to enter different second states.
Preferably, the method for triggering the electronic device to switch from the current first state to the second state includes:
verifying the target information or a verification result thereof by a guidance system of the electronic equipment in response to the trigger signal so as to control the electronic equipment to enter a corresponding second state based on an obtained second verification result; or the like, or, alternatively,
in response to the trigger signal, a guide system of the electronic equipment controls a target input component to obtain target verification information, and the target verification information is verified to control the electronic equipment to enter a corresponding second state based on an obtained third verification result;
wherein the functions that the electronic device can provide in different second states are different.
The method preferably controls the electronic device to enter the corresponding second state, and includes:
if the operating system of the electronic equipment has a first authentication relationship with the boot system, controlling the electronic equipment to enter a corresponding second state based on the second verification result; or the like, or, alternatively,
and if the operating system of the electronic equipment has a second authentication relationship with the boot system, obtaining the target verification information, and controlling the electronic equipment to enter a corresponding second state at least based on the third verification result.
The method preferably controls the electronic device to enter the corresponding second state, and includes:
if the second verification result and/or the third verification result represent verification passes, controlling the electronic equipment to run an operating system or a target application; or the like, or, alternatively,
and if the second verification result or the third verification result represents that the verification fails, controlling the electronic equipment to enter a restart state or a shutdown state.
The method preferably controls the electronic device to enter the corresponding second state, and includes:
if the third verification result represents that the electronic equipment is not in a preset effective service life, controlling the electronic equipment to output a payment prompt, and/or controlling a user terminal to output the payment prompt aiming at the electronic equipment; or the like, or, alternatively,
if the third verification result indicates that the electronic equipment is in the valid service life, controlling the electronic equipment to provide a function matched with the verification result for the current user; or the like, or, alternatively,
if the third verification result represents that the electronic equipment is not in a preset effective geographic range, sending a position change request for obtaining the use permission of the electronic equipment to target equipment so as to control the electronic equipment to provide a function matched with the request result after obtaining a corresponding request result; or the like, or, alternatively,
and if the third verification result indicates that the user of the electronic equipment has the first use authority, controlling the electronic equipment to provide related functions based on the basic input output system, provide related functions based on the operating system or provide part of related functions based on the operating system.
A control method, comprising:
obtaining target voice information, wherein the target voice information is used for triggering the electronic equipment to execute a starting operation;
if the target voice information is verified to pass, generating a corresponding trigger signal to trigger the electronic equipment to be switched from a current power-off state to a non-power-off state, wherein the non-power-off state comprises: a sleep state, or an active state.
A control device, comprising:
the system comprises an obtaining module, a state switching module and a processing module, wherein the obtaining module is used for obtaining target information, and the target information is used for triggering the electronic equipment to execute state switching operation;
the triggering module is configured to generate a triggering signal to trigger the electronic device to switch from a current first state to a second state if the target information is verified, where the first state includes a shutdown state, and the second state is different from the first state.
An electronic device, comprising:
a memory for storing a program;
and the processor is used for calling and executing the program in the memory, and realizing the steps of the information processing method according to any one of the above items by executing the program.
A readable storage medium on which a computer program is stored, which, when executed by a processor, implements the steps of the information processing method as described in any one of the above.
According to the scheme, the control method, the control device, the electronic equipment and the storage medium, provided by the application, obtain the target information, wherein the target information is used for triggering the electronic equipment to execute the state switching operation; and if the target information is verified to pass, generating a trigger signal to trigger the electronic equipment to switch from a current first state to a second state, wherein the first state comprises a shutdown state, and the second state is different from the first state. Based on the method and the device, the target information used for triggering the electronic equipment to execute the state switching operation can be obtained when the electronic equipment is in the power-off state, the target information is verified, and the electronic equipment is controlled to be switched from the power-off state to the second state different from the power-off state by generating the trigger signal based on the verification of the target information, so that the electronic equipment is controlled in a diversified manner when the electronic equipment is in the power-on state, and the intelligence of the electronic equipment is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of an implementation of a control method provided in an embodiment of the present application;
fig. 2 is a flowchart of another implementation of the control method provided in the embodiment of the present application;
FIG. 3 is an exemplary diagram of a system architecture diagram of an aspect provided by an embodiment of the present application;
fig. 4 is a schematic structural diagram of a control device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in other sequences than described or illustrated herein.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without inventive step, are within the scope of the present disclosure.
As shown in fig. 1, an implementation flowchart of a control method provided in an embodiment of the present application may include:
step S101: target information is obtained, and the target information is used for triggering the electronic equipment to execute state switching operation.
The target information may be biometric information, such as voice information, facial images, fingerprints, and the like. The target information may also be other information, such as a character string, a password (e.g., preset text), a gesture operation, and the like.
The target information may be obtained by the electronic device or by other devices. For example, if the electronic device is denoted as a first electronic device, the other device may be a second electronic device, where the first electronic device and the second electronic device are different electronic devices, for example, the first electronic device may be a notebook computer, a desktop computer, an all-in-one machine, or the like, the second electronic device may be a portable mobile communication terminal such as a mobile phone, and in other embodiments, the second electronic device may also be a sensor module or a function module that can implement communication, such as an independently arranged camera module, a microphone module, a radar module, or the like.
Step S102: and if the target information is verified, generating a trigger signal to trigger the electronic equipment to switch from the current first state to the second state. The first state comprises a shutdown state, and the second state is different from the first state.
The target information may be verified by the electronic device, or may be verified by another device that obtains the target information.
Correspondingly, the trigger signal may be generated after the target information is verified and verified by the electronic device, or may be generated when the electronic device receives a verification result sent by another device and the verification result is verified and verified.
And if the target information is verified to pass, the electronic equipment generates a trigger signal to trigger the electronic equipment to be powered on, so that the electronic equipment is switched from the current first state to the second state.
According to the control method, when the electronic equipment is in the power-off state, the target information used for triggering the electronic equipment to execute the state switching operation can be obtained, the target information is verified, and the electronic equipment is controlled to be switched from the power-off state to the second state different from the power-off state by generating the trigger signal based on the verification of the target information, so that the electronic equipment is controlled in a diversified manner when the electronic equipment is in the power-on state, and the intelligence of the electronic equipment is improved.
In an alternative embodiment, the target information may be obtained through an input component.
The input component can belong to the electronic equipment, namely the input component is a component of the electronic equipment; alternatively, the input means may not belong to the electronic device, i.e. the input means is not an integral part of the electronic device.
When the electronic equipment is in a shutdown state, the input component can be in a working state. That is, when the electronic device is in the power-off state, the input component is powered by the power supply, so that the input component can be in the working state when the electronic device is in the power-off state.
