WO2020124920A1 - 一种语音交互的方法及蓝牙设备 - Google Patents

一种语音交互的方法及蓝牙设备 Download PDF

Info

Publication number
WO2020124920A1
WO2020124920A1 PCT/CN2019/084369 CN2019084369W WO2020124920A1 WO 2020124920 A1 WO2020124920 A1 WO 2020124920A1 CN 2019084369 W CN2019084369 W CN 2019084369W WO 2020124920 A1 WO2020124920 A1 WO 2020124920A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
bluetooth
authentication
message
bluetooth device
Prior art date
Application number
PCT/CN2019/084369
Other languages
English (en)
French (fr)
Inventor
孙维国
吴海全
顾卫锋
张恩勤
曹磊
师瑞文
Original Assignee
深圳市冠旭电子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市冠旭电子股份有限公司 filed Critical 深圳市冠旭电子股份有限公司
Publication of WO2020124920A1 publication Critical patent/WO2020124920A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/28Constructional details of speech recognition systems
    • G10L15/30Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/225Feedback of the input speech

Definitions

  • the invention relates to the field of Bluetooth communication, in particular to a voice interaction method, Bluetooth device and computer-readable storage medium.
  • embodiments of the present invention provide a voice interaction method and a Bluetooth device.
  • the client can be ensured that it is not occupied by other Bluetooth devices, which is beneficial to improving the user's experience.
  • a first aspect of the embodiments of the present invention provides a voice interaction method, which is applied to a Bluetooth device.
  • the method includes:
  • the first encrypted data is returned to the client, where the first encrypted data is used to instruct the client to pre-access according to the received first encrypted data Of Bluetooth devices for identity authentication;
  • the authentication result message is that the authentication is successful, obtain the user's voice message and send a request to establish a Bluetooth connection to the client;
  • the obtained voice message is sent to the client through the established Bluetooth connection to instruct the client to process the voice information ;
  • a second aspect of the embodiments of the present invention provides a Bluetooth terminal.
  • the Bluetooth device includes:
  • the first sending module is configured to return the first encrypted data to the client if an authentication request sent by the client is received, where the first encrypted data is used to instruct the client according to the received 1. Encrypt data to authenticate the pre-accessed Bluetooth device;
  • a first receiving module configured to receive the authentication result message sent by the client
  • An obtaining module configured to obtain the user's voice message and send a request to establish a Bluetooth connection to the client if the authentication result message is successful authentication;
  • a second sending module configured to send the acquired voice message to the client through the established Bluetooth connection after receiving the message that the client has established a successful Bluetooth connection establishment to indicate the client Processing the voice information
  • the second receiving module is used to receive and play the processed voice message returned by the client.
  • a third aspect of the embodiments of the present invention provides a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the method mentioned in the first aspect is implemented.
  • the embodiment of the present invention has the following beneficial effects:
  • the first encrypted data is returned to the client, wherein the first The encrypted data is used to instruct the client to perform identity authentication on the pre-accessed Bluetooth device according to the received first encrypted data, receive an authentication result message sent by the client, and obtain if the authentication result message is that the authentication is successful.
  • a user's voice message and sends a request to establish a Bluetooth connection to the client, and after receiving the message that the client established a successful Bluetooth connection, sends the acquired Bluetooth connection to the client through the established Bluetooth connection
  • the voice message is to instruct the client to process the voice information, and receive and play the processed voice message returned by the client.
  • the embodiment of the present invention can authenticate the Bluetooth device to be accessed to ensure that the client is not occupied by other Bluetooth devices, which is conducive to improving the user's experience, and has strong ease of use and practicality Sex.
  • FIG. 1 is a schematic flowchart of a voice interaction method according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of a voice interaction method according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic structural diagram of a Bluetooth device according to Embodiment 3 of the present invention.
  • the term “if” may be interpreted as “when” or “once” or “in response to determination” or “in response to detection” depending on the context .
  • the phrase “if determined” or “if [described condition or event] is detected” may be interpreted in the context to mean “once determined” or “in response to a determination” or “once detected [described condition or event ]” or “In response to detection of [the described condition or event]”.
  • FIG. 1 is a schematic flowchart of a voice interaction method according to Embodiment 1 of the present invention.
  • the execution subject of this embodiment is a Bluetooth device.
  • the method may include the following steps:
  • S101 If an authentication request sent by the client is received, return first encrypted data to the client, where the first encrypted data is used to instruct the client to perform pre-processing according to the received first encrypted data