Alternatively, the target information may be obtained through one input unit, or may be obtained through a plurality of (i.e., at least two) input units, that is, through at least one input unit.
When the target information is obtained through at least two input means, the at least two input means may be different types of input means of the same device, or may be the same type of input means of the same device; alternatively, the at least two input components may be input components of different devices, and specifically, the at least two input components may be the same type of input components of different devices, or may be different types of input components of different devices.
By way of example, the input component may include, but is not limited to, at least one of: sensor input components (such as cameras, microphones, radar, infrared sensors, fingerprint collectors, etc.); character input means (such as a keyboard, a touch pad, a touch screen, etc.); a network card module; an input/output interface (e.g., a USB interface), etc.
As an example, when the at least two input parts are different types of input parts of the same device, the at least two input parts may include at least a camera and a touch screen of the electronic device, or the at least two input parts may include at least a microphone and a keyboard of the electronic device, and the like.
As an example, when the at least two input parts are input parts of the same type of the same device, the at least two input parts may include at least a camera and a microphone of the electronic device.
As an example, when the at least two input means are input means of the same type of different devices, the at least two input means may include at least cameras of the different devices (the at least two input means include at least two cameras, each of which belongs to a different device), or cameras and microphones of the different devices (i.e., the at least two input means include at least a camera and a microphone, which belong to different devices), and the like.
As an example, when the at least two components are different types of input components of different devices, the at least two input components may include at least a camera, a touch panel, and the like of the different devices.
In an alternative embodiment, if the input component belongs to the electronic device, the target information is verified directly by the electronic device. As an example, the target information may be verified by a target controller (e.g., an embedded controller EC or Esio chip) connected to the input component in the electronic device. That is, when the electronic device is in the power-off state, the target controller is powered by the power supply and is in the working state.
In an alternative embodiment, if the input component does not belong to the electronic device, the target information may be verified by a device (e.g., a smart phone, etc.) to which the input component does not belong, and the verification result (denoted as the first verification result) may be sent to the electronic device. As an example, a device to which an input section not belonging to the electronic device belongs may transmit the first verification result to the electronic device only when the first verification result is verification-passed, and prohibit transmission of the first verification result to the electronic device when the first verification result is non-verification-passed. As an example, a device to which an input section not belonging to the electronic device belongs may also transmit the first verification result to the electronic device regardless of the first verification result.
As an example, the device to which the input component not belonging to the electronic device belongs may send the first verification result to the input component belonging to the electronic device (such as a network card module), or send the first verification result to a target controller of the electronic device (for example, send the first verification result to the target controller through a USB interface, or send the first verification result to an external component of the electronic device through a wireless network, where the external component is connected to the electronic device through the USB interface, so that the external component forwards the first verification result to the target controller through the USB interface), and at this time, the network card module or the target controller of the electronic device is powered by a power supply and is in an operating state. In this embodiment, the input component not belonging to the electronic device (or the device to which the input component not belonging to the electronic device belongs) and the electronic device establish a relationship, for example, a binding relationship, so that the electronic device can be remotely controlled to switch from the first state to the second state directly according to the first verification result sent by the device to which the input component not belonging to the electronic device belongs, for example, the electronic device can be remotely controlled to be powered on directly according to the first verification result sent by the device to which the input component not belonging to the electronic device belongs.
In an alternative embodiment, if the input component does not belong to the electronic device, the target information may be sent to the electronic device by a device to which the input component does not belong, and the target information may be verified by the electronic device. As an example, the device not belonging to the input component of the electronic device may send the target information to the input component (such as a network card module) of the electronic device, or send the target information to the target controller of the electronic device, and then the network card module or the target controller verifies the target information, where the network card module and the target controller of the electronic device are powered by the power supply and are in an operating state.
In an alternative embodiment, in the case where the target information is obtained by at least two input means belonging to different devices, at least one of the at least two input means belongs to the electronic device and at least one of the at least two input means belongs to the other device; based on this, information (denoted as first information) obtained by the electronic apparatus for the input section belonging to the electronic apparatus, and information (denoted as second information) obtained by the input section not belonging to the electronic apparatus but belonging to another apparatus constitute target information, that is, the target information is constituted by the first information and the second information.
Optionally, the electronic device may receive second information sent by another device, and then verify target information formed by the first information and the second information. Or, the electronic device may send the first information to another device, and the other device verifies the target information composed of the first information and the second information, and sends the verification result to the electronic device after obtaining the verification result.
In an alternative embodiment, one implementation manner of the above-mentioned generating a trigger signal may be:
and generating a trigger signal corresponding to the type based on the type of the target information. Different trigger signals may be generated based on different types of target information, and the different trigger signals may be capable of triggering the electronic device to enter different second states.
As an example, if the target information is image information (e.g., a fingerprint, a face image, etc.), a first trigger signal may be generated, where the first trigger signal is used to trigger the electronic device to switch from the power-off state to the normal operating state (i.e., the state of the desktop of the display system).
As an example, if the target information is voice information, a second trigger signal may be generated, where the second trigger signal is used to trigger the electronic device to switch from the power-off state to the system authentication state (i.e., the state where the interface for inputting the login password is displayed).
In the case that the input component does not belong to the electronic device and the target information is verified by the device to which the input component belongs, the device to which the input component belongs may also send the type of the target information to the electronic device, for example, to the input component (such as a network card module) belonging to the electronic device, or to a target controller or the like of the electronic device.
In an alternative embodiment, another implementation manner of generating a trigger signal may be:
and generating a trigger signal corresponding to the content based on the content of the target information. Different trigger signals may be generated based on the target information of different content, and the different trigger signals may trigger the electronic device to enter different second states.
As an example, the target information is voice information. Based on this, if the content of the target information is the first content or the semantic of the content of the target information is the first semantic, a first trigger signal may be generated, where the first trigger signal is used to trigger the electronic device to switch from the power-off state to the normal operating state (i.e., the state of the desktop of the display system).
If the content of the target information is the second content or the semantic of the content of the target information is the second semantic, a second trigger signal may be generated, where the second trigger signal is used to trigger the electronic device to switch from the power-off state to the system verification state (i.e., the state of displaying the interface for inputting the login password), and the second content is different from the first content.
If the content of the target information is the third content or the semantic of the content of the target information is the third semantic, a third trigger signal may be generated, where the third trigger signal is used to trigger the electronic device to switch from the power-off state to the hibernation or sleep state, and the third content is different from both the first content and the second content.
In the case that the input component does not belong to the electronic device and the target information is verified by the device to which the input component belongs, the device to which the input component belongs may also send the content of the target information or the semantics of the content of the target information to the electronic device, for example, to an input component (such as a network card module) belonging to the electronic device, or to a target controller of the electronic device, or the like.