  • the connected Bluetooth device performs identity authentication.
  • the Bluetooth device includes, but is not limited to, Bluetooth products such as Bluetooth headsets and Bluetooth speakers that support voice input;
  • the client refers to an application that can run on a mobile terminal and has a specific function, and Called APP (Application);
  • the authentication request contains a random number, which can be randomly generated by the mobile terminal or other devices as needed; in addition, in order to distinguish it from the encrypted data sent by the subsequent client, the present invention sends the Bluetooth device
  • the encrypted data is named as the first encrypted data.
  • the model of the main control chip in the Bluetooth device is CSR8670.
  • the length of the random number is 10 bytes.
  • the types of random numbers include but are not limited to numbers, letters, and/or other characters.
  • the client can be obtained by scanning the QR code on the bottom of the Bluetooth device.
  • the above mobile terminals include but are not limited to smart phones, tablet computers and IPads.
  • the Bluetooth device and the client perform authentication data transmission through a Bluetooth serial port communication protocol (Serial Port Profile, SPP) or a Bluetooth low energy protocol (Bluetooth Low Energy, BLE).
  • SPP Serial Port Profile
  • BLE Bluetooth Low Energy
  • the client can authenticate the pre-accessed Bluetooth device based on the basic information of the Bluetooth device contained in the encrypted data, This ensures that only the desired Bluetooth device can access the client, and avoids the situation where the client is occupied by other Bluetooth devices.
  • S102 Receive an authentication result message sent by the client.
  • the authentication result message includes authentication success and authentication failure.
  • the user's voice information can be obtained through the microphone or microphone array on the Bluetooth device.
  • the microphone array should include at least two microphones, and the successful authentication can be used as a preset trigger acquisition condition.
  • the Bluetooth device in order to provide the user with a better user experience during the voice interaction process, can be controlled to adopt the recording-side transmission processing mechanism when performing data transmission with the client.
  • the user's voice information may be acquired at a preset interval, so as to wake up the Bluetooth terminal first.
  • the user's voice information can be obtained at the same time as other sound information related to the user, such as the sound of the user switching the TV and the sound of opening and closing the security door, so as to assist the client to determine the user's intention.
  • a request to establish a Bluetooth connection is sent to the client based on the HFP protocol.
  • the voice information contains the needs of the user, and the needs of the user include but are not limited to the query of the weather, the query of the stock, the query of the flight, and the query of the traffic limit.
  • S104 After receiving the message that the client has established a successful Bluetooth connection, send the acquired voice message to the client through the established Bluetooth connection to indicate the client to the voice information Be processed.
  • the client after receiving the request for establishing a Bluetooth connection sent by the Bluetooth device, the client will establish a connection with the Bluetooth device, and upon successful establishment of the connection, feed back a message of successful connection establishment to the Bluetooth device .
  • the voice recognition function of the client is activated accordingly.
  • the processing of voice information by the client includes, but is not limited to, parsing, querying, matching, and returning corresponding voice messages of the voice information.
  • the Bluetooth device is controlled to send voice information in a standard AT command format to the client.
  • S105 Receive and play the processed voice message returned by the client.
  • the Bluetooth device is controlled to use a processing mechanism of receiving while playing in the interaction with the client.
  • flexible adjustments can be made according to needs, for example: after receiving all the returned voice information, then playing.
  • the authentication of the Bluetooth device to be accessed can ensure that the client is not occupied by other Bluetooth devices, which is conducive to improving the user's experience and has strong usability and practicality. .
  • FIG. 2 is a schematic flowchart of a voice interaction method provided in Embodiment 2 of the present invention, which is a further refinement and description of step S102 in Embodiment 1 described above.
  • the execution subject of this embodiment is a Bluetooth device, and the method may include the following step:
  • S201 If an authentication request sent by the client is received, return first encrypted data to the client, where the first encrypted data is used to instruct the client to perform pre-processing according to the received first encrypted data
  • the connected Bluetooth device performs identity authentication.
  • S202 Receive an authentication result message sent by the client.
  • steps S201-S202 are the same as the steps S101-S102 in the first embodiment.
  • steps S101-S102 please refer to the descriptions of the steps S101-S102, which will not be repeated here.
  • the second encrypted data corresponds to the first encrypted data, and its generation principle and type can refer to the related description of the first encrypted data in the foregoing first embodiment, and details are not repeated herein.