In an alternative embodiment, another implementation manner of the above-mentioned generating a trigger signal may be:
and generating a trigger signal corresponding to the type and the content based on the type and the content of the target information. Different trigger signals may be generated based on different types and content of target information, and the different trigger signals may trigger the electronic device to enter different second states.
As an example, if the target information is image information (e.g., a fingerprint, a face image, etc.), a first trigger signal may be generated, where the first trigger signal is used to trigger the electronic device to switch from the power-off state to the normal operating state (i.e., the state of the desktop of the display system).
As an example, if the target information is voice information, in a case that the content of the target information is first content or the semantic of the content of the target information is first semantic, a second trigger signal may be generated, where the second trigger signal is used to trigger the electronic device to switch from the power-off state to the system verification state (i.e., the state where the interface for inputting the login password is displayed).
As an example, if the target information is voice information, in a case that the content of the target information is a second content or the semantic of the content of the target information is a second semantic, a third trigger signal may be generated, where the third trigger signal is used to trigger the electronic device to switch from the power-off state to the hibernation or sleep state.
In the case that the input component does not belong to the electronic device and the target information is verified by the device to which the input component belongs, the device to which the input component belongs may also send the type and content or semantic of the target information to the electronic device, for example, to the input component (such as a network card module) belonging to the electronic device, or to a target controller of the electronic device, or the like.
In an alternative embodiment, another implementation manner of generating a trigger signal may be:
and generating a corresponding trigger signal based on the verification result of the target information and the type and/or content of the target information. That is, the present application generates a corresponding trigger signal based on at least one of the type and content of the target information and the verification result of the target information.
As an example, in the case that the verification result of the target information is determined based on the matching degree of the target information and the reference information, for example, the verification is passed if the matching degree of the target information and the reference information is greater than a first threshold (for example, 80%), otherwise the verification fails, and the corresponding trigger signal may be generated based on the verification result of the target information and at least one of the type and the content of the target information.
As an example, one implementation of generating a corresponding trigger signal based on the type of target information and the verification result of the target information may be:
if the target information is image information (e.g., a fingerprint, a face image, etc.), and the matching degree between the target information and the reference information is greater than a second threshold (e.g., 95%) when the target information is verified, a first trigger signal may be generated, where the first trigger signal is used to trigger the electronic device to switch from the power-off state to the normal operating state (i.e., the state of the display system desktop), and the second threshold is greater than the first threshold. And/or the presence of a gas in the gas,
if the target information is image information (e.g., a fingerprint, a face image, etc.), and the matching degree between the target information and the reference information when the target information passes the verification is greater than a third threshold (e.g., 90%) and less than a second threshold, a second trigger signal may be generated, where the second trigger signal is used to trigger the electronic device to switch from the power-off state to the system verification state (i.e., the state of displaying the interface for inputting the login password). And/or the presence of a gas in the atmosphere,
if the target information is voice information and the matching degree of the target information and the reference information is greater than a third threshold and smaller than a second threshold when the target information is verified to be passed, a third trigger signal can be generated, and the third trigger signal is used for triggering the electronic device to be switched from the power-off state to the dormant or sleep state. And/or the presence of a gas in the gas,
if the target information is voice information and the matching degree of the target information and the reference information is greater than a second threshold when the target information passes verification, a second trigger signal can be generated, and the second trigger signal is used for triggering the electronic equipment to be switched from the power-off state to the system verification state.
As an example, the target information is voice information. One implementation of generating the corresponding trigger signal based on the content of the target information and the verification result of the target information may be:
if the content of the target information is the first content or the semantic of the content of the target information is the first semantic, and the matching degree (for example, the voiceprint matching degree) of the target information and the reference information is greater than the second threshold, a first trigger signal may be generated, where the first trigger signal is used to trigger the electronic device to switch from the power-off state to the normal operating state (i.e., the state of the display system desktop). And/or the presence of a gas in the gas,
if the content of the target information is the second content or the semantic of the content of the target information is the second semantic, and the matching degree (for example, the voiceprint matching degree) between the target information and the reference information is greater than a third threshold and smaller than a second threshold, a second trigger signal may be generated, where the second trigger signal is used to trigger the electronic device to switch from the power-off state to the system verification state (i.e., the state of displaying the interface for inputting the login password), and the second content is different from the first content; the third threshold is greater than the first threshold. And/or the presence of a gas in the gas,
if the content of the target information is a third content or the semantic of the content of the target information is a third semantic, and the matching degree (for example, the voiceprint matching degree) between the target information and the reference information is greater than the first threshold and less than a third threshold, a third trigger signal may be generated, where the third trigger signal is used to trigger the electronic device to switch from the power-off state to the hibernation or sleep state, and the third content is different from both the first content and the second content.
As an example, one implementation of generating a corresponding trigger signal based on the type, content and verification result of the target information may be:
if the target information is image information, the content of the target information is a fingerprint, and the matching degree of the target information and the reference information is greater than a second threshold when the target information is verified to pass, a first trigger signal can be generated, the first trigger signal is used for triggering the electronic device to be switched from a shutdown state to a normal working state (namely, the state of a display system desktop), and the second threshold is greater than the first threshold. And/or the presence of a gas in the gas,
if the target information is image information, the content of the target information is a face image, and the matching degree between the target information and the reference information is greater than a second threshold when the target information passes verification, a second trigger signal may be generated, where the second trigger signal is used to trigger the electronic device to switch from the power-off state to the system verification state (i.e., the state of displaying the interface for inputting the login password). And/or the presence of a gas in the gas,
if the target information is voice information, if the content of the target information is first content or the semantic of the content of the target information is first semantic, and the matching degree (for example, the voiceprint matching degree) between the target information and the reference information is greater than a second threshold, a third trigger signal may be generated, where the third trigger signal is used to trigger the electronic device to switch from the power-off state to the hibernation state or the sleep state.
The electronic device can provide different functions in different second states. As an example, the electronic device provides more functions in the normal operating state than in the system verification state, and the electronic device provides more functions in the system verification state than in the hibernation or sleep state.
For example, when the second state is a normal working state, the user may browse a web page, edit a document, read an electronic book, use various application programs, and the like; when the second state is a system verification state, the user can only input the password; when the second state is the dormant state or the sleep state, the user can only execute the operation of waking up the electronic equipment.
In an optional embodiment, one implementation manner of the above triggering the electronic device to switch from the current first state to the second state may be:
in response to the trigger signal, the target information or a verification result thereof (i.e., a verification result of verifying the target information) is verified by the boot system of the electronic device, and a verification result (denoted as a second verification result) is obtained, so as to control the electronic device to enter a corresponding second state based on the second verification result.