  • the client should have a meaningful name that can clearly indicate its own function.
  • the client can be considered as a legally accessible client.
  • the Bluetooth device can be awakened by using a preset wake-up keyword, so as to subsequently obtain the user's voice information.
  • S205 Obtain the user's voice message, and send a request to establish a SCO connection to the client.
  • the SCO connection is also called a symmetric connection or a synchronization-oriented connection, which belongs to a type of Bluetooth connection and is used to transmit voice information.
  • the cloud server has powerful computing capabilities, it can guarantee the accuracy of voice recognition; at the same time, it has rich network resources to facilitate the provision of diverse content services to users.
  • the acquired voice information is sent to the cloud server for processing through an HTTP port.
  • the above-mentioned communication connection may be a wireless communication connection or a communication connection established in other manners, and the present invention does not limit this too much.
  • the cloud server After receiving the voice information sent by the client, the cloud server will perform corresponding voice recognition and semantic analysis, and make a corresponding voice response according to the instructions in the voice.
  • S207 Receive and play the processed voice message returned by the client.
  • the Bluetooth device is controlled to process the newly acquired voice information. Specifically, in one embodiment, if a new voice message is received when the processed voice message returned by the client is played, the current playback is stopped, and the acquired new voice message is sent to The client.
  • the processed voice information returned by the client can also be played through the A2DP link.
  • the second embodiment of the present application provides a specific embodiment of the two-way authentication of the Bluetooth device and the client, so as to ensure that the Bluetooth device can access the secure client, and realize the voice recognition service and specific
  • the binding function of the client has strong usability and practicality.
  • the Bluetooth device 3 of this embodiment includes: a processor 30, a memory 31, and a computer program 32 stored in the memory 31 and executable on the processor 30.
  • the processor 30 executes the computer program 32, the steps in the first method embodiment described above are implemented, for example, steps S101 to S105 shown in FIG. 1.
  • steps S201 to S207 shown in FIG. 2 implement the steps in Embodiment 2 of the above method, such as steps S201 to S207 shown in FIG. 2
  • the Bluetooth device may include, but is not limited to, the processor 30 and the memory 31.
  • FIG. 3 is only an example of the Bluetooth device 3, and does not constitute a limitation on the Bluetooth device 3, and may include more or less components than those illustrated, or combine certain components, or different components
  • the Bluetooth device may also include an input and output device, a network access device, a bus, and so on.
  • the processor 30 may be a central processing unit (Central Processing Unit (CPU), can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application-specific integrated circuits (Application Specific Integrated Circuit (ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory 31 may be an internal storage unit of the Bluetooth device 3, such as a hard disk or a memory of the Bluetooth device 3.
  • the memory 31 may also be an external storage device of the Bluetooth device 3, for example, a plug-in hard disk equipped on the Bluetooth device 3, a smart memory card (Smart Media Card, SMC), and a secure digital (SD) Flash card Card) etc.
  • the memory 31 may include both an internal storage unit of the Bluetooth device 3 and an external storage device.
  • the memory 31 is used to store the computer program and other programs and data required by the Bluetooth device.
  • the memory 31 can also be used to temporarily store data that has been or will be output.
  • modules, units, and/or method steps of the embodiments described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed in hardware or software depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of the present invention.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical, or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or software function unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the present invention can realize all or part of the processes in the methods of the above embodiments, and can also be completed by a computer program instructing relevant hardware.
  • the computer program can be stored in a computer-readable storage medium. When the program is executed by the processor, the steps of the foregoing method embodiments may be implemented.
  • the computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file, or some intermediate form, etc.
  • the computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electrical carrier signals, telecommunications signals and software distribution media, etc.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • electrical carrier signals telecommunications signals and software distribution media, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请适用于蓝牙通信技术领域,提供了一种语音交互的方法及蓝牙设备,其中,该语音交互的方法包括若接收到客户端发送的认证请求,则向客户端返回第一加密数据,其中,第一加密数据用于指示客户端根据接收的第一加密数据对预接入的蓝牙设备进行身份认证,接收客户端发送的认证结果消息,若认证结果消息为认证成功,则获取用户的语音消息,并向客户端发送建立蓝牙连接的请求,在接收到客户端发送的建立蓝牙连接成功的消息后,通过建立的蓝牙连接向客户端发送获取的所述语音消息,以指示客户端对语音信息进行处理,接收并播放客户端返回的处理后的语音消息。本申请通过对待接入的蓝牙设备进行认证,可以保证客户端不被其他的蓝牙设备占用。