As an example, the trigger signal may be generated by an embedded controller, and accordingly, the embedded controller may transmit the target information or the verification result thereof to the guidance system in addition to the trigger signal to the guidance system.
As an example, the boot System may be a Basic Input Output System (BIOS).
After monitoring that the electronic equipment is powered on, a boot system on the electronic equipment starts to start, wherein the boot system starting process comprises the following steps: initializing, performing Power On Self Test (POST) (or not performing the Power On Self Test), and booting an operating system, wherein the operating system of the electronic device is started after the booting operation of the operating system is completed.
In the embodiment of the application, in the starting process of the guide system, the guide system further verifies the target information or the verification result of the target information to obtain a second verification result. And the guidance system can control the electronic equipment to enter a second state corresponding to the second verification result according to the second verification result. And controlling the electronic equipment to enter different second states according to different second verification results. The functions provided by the electronic device in the different second states are different. As an example, the electronic device provides more functions in the normal operating state than in the system verification state, and the electronic device provides more functions in the system verification state than in the hibernation or sleep state.
In an optional embodiment, another implementation manner of triggering the electronic device to switch from the current first state to the second state may be:
and responding to the trigger signal, controlling a target input part by a guide system of the electronic equipment to obtain target verification information, verifying the target verification information to obtain a verification result (marked as a third verification result), and controlling the electronic equipment to enter a corresponding second state based on the third verification result.
The target input means may be the input means for obtaining target information described above, based on which the target input means belongs to the electronic device, or may not belong to the electronic device.
As an example, the boot System may be a Basic Input Output System (BIOS).
After monitoring that the electronic equipment is powered on, a boot system on the electronic equipment starts to start, wherein the boot system starting process comprises the following steps: initializing, Power On Self Test (POST) (or not), and booting the operating system, wherein the operating system of the electronic device is started after the booting operation is completed.
In the embodiment of the application, in the boot system starting process, the boot system controls the target input component to obtain new information (recorded as target verification information) for verification, so as to control the electronic device to enter the second state based on a third verification result obtained by verifying the new information. And controlling the electronic equipment to enter different second states according to different third verification results. The electronic device provides different functions in different second states. As an example, the electronic device provides more functions in the normal operating state than in the system verification state, and the electronic device provides more functions in the system verification state than in the hibernation or sleep state.
In an optional embodiment, one implementation manner of the above controlling the electronic device to enter the corresponding second state based on the second verification result or the third verification result may be:
if the operating system of the electronic device has a first authentication relationship with the boot system, for example, the operating system approves the verification result obtained by the boot system, or the operating system authorizes the verification authority to the boot system, the electronic device is controlled to enter a corresponding second state directly based on the second verification result.
If the operating system of the electronic device has a second authentication relationship with the boot system, for example, the operating system does not approve the verification result of the boot system, or if the verification result obtained by the operating system in the boot system is that further verification is required if the verification result is that the verification is passed, the operating system may obtain the target verification information (that is, the boot system sends the obtained target verification information to the operating system), verify the target verification information to obtain a third verification result, and then control the electronic device to enter a corresponding second state based at least on the third verification result.
That is, after the third verification result is obtained, the electronic device may be controlled to enter the corresponding second state based only on the third verification result. Alternatively, the electronic device may be controlled to enter the corresponding second state based on the second verification result and the third verification result.
In an optional embodiment, one implementation manner of the above-mentioned controlling the electronic device to enter the corresponding second state may be:
if the second verification result and/or the third verification result represent verification is passed, controlling the electronic equipment to run an operating system or a target application; or the like, or, alternatively,
and if the second verification result or the third verification result represents that the verification fails (namely, the verification fails), controlling the electronic equipment to enter a restart state or a shutdown state.
Specifically, under the condition that the electronic device is controlled to enter the corresponding second state based on the second verification result or the third verification result, if the second verification result or the third verification result represents that the verification passes, the electronic device is controlled to run the operating system or run the target application. I.e. the second state is running the operating system or running the target application. The operating system may include a plurality of states, for example, a working state (usually a desktop is displayed), a login verification state (a desktop is displayed after a password is input), a hibernation state/sleep state (i.e., the operating system is hibernated or sleeped), and the like. The target application may be a preset power-on started application.
And under the condition that the electronic equipment is controlled to enter the corresponding second state based on the second verification result or the third verification result, if the second verification result or the third verification result both represent verification failure, the electronic equipment is controlled to enter a restart state or a shutdown state.
And under the condition that the electronic equipment is controlled to enter the corresponding second state based on the second verification result and the third verification result, if the second verification result and the third verification result both represent that the verification is passed, the electronic equipment is controlled to run an operating system or a target application, otherwise, the electronic equipment is controlled to enter a restart state or a shutdown state.
In some scenarios, the electronic device has a valid lifetime, that is, the electronic device can only be used within the valid lifetime, for example, if the electronic device belongs to a rented electronic device, the electronic device can only be used within a rented period. On the basis of this, the method is suitable for the production,
in an optional embodiment, one implementation manner of the above-mentioned controlling the electronic device to enter the corresponding second state may be:
and if the third verification result indicates that the electronic equipment is not in the preset effective service life, controlling the electronic equipment to output a payment prompt, and/or controlling the user terminal to output the payment prompt aiming at the electronic equipment.
In the embodiment of the application, the third verification result carries the generation time of the third verification result, if the generation time of the third verification result is within the valid use period, it is determined that the electronic device is in the valid use period content, otherwise, it may be determined that the electronic device is not in the preset valid use period content.
If the electronic equipment is not in the preset effective service life, the payment prompt can be directly output, the payment prompt aiming at the electronic equipment can be output through a preset user terminal, or the electronic equipment and the user terminal both output the payment prompt aiming at the electronic equipment. Under the condition that a payment prompt aiming at the electronic equipment is output through the user terminal, the electronic equipment can be controlled to enter a restarting state or a shutdown state after the payment prompt is output. That is, in the case that the electronic device is not within the preset valid lifetime, even if the second verification result and/or the third verification result represents that the verification passes, the operating system or the target application or the like will not be run.
And if the third verification result indicates that the electronic equipment is in the preset valid service life, the electronic equipment can be controlled to provide the function matched with the third verification result for the current user. The electronic device may be controlled to switch to a second state corresponding to the third verification result, so that the electronic device provides a function matching the third verification result to the current user.