Description

一种语音交互的方法及蓝牙设备 技术领域
本发明涉及蓝牙通信领域,尤其涉及一种语音交互的方法、蓝牙设备及计算机可读存储介质。
背景技术
随着科学技术的进步,越来越多的用户希望可以通过简单操控移动终端上的客户端来远程控制蓝牙设备的使用。
技术问题
然而,现有的蓝牙设备在配对成功后,往往可以直接与客户端建立蓝牙连接,容易出现客户端被其他蓝牙设备占用的情形,从而使期望使用的蓝牙设备无法接入客户端的情形,用户的体验感较差。
故有必要提出一种新的技术方案,以解决上述技术问题。
技术解决方案
鉴于此,本发明实施例提供了一种语音交互的方法及蓝牙设备,通过对待接入的蓝牙设备进行认证,可以保证客户端不被其他的蓝牙设备占用,有利于提高用户的体验感。
本发明实施例的第一方面提供了一种语音交互的方法,应用于蓝牙设备,所述方法包括:
若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证;
接收所述客户端发送的认证结果消息;
若认证结果消息为认证成功,则获取用户的语音消息,并向所述客户端发送建立蓝牙连接的请求;
在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端对所述语音信息进行处理;
接收并播放所述客户端返回的处理后的语音消息。
本发明实施例的第二方面提供了一种蓝牙终端,所述蓝牙设备包括:
第一发送模块,用于若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证;
第一接收模块,用于接收所述客户端发送的认证结果消息;
获取模块,用于若认证结果消息为认证成功,则获取用户的语音消息,并向所述客户端发送建立蓝牙连接的请求;
第二发送模块,用于在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端对所述语音信息进行处理;
第二接收模块,用于接收并播放所述客户端返回的处理后的语音消息。
本发明实施例的第三方面提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,上述计算机程序被处理器执行时实现上述第一方面提及的方法。
有益效果
本发明实施例与现有技术相比存在的有益效果是:在本实施例中,若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证,接收所述客户端发送的认证结果消息,若认证结果消息为认证成功,则获取用户的语音消息,并向所述客户端发送建立蓝牙连接的请求,在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端对所述语音信息进行处理,接收并播放所述客户端返回的处理后的语音消息。与现有技术相比,通过本发明实施例可以对待接入的蓝牙设备进行认证,保证客户端不被其他的蓝牙设备占用,有利于提高用户的体验感,具有较强的易用性和实用性。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例一提供的语音交互的方法的流程示意图;
图2为本发明实施例二提供的语音交互的方法的流程示意图;
图3为本发明实施例三提供的蓝牙设备的结构示意图。
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本发明实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本发明。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本发明的描述。
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。
还应当理解,在此本发明说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本发明。如在本发明说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。
还应当进一步理解,在本发明说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。
如在本说明书和所附权利要求书中所使用的那样,术语“如果”可以依据上下文被解释为“当...时”或“一旦”或“响应于确定”或“响应于检测到”。类似地,短语“如果确定”或“如果检测到[所描述条件或事件]”可以依据上下文被解释为意指“一旦确定”或“响应于确定”或“一旦检测到[所描述条件或事件]”或“响应于检测到[所描述条件或事件]”。
应理解,本实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
需要说明的是,本实施例中的“第一”、“第二”等描述,是用于区分不同的区域、模块等,不代表先后顺序,也不限定“第一”和“第二”为不同的类型。
为了说明本发明所述的技术方案,下面通过具体实施例来进行说明。
实施例一
图1是本发明实施例一提供的语音交互的方法的流程示意图,本实施例的执行主体为蓝牙设备,该方法可以包括以下步骤:
S101:若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证。
需要说明的是,所述蓝牙设备包括但不限于诸如蓝牙耳机、蓝牙音箱等支持语音输入的蓝牙产品;所述客户端是指能够在移动终端上运行的具有某种特定功能的应用程序,又称APP(Application);所述认证请求包含有一段随机数,可以由移动终端或其他设备根据需要随机产生;另外,为了便于与后续客户端发送的加密数据区分开来,本发明将蓝牙设备发送的加密数据统一命名为第一加密数据。
在一个实施例中,所述蓝牙设备中主控芯片的型号为CSR8670。
在一个实施例中,上述随机数的长度为10个字节。
在一个实施例中,上述随机数的类型包括但不限于数字、字母和/或其它字符。
在一个实施例中,可以通过扫描所述蓝牙设备底部的二维码来获取所述客户端。
在一个实施例中,上述移动终端包括但不限于智能手机、平板电脑和IPad。
在一个实施例中,所述蓝牙设备和客户端通过蓝牙串口通讯协议(Serial Port Profile ,SPP)或蓝牙低功耗协议(Bluetooth Low Energy ,BLE)进行认证数据的传输。
应理解,由于蓝牙设备是对客户端发送的随机数进行加密后才返回至客户端,因此客户端能够根据加密数据中所包含的蓝牙设备的基本信息对预接入的蓝牙设备进行身份认证,从而保证只有期望的某种蓝牙设备才能接入该客户端,避免出现客户端被其他的蓝牙设备占用的情形。
S102:接收所述客户端发送的认证结果消息。
其中,所述认证结果消息包括认证成功和认证失败。
需要说明的是,若认证失败,则返回重新执行上述步骤S101直至认证成功;若认证成功,则执行步骤S103。
S103:若认证结果消息为认证成功,则获取用户的语音消息,并向所述客户端发送建立蓝牙连接的请求。
在一个实施例中,若认证成功,则可以通过所述蓝牙设备上的麦克风或麦克风阵列来获取用户的语音信息。
应理解,上述麦克风阵列应至少包含两个麦克风,上述认证成功可以作为预设的触发获取条件。
在一个实施例中,为了在语音交互过程中给用户提供较佳的用户体验,可以控制蓝牙设备在与客户端进行数据传输时采用录边传的处理机制。
在一个实施例中,可以在认证成功后,间隔预设的时长再获取用户的语音信息,以便于先唤醒所述蓝牙终端。
在一个实施例中,可以在获取用户语音信息的同时获取与用户相关的其它声音信息,比如:用户的开关电视的声音以及开关防盗门的声音,从而辅助客户端判断用户的意图。
在一个实施例中,基于HFP协议向所述客户端发送建立蓝牙连接的请求。
应理解,所述语音信息中包含有用户的需求,并且用户的需求包括但不限于天气的查询、股票的查询、航班的查询以及交通限行的查询。
S104:在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端对所述语音信息进行处理。
应理解,所述客户端在接收到所述蓝牙设备发送的建立蓝牙连接的请求后,会与所述蓝牙设备建立连接,并在建立连接成功后,向所述蓝牙设备反馈成功建立连接的消息。此外,当用户的语音信息被发送至所述客户端后,客户端的语音识别功能也就相应被激活了。
在一个实施例中,所述客户端对语音信息的处理包括但不限于对所述语音信息的解析、查询、匹配和返回对应的语音消息。
在一个实施例中,控制所述蓝牙设备向客户端发送标准AT指令格式的语音信息。
S105:接收并播放所述客户端返回的处理后的语音消息。
需要说明的是,为了在语音交互过程中给用户提供较佳的用户体验,本发明实施例中,控制蓝牙设备在与客户端的交互中采用边接收边播放的处理机制。当然,在实际应用中,可以根据需要来进行灵活的调整,比如:待接收完返回的全部语音信息后再播放。
由上可见,本发明实施例中,通过对待接入的蓝牙设备进行认证,可以保证客户端不被其他的蓝牙设备占用,有利于提高用户的体验感,具有较强的易用性和实用性。
实施例二
图2为本发明实施例二提供的语音交互的方法的流程示意图,是对上述实施例一中的步骤S102的进一步细化和说明,本实施例的执行主体为蓝牙设备,该方法可以包括以下步骤:
S201:若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证。
S202:接收所述客户端发送的认证结果消息。
其中,上述步骤S201-S202与实施例一中的步骤S101-S102相同,其具体实施过程可参见步骤S101-S102的描述,在此不作重复赘述。
S203:若所述认证结果消息为认证成功,在接收到所述客户端发送的第二加密数据时,根据接收的所述第二加密数据对所述客户端进行安全认证,并向所述客户端发送认证结果消息。
需要说明的是,所述第二加密数据与所述第一加密数据相对应,其产生原理和类型可以参照上述实施例一中对第一加密数据的相关描述,在此不作重复赘述。
在一个实施例中,所述客户端应具有能够清楚表示自身功能的有意义的名称。
应理解,当蓝牙设备对所述客户端的认证通过时,即可认为所述客户端为合法的可接入的客户端。
S204:唤醒所述蓝牙设备。
在一个实施例中,可以通过使用预设的唤醒关键词来唤醒所述蓝牙设备,以便于后续获取用户的语音信息。
S205:获取用户的语音消息,并向所述客户端发送建立SCO连接的请求。
其中,所述SCO连接又称对称连接或面向同步连接,属于蓝牙连接中的一种,用于传输语音信息。
S206:在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端将所述语音信息发送至预设的服务器,并接收所述服务器返回的处理后的语音信息。
考虑到云端服务器拥有强大的计算能力,可以保证语音识别的准确率;同时又拥有丰富的网络资源,便于向用户提供多样的内容服务。在一个实施例中,在所述客户端与云端服务器建立通信连接后,通过HTTP端口将获取的所述语音信息发送至云端服务器进行处理。
需要说明的是,上述通信连接可以是无线通信连接,也可以是以其他方式建立的通信连接,本发明对此不做过多限制。
应理解,云端服务器在接收到客户端发送的语音信息后,会进行对应的语音识别及语义解析,并根据语音中的指令作出对应的语音回应。
S207:接收并播放所述客户端返回的处理后的语音消息。
考虑到在实际应用中,可能会出现同一用户多次与蓝牙设备进行语音交互的情形,为了提高交互的效率,在本发明实施例中,控制蓝牙设备对最新获取的语音信息进行处理。具体的,在一个实施例中,若在播放所述客户端返回的处理后的语音消息时,接收到新的语音消息,则停止当前的播放,并将获取的所述新的语音消息发送至所述客户端。
在一个实施例中,也可以通过A2DP链路来播放客户端返回的处理后的语音信息。
由上可见,本申请实施例二相比于实施例一,给出了蓝牙设备和客户端双向认证的具体实施例方式,从而保证蓝牙设备能够接入安全的客户端,实现语音识别服务与特定客户端进行绑定的功能,具有较强的易用性和实用性。
实施例三
图3是本发明实施例三提供的蓝牙设备的结构示意图。如图3所示,该实施例的蓝牙设备3包括:处理器30、存储器31以及存储在所述存储器31中并可在所述处理器30上运行的计算机程序32。所述处理器30执行所述计算机程序32时实现上述方法实施例一中的步骤,例如图1所示的步骤S101至S105。或者,实现上述方法实施例二中的步骤,例如图2所示的步骤S201至S207
所述蓝牙设备可包括,但不仅限于,处理器30、存储器31。本领域技术人员可以理解,图3仅仅是蓝牙设备3的示例,并不构成对蓝牙设备3的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述蓝牙设备还可以包括输入输出设备、网络接入设备、总线等。
所述处理器30可以是中央处理单元 (Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器31可以是所述蓝牙设备3的内部存储单元,例如蓝牙设备3的硬盘或内存。所述存储器31也可以是所述蓝牙设备3的外部存储设备,例如所述蓝牙设备3上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器31还可以既包括所述蓝牙设备3的内部存储单元也包括外部存储设备。所述存储器31用于存储所述计算机程序以及所述蓝牙设备所需的其他程序和数据。所述存储器31还可以用于暂时地存储已经输出或者将要输出的数据。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各实施例的模块、单元和/或方法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims (10)