In some scenarios, the electronic device is of a valid geographic range, that is, the electronic device can only be used if the electronic device is within the valid geographic range, otherwise the electronic device cannot be used, for example, a shared device of a company or the like. On the basis of this, the method is suitable for the production,
in an optional embodiment, one implementation manner of the above controlling the electronic device to enter the corresponding second state may be:
and if the third verification result indicates that the electronic equipment is not in the preset effective geographic range, sending a position change request for obtaining the use permission of the electronic equipment to the target equipment so as to control the electronic equipment to provide a function matched with the request result after obtaining the corresponding request result.
In this embodiment of the application, the third verification result carries position information of the electronic device, where the position information may be position information of an input component belonging to the electronic device.
As an example, the input component may determine the location information of the input component according to a wireless network accessed by the input component, may determine location information (correspondence between an access point and the location information may be preset) corresponding to an access point (e.g., a wifi router, a wifi hotspot, etc.) of a target network as the location of the input component, may determine whether the location of the input component is a target location, and if so, determine that the input component is within a valid geographic range, otherwise, determine that the input component is not within the valid geographic range.
The target device may be a server, a management terminal, or the like.
As an example, the location change request sent by the electronic device may carry location information of the electronic device, so that the target device determines whether to open the usage right of the electronic device for the electronic device according to the location information of the electronic device.
As an example, the server may send the location change request to the management terminal, and the user of the management terminal may select whether to set the location of the electronic device as the valid geographic range of the electronic device.
As an example, after obtaining the location change request, the management terminal displays a location change request interface, where location information of the electronic device is displayed in the interface, after seeing the location information of the electronic device, a user of the management terminal selects whether to set the location of the electronic device as an effective geographic range of the electronic device according to actual requirements, the management terminal generates a request result (the location of the electronic device is set as the effective geographic range of the electronic device, or the location of the electronic device is not set as the effective geographic range of the electronic device) according to the user selection and returns the request result to the electronic device or the server, and the server returns the request result to the electronic device.
As an example, after the electronic device obtains the request result, if the request result is to set the location of the electronic device to the valid geographic range of the electronic device, the electronic device may be controlled to provide a function matching the third verification result, otherwise, the electronic device is prohibited from providing the function matching the third verification result.
In some scenarios, the electronic device may set different usage rights for different users. On the basis of this, the method is suitable for the production,
in an optional embodiment, one implementation manner of the above controlling the electronic device to enter the corresponding second state may be:
and if the third verification result indicates that the user of the electronic equipment has the first use right, controlling the electronic equipment to provide related functions based on the basic input output system, provide related functions based on the operating system or provide part of related functions based on the operating system.
In the embodiment of the application, the third verification result may carry the identity characteristic information of the user, and based on this, the target verification information may include a face image or a fingerprint, so that when the third verification result is obtained, feature extraction may be performed on the face image or the fingerprint, so as to obtain the identity characteristic information of the user, and then the usage right (marked as the first usage right) of the user is determined according to the identity characteristic information.
In the application, no matter what the authority of the user is, all related functions are provided based on the bios, that is, the related functions provided based on the bios are not limited, and the related functions provided based on the os are limited only according to the authority of the user, for example, if the first authority is that all functions provided by the os can be used, all related common functions are provided based on the os, otherwise, some related functions are provided based on the os. Which part of the functionality is specifically provided is determined by the actual setup.
Another implementation flowchart of the control method provided in the embodiment of the present application is shown in fig. 2, and may include:
step S201: and acquiring target voice information, wherein the target voice information is used for triggering the electronic equipment to execute the starting operation.
According to the method and the device, when the electronic equipment is in the power-off state, the target voice information is obtained.
The target voice information may be obtained by the electronic device or may be obtained by another device.
Step S202: if the target voice information is verified to pass, generating a corresponding trigger signal to trigger the electronic equipment to be switched from the current power-off state to a non-power-off state, wherein the non-power-off state comprises the following steps: a sleep state, or an active state.
When the electronic device is in the sleep state and the sleep state, only the basic input and output system is started, but the operating system is not started, and when the electronic device is in the working state, both the basic input and output system and the operating system are started.
The target voice information may be verified by the electronic device. In this case, if the target voice information is obtained by the other device, the other device needs to transmit the obtained target voice information to the electronic device.
Alternatively, the first and second electrodes may be,
the target voice information may be verified by the other device that obtained the target voice information, and the other device may transmit the verification result to the electronic device.
The electronic device or other devices can verify the target voice information by the following method:
carrying out voice recognition on the target voice information to obtain voice content; and judging whether the voice content is the target voice content, if so, passing the verification, and otherwise, failing to verify.
Alternatively, the first and second electrodes may be,
extracting voiceprint characteristics of the target voice information; and comparing the extracted voiceprint features with pre-stored target voiceprint features, if the extracted voiceprint features are matched with the target voiceprint features, determining that the verification is passed, and if not, failing to verify.
Alternatively, the first and second electrodes may be,
firstly, extracting voiceprint characteristics of target voice information; comparing the extracted voiceprint features with pre-stored target voiceprint features, and if the extracted voiceprint features are matched with the target voiceprint features, performing voice recognition on target voice information to obtain voice content; judging whether the voice content is the target voice content, if so, passing the verification, and if not, failing the verification; and if the extracted voiceprint features do not match the target voiceprint features, determining that the verification fails.
Alternatively, the first and second liquid crystal display panels may be,
the target voice information can be subjected to voice recognition to obtain voice content; judging whether the voice content is the target voice content, if so, carrying out voiceprint feature extraction on the target voice information; comparing the extracted voiceprint features with pre-stored target voiceprint features, if the extracted voiceprint features are matched with the target voiceprint features, the verification is passed, and if the extracted voiceprint features are not matched with the target voiceprint features, the verification is failed; if the voice content is not the target voice content, the authentication fails.
Alternatively, the first and second electrodes may be,
carrying out voice recognition on the target voice information to obtain voice content; judging whether the voice content is the target voice content, if so, passing the verification, and otherwise, performing semantic analysis on the target content; and judging whether the analyzed semantics are the target semantics, if so, determining that the verification is passed, and if not, determining that the verification is failed.
Alternatively, the first and second electrodes may be,
carrying out voice recognition on the target voice information to obtain voice content; performing semantic analysis on the target content; and judging whether the analyzed semantics are target semantics, if so, determining that the verification is passed, and otherwise, failing to verify.
As an example, after the electronic device obtains the verification result, if the verification result represents that the verification passes, a corresponding trigger signal may be generated according to different voice information to trigger the electronic device to switch from the current power-off state to the non-power-off state.
That is, different voice messages correspond to different trigger signals, and different trigger signals can trigger the electronic device to switch from the power-off state to different non-power-off states.