  1. 一种语音交互的方法,其特征在于,应用于蓝牙设备,所述方法包括:
    若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证;
    接收所述客户端发送的认证结果消息;
    若认证结果消息为认证成功,则获取用户的语音消息,并向所述客户端发送建立蓝牙连接的请求;
    在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端对所述语音信息进行处理;
    接收并播放所述客户端返回的处理后的语音消息。
  2. 根据权利要求1所述的方法,其特征在于,在接收所述客户端发送的认证结果消息之后,还包括:
    在接收到所述客户端发送的第二加密数据时,根据接收的所述第二加密数据对所述客户端进行安全认证;
    向所述客户端发送认证结果消息。
  3. 根据权利要求1所述的方法,其特征在于,在获取用户的语音消息之前,还包括:
    唤醒所述蓝牙设备。
  4. 根据权利要求1所述的方法,其特征在于,所述蓝牙连接为SCO连接。
  5. 根据权利要求1所述的方法,其特征在于,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音信息,以指示所述客户端对所述语音信息进行处理包括:
    通过建立的所述蓝牙连接向所述客户端发送获取的所述语音信息,以指示所述客户端将所述语音信息发送至预设的服务器,并接收所述服务器返回的处理后的语音信息。
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述方法还包括:
    若在播放所述客户端返回的处理后的语音消息时,接收到新的语音消息,则停止当前的播放,并将获取的所述新的语音消息发送至所述客户端。
  7. 一种蓝牙设备,其特征在于,所述蓝牙设备包括:
    第一发送模块,用于若接收到客户端发送的认证请求,则向所述客户端返回第一加密数据,其中,所述第一加密数据用于指示所述客户端根据接收的所述第一加密数据对预接入的蓝牙设备进行身份认证;
    第一接收模块,用于接收所述客户端发送的认证结果消息;
    获取模块,用于若认证结果消息为认证成功,则获取用户的语音消息,并向所述客户端发送建立蓝牙连接的请求;
    第二发送模块,用于在接收到所述客户端发送的建立蓝牙连接成功的消息后,通过建立的所述蓝牙连接向所述客户端发送获取的所述语音消息,以指示所述客户端对所述语音信息进行处理;
    第二接收模块,用于接收并播放所述客户端返回的处理后的语音消息。
  8. 根据权利要求7所述的蓝牙设备,其特征在于,所述蓝牙设备还包括:
    认证模块,用于在接收到所述客户端发送的第二加密数据时,根据接收的所述第二加密数据对所述客户端进行安全认证,并向所述客户端发送认证结果消息。
  9. 根据权利要求7所述的蓝牙设备,其特征在于,所述蓝牙连接为SCO连接。
  10. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至6中任一项所述方法的步骤。
PCT/CN2019/084369 2018-12-20 2019-04-25 一种语音交互的方法及蓝牙设备 WO2020124920A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811564433.4 2018-12-20
CN201811564433.4A CN111356117A (zh) 2018-12-20 2018-12-20 一种语音交互的方法及蓝牙设备