The difference of the voice information can be embodied as: the voiceprint features are different (different voiceprint features typically represent different identities) and/or the speech content is different and/or the semantics are different.
When the target voice information is verified by other devices and the verification result is sent to the electronic device, the other devices are devices having an association relationship with the electronic device, for example, the input component of the other devices is bound with the electronic device, or the other devices are bound with the electronic device component, and the electronic device can be remotely controlled to be switched from the power-on state to the non-power-on state directly according to the verification result sent by the other devices.
According to the control method provided by the embodiment of the application, the target voice information is obtained when the electronic equipment is in the power-on state, the target voice information is verified, and the electronic equipment generates the corresponding trigger signal to trigger the electronic equipment to be switched from the current power-off state to the non-power-off state when the verification is passed. The purpose of awakening the electronic equipment by voice in the shutdown state of the electronic equipment is achieved, and the intelligence of the electronic equipment is improved.
In an optional embodiment, the target voice information collected by the voice collecting unit (such as a microphone) may be obtained through a controller (denoted as a first controller) of the electronic device, and based on this, when the electronic device is in a shutdown state, both the first controller and the voice collecting unit are powered by a power supply and are in an operating state.
In an optional embodiment, the electronic device may receive, through the first controller, target voice information sent by another device or a verification result of verifying the target voice information, based on which, when the electronic device is in the power-off state, the first controller is powered by a power supply and is in the working state.
In an optional embodiment, in a case that the first controller obtains the target voice information, the first controller may verify the target voice information, and generate a trigger signal when the verification passes, so as to trigger the electronic device to switch from the current power-off state to the power-off state.
In an optional embodiment, the first controller generates a trigger signal to trigger the electronic device to switch from the current power-off state to the non-power-off state when the verification result is that the verification is passed, in a case that the verification result sent by the other device is obtained.
In an optional embodiment, one implementation manner of the first controller triggering the electronic device to switch from the current power-off state to the non-power-off state may be:
sending a trigger signal to a second controller of the electronic equipment by the first controller so as to wake up the second controller;
the electronic device is switched from the powered-off state to the non-powered-off state by the second controller.
As an example, the first Controller may be an embedded Controller and the second Controller may be a bridge, such as a pch (platform Controller hub).
In an alternative embodiment, in the case where the target voice message is verified by the first controller, the first controller prohibits the verification of the target voice message if the electronic device is in the operating state.
And the target voice information is coded by the voice coder-decoder of the electronic equipment and then sent to the second controller, so that the second controller can process the coded voice information to realize the preset function. What preset function is specifically implemented is determined by the actual operating conditions of the electronic device.
In an optional embodiment, in the case that the target voice information is acquired by the voice acquisition unit of the electronic device, when the electronic device is in an operating state, if the first controller obtains a new voice feature creation instruction, the first controller obtains the voice information acquired by the voice acquisition unit (which is recorded as new voice information), and performs feature extraction on the new voice information to obtain a target voice feature (for example, a target voiceprint feature, and/or a target voice content, and/or a target semantic, and the like), where the target voice feature is used for verifying the target voice information.
As an example, one implementation of the first controller obtaining the voice feature new instruction may be: the first controller receives a voice feature new establishment instruction sent by the second controller, and the voice feature new establishment instruction is sent to the first controller when the second controller receives a voice feature new establishment instruction sent by the interactive application.
Wherein the interactive application is responsive to interactive operation by a user of the electronic device to send a voice feature creation indication to the second controller.
As shown in fig. 3, an exemplary diagram of a system architecture diagram of the solution provided by the embodiment of the present application mainly relates to:
digital microphone, embedded controller EC, voice codec, audio driver, south bridge PCH, interactive application AP, etc.
In this example, the digital microphone and the embedded controller EC are in an operating state when the electronic device is in an off state (S5 state).
When the electronic device is in a power-off state, the digital microphone may collect voice information (marked as target voice information), and send the collected target voice information to the EC, a voice engine in the EC verifies the target voice information, and when the verification passes, a trigger signal (for example, PWRON #) is generated, and the trigger signal is sent to the south bridge, and the south bridge wakes up other components in the electronic device.
When the electronic device is in the power-off state, the digital microphone does not send the target voice information to the voice codec because the voice codec is in the power-off state.
When the electronic device is turned on and voice information needs to be collected, for example, a user uses communication software to perform voice communication, the digital microphone can still collect voice information (recorded as communication voice information) and send the collected communication voice information to the voice encoder/decoder and the EC, but at this time, a voice engine in the EC does not verify the communication voice information, that is, does not process the communication voice information.
After receiving the communication voice information, the voice encoder/decoder combines with the audio driver to encode the communication voice information, and sends the encoded voice information to the PCH, and the PCH sends the encoded voice (i.e., sends the encoded voice to a device performing voice communication with the electronic device).
When the electronic equipment is in a starting state, the interactive application AP also provides an interactive interface, a user can trigger the interactive application AP to generate a voice feature new establishment instruction by operating the interactive interface, the interactive application AP sends the voice feature new establishment instruction to the PCH, the PCH sends the voice feature new establishment instruction to the EC, a voice engine in the EC receives the voice feature new establishment instruction, acquires voice information through a digital microphone and performs feature extraction on the acquired voice information to establish a target voice feature, and the target voice feature can be stored in Flash of the EC. The SRAM in the EC may be used to store the speech algorithm called by the speech engine, which is about 128KB in size.
Corresponding to the method embodiment, an embodiment of the present application further provides a control device, and a schematic structural diagram of the control device provided in the embodiment of the present application is shown in fig. 4, and may include:
an obtaining module 401 and a triggering module 402; wherein the content of the first and second substances,
in an alternative embodiment of the present invention,
the obtaining module 401 is configured to obtain target information, where the target information is used to trigger an electronic device to perform a state switching operation;
the triggering module 402 is configured to generate a triggering signal to trigger the electronic device to switch from a current first state to a second state if the target information is verified, where the first state includes a shutdown state, and the second state is different from the first state.
The control device provided by the embodiment of the application can acquire the target information for triggering the electronic equipment to execute the state switching operation when the electronic equipment is in the power-off state, verify the target information, and generate the trigger signal based on the verification of the target information so as to control the electronic equipment to be switched from the power-off state to the second state different from the power-off state, thereby realizing the diversified control of the electronic equipment when the electronic equipment is in the power-on state and improving the intelligence of the electronic equipment.
In an optional embodiment, the obtaining module 401, when obtaining the target information, is configured to:
the target information is obtained through at least one input component, and when the electronic equipment is in a power-off state, the input component can be in a working state, and the input component belongs to or does not belong to the electronic equipment.
In an optional embodiment, the apparatus further comprises a verification module configured to:
if the input component belongs to the electronic equipment, verifying the target information; or the like, or, alternatively,
and if the input component does not belong to the electronic equipment, obtaining a first verification result of the target information, or obtaining the target information collected by the input component not belonging to the electronic equipment and verifying the target information.
In an alternative embodiment, the trigger module 402, when generating a trigger signal, is configured to:
generating a corresponding trigger signal based on the type and/or content of the target information; or the like, or, alternatively,
generating a corresponding trigger signal based on the verification result of the target information and the type and/or content of the target information;
wherein different trigger signals can trigger the electronic device to enter different second states.
In an optional embodiment, when the triggering module 402 triggers the electronic device to switch from the current first state to the second state, the triggering module is configured to:
verifying the target information or a verification result thereof by a guidance system of the electronic equipment in response to the trigger signal so as to control the electronic equipment to enter a corresponding second state based on an obtained second verification result; or the like, or a combination thereof,
in response to the trigger signal, a guide system of the electronic equipment controls a target input component to obtain target verification information, and the target verification information is verified to control the electronic equipment to enter a corresponding second state based on an obtained third verification result;
wherein the functions that the electronic device can provide in different second states are different.
In an optional embodiment, when the triggering module 402 controls the electronic device to enter the corresponding second state, it is configured to:
if the operating system of the electronic equipment has a first authentication relationship with the guide system, controlling the electronic equipment to enter a corresponding second state based on the second verification result; or the like, or, alternatively,
and if the operating system of the electronic equipment has a second authentication relationship with the boot system, obtaining the target verification information, and controlling the electronic equipment to enter a corresponding second state at least based on the third verification result.
In an optional embodiment, when the triggering module 402 controls the electronic device to enter the corresponding second state, it is configured to:
if the second verification result and/or the third verification result represent verification passes, controlling the electronic equipment to run an operating system or a target application; or the like, or, alternatively,
and if the second verification result or the third verification result represents that the verification fails, controlling the electronic equipment to enter a restart state or a shutdown state.
In an optional embodiment, when the triggering module 402 controls the electronic device to enter the corresponding second state, the triggering module is configured to:
if the third verification result represents that the electronic equipment is not in a preset effective service life, controlling the electronic equipment to output a payment prompt, and/or controlling a user terminal to output the payment prompt aiming at the electronic equipment; or the like, or, alternatively,
if the third verification result indicates that the electronic equipment is in the valid service life, controlling the electronic equipment to provide a function matched with the verification result for the current user; or the like, or, alternatively,
if the third verification result represents that the electronic equipment is not in a preset effective geographic range, sending a position change request for obtaining the use permission of the electronic equipment to target equipment so as to control the electronic equipment to provide a function matched with the request result after obtaining a corresponding request result; or the like, or, alternatively,
and if the third verification result indicates that the user of the electronic equipment has the first use authority, controlling the electronic equipment to provide related functions based on the basic input output system, provide related functions based on the operating system or provide part of related functions based on the operating system.
In a further alternative embodiment of the method,
the obtaining module 401 is configured to obtain target voice information, where the target voice information is used to trigger an electronic device to execute a boot operation;
the triggering module 402 is configured to generate a corresponding triggering signal to trigger the electronic device to switch from a current power-off state to a power-off state if the target voice information is verified, where the power-off state includes: a sleep state, or an active state.
Corresponding to the embodiment of the method, the present application further provides an electronic device, a schematic structural diagram of which is shown in fig. 5, and the electronic device may include: at least one processor 1, at least one communication interface 2, at least one memory 3 and at least one communication bus 4.
In the embodiment of the present application, the number of the processor 1, the communication interface 2, the memory 3, and the communication bus 4 is at least one, and the processor 1, the communication interface 2, and the memory 3 complete mutual communication through the communication bus 4.
The processor 1 may be an embedded controller EC, or an application Specific Integrated circuit asic, or one or more Integrated circuits configured to implement embodiments of the present application, etc.
The memory 3 may comprise a high-speed RAM memory, and may further comprise a non-volatile memory (non-volatile memory) or the like, such as at least one disk memory.
Wherein the memory 3 stores a program, and the processor 1 may call the program stored in the memory 3, the program being configured to:
acquiring target information, wherein the target information is used for triggering electronic equipment to execute state switching operation;
and if the target information is verified to pass, generating a trigger signal to trigger the electronic equipment to be switched from a current first state to a second state, wherein the first state comprises a power-off state, and the second state is different from the first state.
Alternatively, the first and second electrodes may be,
the program is for:
obtaining target voice information, wherein the target voice information is used for triggering the electronic equipment to execute a starting operation;
if the target voice information is verified to pass, generating a corresponding trigger signal to trigger the electronic equipment to be switched from a current power-off state to a non-power-off state, wherein the non-power-off state comprises: a sleep state, or an active state.
Alternatively, the detailed function and the extended function of the program may be as described above.
Embodiments of the present application further provide a storage medium, where a program suitable for execution by a processor may be stored, where the program is configured to:
acquiring target information, wherein the target information is used for triggering electronic equipment to execute state switching operation;
and if the target information is verified to pass, generating a trigger signal to trigger the electronic equipment to be switched from a current first state to a second state, wherein the first state comprises a power-off state, and the second state is different from the first state.
Alternatively, the first and second liquid crystal display panels may be,
the program is for:
obtaining target voice information, wherein the target voice information is used for triggering the electronic equipment to execute a starting operation;
if the target voice information is verified to pass, generating a corresponding trigger signal to trigger the electronic equipment to be switched from a current power-off state to a non-power-off state, wherein the non-power-off state comprises: a sleep state, or an active state.
Alternatively, the detailed function and the extended function of the program may be as described above.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
It should be understood that the technical problems can be solved by combining and combining the features of the embodiments from the claims.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of controlling, the method comprising:
acquiring target information, wherein the target information is used for triggering electronic equipment to execute state switching operation;
and if the target information is verified to pass, generating a trigger signal to trigger the electronic equipment to be switched from a current first state to a second state, wherein the first state comprises a power-off state, and the second state is different from the first state.
2. The method of claim 1, the obtaining target information, comprising:
the target information is obtained through at least one input component, when the electronic equipment is in a shutdown state, the input component can be in a working state, and the input component belongs to or does not belong to the electronic equipment.
3. The method of claim 2, further comprising:
if the input component belongs to the electronic equipment, verifying the target information; and/or the presence of a gas in the atmosphere,
and if the input component does not belong to the electronic equipment, obtaining a first verification result of the target information, or obtaining the target information collected by the input component not belonging to the electronic equipment and verifying the target information.