Publications (1)

Publication Number Publication Date
WO2020124920A1 true WO2020124920A1 (zh) 2020-06-25

Family

ID=71100133

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/084369 WO2020124920A1 (zh) 2018-12-20 2019-04-25 一种语音交互的方法及蓝牙设备

Country Status (2)

Country Link
CN (1) CN111356117A (zh)
WO (1) WO2020124920A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114071419A (zh) * 2021-10-22 2022-02-18 深圳成谷科技有限公司 一种obu蓝牙的通讯方法、装置、obu及rsu
CN114553328A (zh) * 2022-02-22 2022-05-27 深圳市冠旭电子股份有限公司 蓝牙设备测试方法和装置、电子设备、存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637846B (zh) * 2020-12-24 2022-12-30 青岛海尔科技有限公司 一种热点连接方法及装置
CN114980363B (zh) * 2022-07-27 2024-03-19 荣耀终端有限公司 一种蓝牙回连方法及其相关装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104157289A (zh) * 2014-08-18 2014-11-19 广东思派康电子科技有限公司 一种蓝牙耳机语音识别方法
CN104202488A (zh) * 2014-09-29 2014-12-10 广东欧珀移动通信有限公司 一种通过蓝牙耳机与移动终端进行语音交互的方法及系统
CN105430603A (zh) * 2015-12-03 2016-03-23 北京握奇智能科技有限公司 一种蓝牙设备的安全连接方法及系统
CN105450269A (zh) * 2015-12-21 2016-03-30 飞天诚信科技股份有限公司 一种实现蓝牙设备间安全交互配对认证的方法及装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9215592B2 (en) * 2013-03-15 2015-12-15 Tyfone, Inc. Configurable personal digital identity device responsive to user interaction
CN104158666A (zh) * 2014-08-28 2014-11-19 电子科技大学 实现智能手环与智能移动终端的绑定和认证方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104157289A (zh) * 2014-08-18 2014-11-19 广东思派康电子科技有限公司 一种蓝牙耳机语音识别方法
CN104202488A (zh) * 2014-09-29 2014-12-10 广东欧珀移动通信有限公司 一种通过蓝牙耳机与移动终端进行语音交互的方法及系统
CN105430603A (zh) * 2015-12-03 2016-03-23 北京握奇智能科技有限公司 一种蓝牙设备的安全连接方法及系统
CN105450269A (zh) * 2015-12-21 2016-03-30 飞天诚信科技股份有限公司 一种实现蓝牙设备间安全交互配对认证的方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114071419A (zh) * 2021-10-22 2022-02-18 深圳成谷科技有限公司 一种obu蓝牙的通讯方法、装置、obu及rsu
CN114553328A (zh) * 2022-02-22 2022-05-27 深圳市冠旭电子股份有限公司 蓝牙设备测试方法和装置、电子设备、存储介质
CN114553328B (zh) * 2022-02-22 2023-10-20 深圳市冠旭电子股份有限公司 蓝牙设备测试方法和装置、电子设备、存储介质

Also Published As

Publication number Publication date
CN111356117A (zh) 2020-06-30

Similar Documents

Publication Publication Date Title
WO2020124920A1 (zh) 一种语音交互的方法及蓝牙设备
JP6742465B2 (ja) ブルートゥーススピーカーにおける連続ウェイクアップ遅延低減の方法、装置及びブルートゥーススピーカー
WO2019090902A1 (zh) 屏幕共享的方法、装置、电子设备及存储介质
WO2019128530A1 (zh) 语音播报方法、装置、系统以及智能播报设备
WO2018032455A1 (zh) 一种蓝牙通信的方法及终端
WO2014166243A1 (zh) 一种多终端多声道独立播放方法及装置
WO2017028651A1 (zh) 一种设备间进行配置性设置的方法、装置及系统
CN107809437B (zh) 一种融合通信登录方法、装置和计算机可读存储介质
US20170171496A1 (en) Method and Electronic Device for Screen Projection
CN110266582B (zh) 一种消息推送方法、系统、服务器及通信终端
US10321494B2 (en) Method and apparatus for communicating in a wireless communication network
WO2023273639A1 (zh) 设备连接方法及装置、计算机可读介质和电子设备
CN112291364A (zh) 一种消息推送处理方法和装置
EP4044643A1 (en) Method for synchronizing key information, system and device
WO2023273976A1 (zh) 通信方法、耳机仓以及wifi耳机
US9185148B1 (en) Methods and systems for efficient discovery of devices in a peer-to-peer network
US20200213844A1 (en) Communication method, communication apparatus and electronic device
WO2017185339A1 (zh) 无线连接方法、装置及系统
WO2024055738A1 (zh) 音频数据的共享方法、装置、电子设备以及存储介质
WO2023071993A1 (zh) 蓝牙配对方法、设备、系统和存储介质
WO2023020617A1 (zh) 基于蓝牙的设备连接方法、装置、电子设备及存储介质
CN111338673A (zh) 设备调试方法、装置、电子设备及存储介质
WO2020062862A1 (zh) 一种音箱语音交互控制的方法及装置
CN113596827B (zh) 密钥生成方法、装置、电子设备及存储介质
WO2021239032A1 (zh) 蓝牙协议连接方法、装置、存储介质及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19900155

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19900155

Country of ref document: EP

Kind code of ref document: A1