4. The method of claim 1, the generating a trigger signal comprising:
generating a corresponding trigger signal based on the type and/or content of the target information;
or the like, or a combination thereof,
generating a corresponding trigger signal based on the verification result of the target information and the type and/or content of the target information;
wherein different trigger signals can trigger the electronic device to enter different second states.
5. The method of any of claims 1-4, wherein triggering the electronic device to switch from a current first state to a second state comprises:
verifying the target information or a verification result thereof by a guidance system of the electronic equipment in response to the trigger signal so as to control the electronic equipment to enter a corresponding second state based on an obtained second verification result; or the like, or, alternatively,
in response to the trigger signal, a guide system of the electronic equipment controls a target input component to obtain target verification information, and the target verification information is verified to control the electronic equipment to enter a corresponding second state based on an obtained third verification result;
wherein the electronic device can provide different functions in different second states.
6. The method of claim 5, wherein controlling the electronic device to enter a corresponding second state comprises:
if the operating system of the electronic equipment has a first authentication relationship with the boot system, controlling the electronic equipment to enter a corresponding second state based on the second verification result; or the like, or, alternatively,
and if the operating system of the electronic equipment has a second authentication relationship with the boot system, obtaining the target verification information, and controlling the electronic equipment to enter a corresponding second state at least based on the third verification result.
7. The method of claim 6, wherein controlling the electronic device to enter a corresponding second state comprises:
if the second verification result and/or the third verification result represent verification passes, controlling the electronic equipment to run an operating system or a target application; or the like, or, alternatively,
and if the second verification result or the third verification result represents that the verification fails, controlling the electronic equipment to enter a restart state or a shutdown state.
8. The method of claim 5, wherein controlling the electronic device to enter a corresponding second state comprises:
if the third verification result represents that the electronic equipment is not in a preset effective service life, controlling the electronic equipment to output a payment prompt, and/or controlling a user terminal to output the payment prompt aiming at the electronic equipment; or the like, or a combination thereof,
if the third verification result indicates that the electronic equipment is in the valid service life, controlling the electronic equipment to provide a function matched with the verification result for the current user; or the like, or, alternatively,
if the third verification result represents that the electronic equipment is not in a preset effective geographic range, sending a position change request for obtaining the use permission of the electronic equipment to target equipment so as to control the electronic equipment to provide a function matched with the request result after obtaining a corresponding request result; or the like, or, alternatively,
and if the third verification result indicates that the user of the electronic equipment has the first use authority, controlling the electronic equipment to provide related functions based on the basic input output system, provide related functions based on the operating system or provide part of related functions based on the operating system.
9. A control method, comprising:
obtaining target voice information, wherein the target voice information is used for triggering the electronic equipment to execute a starting operation;
if the target voice information is verified to pass, generating a corresponding trigger signal to trigger the electronic equipment to be switched from a current power-off state to a non-power-off state, wherein the non-power-off state comprises: dormant state, sleep state, or active state.
10. A control device, comprising:
the system comprises an obtaining module, a state switching module and a processing module, wherein the obtaining module is used for obtaining target information, and the target information is used for triggering the electronic equipment to execute state switching operation;
the triggering module is configured to generate a triggering signal to trigger the electronic device to switch from a current first state to a second state if the target information is verified, where the first state includes a shutdown state, and the second state is different from the first state.
CN202210196628.8A 2022-03-01 2022-03-01 Control method, control device, electronic equipment and storage medium Pending CN114546093A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210196628.8A CN114546093A (en) 2022-03-01 2022-03-01 Control method, control device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210196628.8A CN114546093A (en) 2022-03-01 2022-03-01 Control method, control device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114546093A true CN114546093A (en) 2022-05-27

Family

ID=81661800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210196628.8A Pending CN114546093A (en) 2022-03-01 2022-03-01 Control method, control device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114546093A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853339A (en) * 2009-04-01 2010-10-06 纬创资通股份有限公司 Remote control method used for computer system and related device thereof
CN105374357A (en) * 2015-11-23 2016-03-02 青岛海尔智能技术研发有限公司 Voice recognition method, device and voice control system
WO2018010596A1 (en) * 2016-07-14 2018-01-18 华为技术有限公司 Mode switching method and device
CN110020518A (en) * 2018-01-10 2019-07-16 敦泰电子有限公司 A kind of terminal control method based on fingerprint recognition key, device and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853339A (en) * 2009-04-01 2010-10-06 纬创资通股份有限公司 Remote control method used for computer system and related device thereof
CN105374357A (en) * 2015-11-23 2016-03-02 青岛海尔智能技术研发有限公司 Voice recognition method, device and voice control system
WO2018010596A1 (en) * 2016-07-14 2018-01-18 华为技术有限公司 Mode switching method and device
CN110020518A (en) * 2018-01-10 2019-07-16 敦泰电子有限公司 A kind of terminal control method based on fingerprint recognition key, device and terminal

Similar Documents

Publication Publication Date Title
US11698792B2 (en) Method for starting up device and device
EP3627809B1 (en) Method and device for reducing power consumption of mobile terminal, storage medium and mobile terminal
US9779419B2 (en) Activating display and performing user authentication in mobile terminal with one-time user input
US20130326582A1 (en) Above-lock notes
CN107450839B (en) Control method and device based on black screen gesture, storage medium and mobile terminal
KR102150778B1 (en) Information image display method and device
CN110515533B (en) Electronic equipment shortcut operation method and device, electronic equipment and storage medium
CN105160217A (en) Application control method for intelligent watch and intelligent watch
CN106250747B (en) Information processing method and electronic equipment
CN110888724B (en) Split setting method and device, electronic equipment and readable storage medium
CN102982270A (en) Computer fingerprint login system based on BIOS (basic input / output system)
CN111125664A (en) Electronic equipment and method for logging in operating system
CN101194456A (en) Secure rapid navigation and power control for a computer
CN101359354A (en) Method and system for implementing power-on protection
CN112084478A (en) Multi-user account switching method and device, electronic equipment and storage medium
CN107729775B (en) Method and device for realizing switching between intelligent secret key equipment modes
CN110309640B (en) Electronic equipment starting method and electronic equipment
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN114546093A (en) Control method, control device, electronic equipment and storage medium
CN112667067A (en) Payment method and device and electronic equipment
CN111581630A (en) Computer unlocking method, device, equipment and medium
CN111813456A (en) Method and system for customizing boot logo
CN109923593B (en) Fingerprint module, fingerprint identification system, control method and intelligent lock
TWI430133B (en) Biosensing boot apparatus, boot management system controlled by biometric sensor and method thereof
CN108668310B (en) Control method of detection device, detection device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination