WO2020199742A1 - 一种智能手机 - Google Patents

一种智能手机 Download PDF

Info

Publication number
WO2020199742A1
WO2020199742A1 PCT/CN2020/073814 CN2020073814W WO2020199742A1 WO 2020199742 A1 WO2020199742 A1 WO 2020199742A1 CN 2020073814 W CN2020073814 W CN 2020073814W WO 2020199742 A1 WO2020199742 A1 WO 2020199742A1
Authority
WO
WIPO (PCT)
Prior art keywords
smart phone
authorized user
module
user
instruction
Prior art date
Application number
PCT/CN2020/073814
Other languages
English (en)
French (fr)
Inventor
黄鋆
曹雷
张韶容
程远
王盛泽
蒋志辰
Original Assignee
创新先进技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 创新先进技术有限公司 filed Critical 创新先进技术有限公司
Publication of WO2020199742A1 publication Critical patent/WO2020199742A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64CAEROPLANES; HELICOPTERS
    • B64C39/00Aircraft not otherwise provided for
    • B64C39/02Aircraft not otherwise provided for characterised by special use
    • B64C39/024Aircraft not otherwise provided for characterised by special use of the remote controlled vehicle type, i.e. RPV
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64UUNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
    • B64U50/00Propulsion; Power supply
    • B64U50/10Propulsion
    • B64U50/13Propulsion using external fans or propellers
    • B64U50/14Propulsion using external fans or propellers ducted or shrouded
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/0206Portable telephones comprising a plurality of mechanically joined movable body parts, e.g. hinged housings
    • H04M1/0208Portable telephones comprising a plurality of mechanically joined movable body parts, e.g. hinged housings characterized by the relative motions of the body parts
    • H04M1/0214Foldable telephones, i.e. with body parts pivoting to an open position around an axis parallel to the plane they define in closed position
    • H04M1/0222Foldable in two directions, i.e. using a two degree of freedom hinge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • H04M1/0266Details of the structure or mounting of specific components for a display module assembly
    • H04M1/0268Details of the structure or mounting of specific components for a display module assembly including a flexible display panel

Definitions

  • the embodiments of this specification relate to the field of digital products, in particular to a smart phone.
  • an embodiment of this specification provides a smart phone as follows:
  • a smart phone includes: a command response module, a flight control module, and at least one electric turbofan engine;
  • the instruction response module obtains a flight operation instruction; and, if it is determined that the flight operation instruction is issued by the authorized user of the smart phone, the flight trajectory is determined according to the flight operation instruction, and the determined flight trajectory is notified To the flight control module;
  • the flight control module controls the smart phone to fly along the flight trajectory through the at least one electric turbofan engine.
  • the authorized user of the smart phone can trigger the smart phone to fly to the destination designated by the authorized user by way of instructions.
  • the smart phone includes a command response module, a flight control module, and at least one electric turbofan engine.
  • the command response module is used to respond to the flight operation command issued by the authorized user to determine the flight trajectory;
  • the electric turbofan engine provides the flight capability for the smart phone, and the flight control module controls the electric turbofan through the electric turbofan.
  • the smart phone implements the flight trajectory to reach the destination designated by the authorized user.
  • the user does not need to move his smart phone to a certain location in a portable manner, but directly sends a flight operation instruction to the smart phone, and the smart phone will automatically fly to the location specified by the user according to the flight operation instruction. In this way, it is more convenient for users.
  • FIG. 1 is a schematic diagram of the hardware structure of a smart phone provided by an embodiment of this specification
  • Figure 2 is a schematic diagram of a turbofan engine provided by an embodiment of the present specification
  • 3a to 3b are schematic diagrams of the smart phone in a flying state according to an embodiment of this specification
  • 4a to 4b are schematic diagrams of a process of folding a smart phone provided by an embodiment of this specification.
  • FIG. 5 is a schematic diagram of the smart phone in the function state 3 according to the embodiment of this specification.
  • FIG. 6 is a schematic diagram of the smart phone in the functional state 2 according to the embodiment of the present specification.
  • FIG. 7 is a schematic diagram of the smart phone in the functional state 1 according to the embodiment of this specification.
  • FIG. 8 is a schematic diagram of the software structure of a smart phone provided by an embodiment of this specification.
  • FIG. 9 is a schematic diagram of a more specific software structure of a smart phone provided by an embodiment of this specification.
  • FIG. 10 is a schematic diagram of a permission user recalling a smart phone according to an embodiment of this specification.
  • FIG. 11 is a schematic flowchart of a method for automatically moving a smart phone according to an embodiment of this specification
  • FIG. 12 is a schematic flowchart of an item identification method provided by an embodiment of this specification.
  • FIG. 13 is a schematic flowchart of a call analysis method provided by an embodiment of this specification.
  • FIG. 14 is a schematic flowchart of a method for automatically answering an incoming call provided by an embodiment of this specification
  • FIG. 15 is a schematic diagram of a more specific hardware structure of a smart phone provided by an embodiment of this specification.
  • FIG. 1 is a schematic diagram of the hardware structure of a smart phone provided by an embodiment of this specification. It should be noted that the hardware structure of the smart phone shown in FIG. 1 is only used as an example, and does not constitute a limitation on the smart phone provided in the embodiments of this specification.
  • the upper part (or called the top) and the lower part (or called the bottom) of the body of the smart phone are respectively provided with through holes penetrating the body for embedded installation of an electric turbofan engine in the body.
  • the smart phone in the embodiment of this specification may not have a through hole, and the electric turbo fan may be installed outside the body.
  • Fig. 2 is a schematic diagram of a turbofan engine provided by an embodiment of this specification.
  • the electric turbofan engine includes a forward turbofan and a reverse turbofan.
  • the electric turbofan engine is powered by the battery of the smartphone. When the electric turbofan engine is running, it usually controls the forward turbofan and the reverse turbofan to rotate at different rotation speeds, and produce in two opposite directions.
  • the air pressure difference provides power for the flight of the smart phone.
  • the plane where the forward turbofan is located and the plane where the reverse turbofan is located may be the same plane or parallel planes.
  • the inclination angle of the plane where the forward turbofan and the reverse turbofan are with respect to the ground plane is adjustable. By adjusting the inclination angle, the power direction of the electric turbofan engine can be changed, thereby driving the smartphone to different directions. Direction to fly.
  • the front of the smartphone body (except the through hole) can be covered with a screen
  • the back of the smartphone can be divided into the upper part of the back, the middle part of the back, and the lower part of the back, the upper part of the back (Except for the through hole) is covered with a screen.
  • the front of the fuselage of the smart phone may be covered with a flexible screen to achieve a full-screen effect on the front of the fuselage.
  • the back of the smartphone body can be divided into an upper back, a middle back, a back and a lower back, and the upper back is covered with a screen (may not be a flexible screen).
  • the joint between the upper part of the back and the middle part of the back can be folded inward, and the joint between the middle of the back and the lower part of the back can be folded inward.
  • the body of the smartphone can be folded twice in a row in the following way:
  • serial numbers 1 to 3 indicate the 3 functional states of the smart phone.
  • Function state 3 is the full screen form when the smart phone is fully expanded, and the user uses the smart phone to watch video programs, as shown in Figure 5.
  • Function state 2 is the form of the smart phone after the first folding. The user can use the smart phone to identify the authenticity of the product or make a call, as shown in Figure 6.
  • Function state 1 is the form of the smartphone after the second folding, and the user can use the smartphone to pay. Since the front and back of the smartphone in function state 1 are both screen display areas, the order information can be displayed on the front (the side facing the user), and the payment QR code can be displayed on the back. The user can hold the smartphone and transfer the smart phone. The back of the mobile phone is close to the payment device to make a payment, as shown in Figure 7.
  • the smart phone may include one or more rear cameras. Further, the one or more rear cameras may be hidden under the screen on the back of the fuselage.
  • the smart phone may include one or more front-facing cameras. Further, the one or more front cameras may be hidden under the screen on the front of the fuselage. In addition, the one or more front-facing cameras can be used to realize face collection, so that the user can unlock the smart phone by means of face recognition.
  • the smart phone may also include one or more of a receiver, a microphone, a speaker, and a fingerprint sensor. Furthermore, the earpiece, microphone, speaker and fingerprint sensor of the smart phone can all be placed under the screen on the front of the fuselage. In addition, the smart phone may not include an earpiece and a speaker, but may use screen sound technology for sound.
  • the smart phone may be equipped with a graphene new energy battery.
  • a graphene new energy battery Using graphene with a two-dimensional structure as a superconducting material can achieve a larger battery capacity (such as 7200 mA).
  • the smart phone can also support fast charging (such as fast charging with 100 watts of power). In this way, the smart phone can have a longer battery life, but the charging time required to fully charge the battery is shorter.
  • the smart phone may also support wireless floating charging, that is, the smart phone is charged by floating above the wireless charger.
  • the smart phone can be equipped with a quantum chip and has a large number (such as 100) qubits.
  • quantum is the smallest indivisible unit of energy, and a qubit has two states of 0 and 1, and the corresponding N qubits can store 2 to the Nth power at the same time. Therefore, the effect of a quantum chip's operation once is equivalent to that of a normal chip to perform 2N-th power operations.
  • a quantum chip can complete parallel processing of 2N-th power data at a time. This parallel computing speed is much higher than traditional chip.
  • smartphones equipped with quantum chips have greatly improved parallel computing capabilities and speed, and can be used to process massive amounts of data.
  • high requirements are placed on the data processing capabilities of mobile phone chips.
  • the smart phone After the smart phone is equipped with a quantum chip, it can access the Internet of Things based on 5G communication technology, become a member device of the Internet of Things, and process a large amount of Internet of Things data.
  • Fig. 8 is a schematic diagram of the software structure of a smart phone provided in an embodiment of this specification.
  • the smart phone has a built-in command response module and a flight control module, which are used to realize that: the authorized user of the smart phone can trigger the smart phone to fly to a designated user designated by the authorized user through instructions. destination.
  • the instruction response module obtains a flight operation instruction; and, if it is determined that the flight operation instruction is issued by the authorized user of the smart phone, the flight trajectory is determined according to the flight operation instruction, and the determined flight trajectory is notified To the flight control module.
  • the flight control module controls the smart phone to fly along the flight trajectory through the at least one electric turbofan engine.
  • the authorized user is a user who has the authority to operate the smart phone, and is generally the owner of the smart phone.
  • the flight operation instruction refers to an instruction used to trigger the smart phone to fly to a destination designated by the authorized user.
  • the flight operation instruction acquired by the smart phone is not necessarily issued by the authorized user, and may also be issued by an unknown user. Therefore, the instruction response module needs to determine whether the received flight operation instruction is issued by the authorized user. If it is determined that the flight operation instruction is issued by the authorized user, the flight operation instruction will be executed, that is, according to the flight operation Instructions to determine the destination location information.
  • the expression "user" it means that there is no restriction on whether it is a privileged user or an unknown user.
  • a user can hold a smart phone and input a flight operation instruction to the smart phone, where the flight operation instruction contains the destination location information specified by the user. If the smart phone is not at the user's hand, the user can also issue voice flight operation instructions, or issue action flight operation instructions, or issue "voice + action” instructions (that is, instructions generated by combining voice and action). Of course, even if the smartphone is at the user's hand, the user can also choose to issue voice, motion, or "voice + motion" flight operation instructions.
  • the instruction response module may pre-store a mapping table, which records destination location information corresponding to different voice content, and may also record destination location information corresponding to different actions. You can also record the destination location information corresponding to different "voice + actions".
  • the destination location information corresponding to the voice content "come back" is “the user's hand”
  • the destination location information corresponding to the "beckoning action” is also “the user's hand”.
  • the user can call "back” as a voice flight operation command to recall the phone, or perform a beckoning action as a flight operation command to recall the phone.
  • the instruction response module may determine the flight trajectory according to the determined destination location information and the current location of the smart phone.
  • the flight operation instructions can also be distinguished from the functional perspective.
  • the flight operation instruction issued by the user can be a mobile phone recall instruction used to instruct the smartphone to fly back to the user, or a mobile phone follow instruction used to instruct the smartphone to keep following the user, or it can be used to instruct the smart phone to follow the user.
  • the instruction response module determines that the flight operation instruction is issued by the authorized user, if it is determined that the flight operation instruction is a mobile phone recall instruction or a mobile phone follow instruction, the flight trajectory for reaching the position of the authorized user can be determined.
  • the location of the authorized user may specifically be a small area, the authorized user is located in the small area, and the smart phone flying into the small area is regarded as arriving at the authorized user s position.
  • the location of the authorized user may specifically be in the palm of the authorized user.
  • the flight control module may land on the position of the authorized user (for example, land in the palm of the authorized user) after controlling the smart phone to complete the flight trajectory.
  • the flight control module follows instructions to the mobile phone, and after controlling the smart phone to complete the flight trajectory, the electric turbofan engine may continue to control the smart phone to be in a flying state, so that the smart phone and the Maintain a fixed distance between authorized users.
  • the smart phone may be equipped with a distance sensor. If the smart phone is following the authorized user, if the authorized user is still, the flight control module detects through the distance sensor that it still maintains a fixed distance from the authorized user, and then controls the smart phone to remain suspended; if If the authorized user moves, the flight control module will control the smartphone to move in a flying manner, so as to continue to maintain a fixed distance from the authorized user.
  • the first method is suitable for the case where the smart phone is not far away from the authorized user.
  • the smart phone needs to have a camera, and the authorized user should be within the shooting range of the smart phone's camera.
  • the instruction response module may use location-based service (LBS) to determine the current location of the smart phone; then use the camera to collect images of the authorized user at the current location; Position and the image of the authorized user collected at the current position, determine the relative position of the authorized user with respect to the current position; according to the current position and the relative position of the authorized user with respect to the current position To determine the flight trajectory used to reach the position of the authorized user.
  • LBS location-based service
  • the farther the authorized user is the smaller the ratio of the authorized user in the image obtained by shooting the authorized user.
  • the relative direction of the position of the authorized user with respect to the position of the smart phone can also be analyzed.
  • the instruction response module can analyze the relative position of the authorized user with respect to the current location based on the current location of the smart phone and the image of the authorized user collected at the current location, thereby obtaining the authorization The location of the user ultimately determines the flight trajectory.
  • the authorized user needs to be located in the IoT area.
  • IoT member devices in the IoT area.
  • the member devices of the Internet of Things in the Internet of Things area may include devices deployed by the Internet of Things administrator, and may also include the smart phones of each user in the Internet of Things area.
  • the IoT member device can monitor the surrounding environment in real time and upload the monitoring data to the IoT management device of the IoT manager.
  • Surveillance data generally includes pictures, videos and sounds.
  • the monitoring data in the IoT area stored by the IoT management device it is possible to find the position of the authorized user in the IoT area at each moment in the IoT area according to the identification information of the authorized user.
  • the smart phone may pre-store the identification information of the authorized user, which may specifically include: the face image of the authorized user, the ID number of the authorized user, the mobile phone number of the authorized user, the name and gender of the authorized user, and so on.
  • the instruction response module may upload the identification information of the authorized user and the location of the smart phone to the IoT management device, so that the IoT management device can be based on the monitoring data in the IoT area.
  • the identification information of the authorized user determine the location of the authorized user, and determine the flight trajectory used to reach the location of the authorized user according to the location of the authorized user and the location of the smartphone;
  • the Internet of Things management device obtains the flight trajectory.
  • the instruction response module may not upload the location of the smart phone to the IoT management device, but the IoT management device directly sends the location of the authorized user to the smart phone, and the instruction corresponding module in the smart phone directly Determine the flight path.
  • the position of the authorized user in the IoT area may change.
  • the IoT device detects a change in the position of the authorized user, it can obtain the current position of the smartphone (a certain position on the flight path), and then according to the change of the authorized user
  • the position of is at the current location of the smart phone, the flight trajectory is re-determined, that is, the flight trajectory is updated, and the updated flight trajectory is sent to the instruction corresponding module of the smart phone.
  • the instruction response module may notify the flight control module of the updated flight trajectory, and the flight control module may control the smart phone to fly along the updated flight trajectory.
  • the IoT device when the IoT device detects that the position of the authorized user changes, it may also send the changed position of the authorized user to the instruction response module.
  • the instruction response module updates the flight trajectory according to the changed position of the authorized user and the current position of the smart phone, and sends the updated flight trajectory to the flight control module.
  • the updated flight trajectory generally starts from the current location of the smartphone.
  • multi-party secure computing technology can be adopted between the smart phone and the IoT management device.
  • the smartphone uses the one-time irreversible transformation algorithm agreed with the IoT management device to transform the identification information of the authorized user, and sends the transformed identification information to the IoT management device.
  • the IoT management device can be based on fuzzy The matching technology determines the position of the authorized user in the IoT area without obtaining the clear text of the identification information of the authorized user.
  • the instruction corresponding module determines that the flight operation instruction is a mobile phone charging instruction, it determines the flight trajectory for reaching the charging position.
  • the smart phone may have a wireless levitation charging function, and the charging location may be above the wireless levitation charger.
  • Fig. 9 is a schematic diagram of a more specific software structure of a smart phone provided by an embodiment of this specification.
  • the smart phone may also include an alarm module.
  • the instruction response module may obtain an alarm instruction, and if it is determined that the alarm instruction is issued by the authorized user, trigger the alarm module according to the alarm instruction.
  • the alarm module may execute an alarm operation after being triggered by the instruction response module.
  • the alarm operation may be dialing an alarm phone, sending a short message to the police platform, etc.
  • the smart phone may further include a reply module.
  • the instruction response module may send the acquired flight operation instruction to the reply module, and then the reply module may give a voice reply according to the flight operation instruction.
  • the smart phone can reply "OK" through the reply module.
  • the smart phone may have a standby state, a wake-up state, and a flight state.
  • the smart phone When the smart phone is in the standby state, it needs to be awakened before it can enter the awake state.
  • the smart phone can respond to various operating instructions only when it is in the wake-up state.
  • smart phones are not necessarily awakened by authorized users, and may also be awakened by non-authorized users. Therefore, after a smart phone is awakened by an unknown user, it is necessary to determine whether the unknown user is a privileged user before executing an operation instruction issued by the unknown user.
  • the way to wake up the smart phone can be voice wake-up, or wake up by triggering the screen or power button of the smart phone.
  • the smart phone may also include a wake-up module, a user identification module, and an identification information collector set including at least one identification information collector.
  • the at least one identification information collector may be arranged inside the body of the smart phone.
  • the wake-up module triggers the smart phone to enter the wake-up state when it is detected that an unknown user sends a wake-up signal.
  • the user identification module collects the identification information of the unknown user through the identification information collector set when the smart phone is in the awake state, and obtains the identification information set of the unknown user; The identification information set of the unknown user is compared with the pre-stored identification information set of the authorized user, and according to the comparison result, it is determined whether the unknown user is the authorized user; the user identification module will generally notify the determination result to the Command response module.
  • the instruction response module receives a flight operation instruction issued by the unknown user when the smart phone is in an awake state; and, if it is determined that the user identification module recognizes the unknown user as the authorized user, The flight operation instruction determines the flight trajectory.
  • the set of identification information collectors may include cameras, chemical sensors, and the like.
  • the collected identification information may include: one or more of image information of the unknown user, voice information of the unknown user, posture information of the unknown user, and smell information of the unknown user.
  • the pre-stored identification information of the authorized user includes: one or more of image information of the authorized user, voice information of the authorized user, posture information of the authorized user, and smell information of the authorized user .
  • the identity recognition module can compare the collected image information with pre-stored image information; compare the collected voice information with pre-stored voice information; compare the collected posture information with the pre-stored posture Compare the information; compare the collected odor information with the pre-stored odor information; if the number of consistent comparison results is greater than the specified number, the unknown user is determined to be the authorized user, if the comparison is consistent If the number of comparison results is not greater than the specified number, it is determined that the unknown user is not the authorized user.
  • the smart phone also includes a living body monitoring device.
  • the identity recognition module may perform a living detection on the unknown user before collecting the identification information of the unknown user; if it is determined that the unknown user is a living body, perform identification information collection on the unknown user.
  • the purpose of live monitoring of unknown users is to avoid the situation that the unknown users are dummy (such as the human body model of the authorized user) and deceive the identification information sensor collection.
  • FIG. 10 is a schematic diagram of a permission user recalling a smart phone according to an embodiment of this specification. As shown in Figure 10, when the smart phone is awake, it will be suspended in the air. When the authorized user issues a mobile phone recall command, the smart phone will change the tilt angle of the electric turbofan so that the smart phone can fly to the location of the authorized user .
  • the smart phone also has a function of identifying attributes of items.
  • the smart phone may further include an item identification module and an item feature collector set including at least one item feature collector.
  • the at least one item feature collector may be arranged inside the body of the smart phone.
  • the item recognition module can collect the item feature of the item to be identified through the item feature collector set, and obtain the item feature set; input the item feature set into the pre-trained item recognition model to obtain the corresponding item to be identified The recognition result.
  • the training method of the item recognition model is generally:
  • Collect multiple items For each item collected, collect the item characteristics of the item to obtain the item feature set of the item, and assign a tag to the item. The tag of the item records the attribute of the item. Then, a supervised machine learning algorithm is used to train the item recognition module with the collected item feature set and label of each item as a sample.
  • the article feature collector set includes: at least one visible light camera, a projector, an infrared camera, and at least one chemical sensor.
  • the item feature set collected by the item feature collector set includes: at least one of a visible light plane image, an infrared plane image, a three-dimensional image, and odor information of the item to be identified.
  • the characteristics of each item mentioned above can reflect the characteristics of the item from multiple dimensions.
  • the at least one visible light camera is used to collect a visible light plane image of the object to be identified.
  • the focal length of each visible light camera is different.
  • the item recognition module can separately take pictures of the items to be recognized through the visible light cameras, and then perform graphic registration of the obtained visible light plane images to obtain a comprehensive visible light plane image.
  • the infrared camera is used to collect an infrared plane image of the object to be identified.
  • the at least one chemical sensor is used to collect concentration information of various chemical molecules in the air around the object to be identified.
  • smell is actually a combination of various chemical molecules in a certain concentration. Therefore, after the object recognition module obtains the concentration information of various chemical molecules in the air around the object to be identified through the at least one chemical sensor, the odor information of the object to be identified can be determined accordingly.
  • the multiple visible light cameras, the infrared camera, and the dot-matrix projector can be combined to construct a three-dimensional model.
  • the item recognition module may perform three-dimensional modeling of the item to be recognized through the multiple visible light cameras, the infrared camera, and the dot matrix projector to obtain a three-dimensional image of the item to be recognized.
  • the smart phone may have a built-in gyroscope for locating the position of the smart phone in the three-dimensional space.
  • the item identification module can locate the position of the smart phone through the gyroscope, thereby assisting the feature collection of the item to be identified.
  • the above-mentioned item identification function can be used to determine whether an egg is a native egg, to identify the degree of a bottle of wine, to determine whether a bottle of wine is fake wine, to determine whether the food is fresh, and so on.
  • multiple food samples can be obtained in advance, and the multiple food samples include normal food and abnormal food; for each food sample, collect the food feature set of the food sample, and the food feature set of the food sample includes the The visible light plane image, infrared plane image, three-dimensional image and odor information of food samples; the food feature set of each food sample is used as the feature, and the label is whether each food sample is normal or not, and the food recognition model used to identify whether the food is normal or not is trained .
  • the item identification module collects the food features of the food to be identified through the item feature collector set to obtain a food feature set; input the food feature set To a pre-trained food recognition model to determine whether the food to be recognized is normal.
  • the smart phone further includes a call analysis module.
  • the call analysis module can analyze the fraud risk in real time based on one or more preset fraud risk models during the call between the authorized user using the smartphone and the caller; when the real-time analysis result indicates a fraud risk, The authorized user gives a risk warning.
  • real-time analysis of fraud risks can be continuous analysis of fraud risks involved in the call as the call progresses.
  • the smart phone can prompt the authorized user to avoid being deceived.
  • the call analysis module can analyze in real time the fraud risk probability corresponding to the operation of the smart phone by the authorized user, analyze the fraud risk probability corresponding to the content of the call between the authorized user and the caller, and analyze in real time The risk probability corresponding to the sound feature of the environment where the caller is located and the risk probability corresponding to the voice feature of the caller is analyzed in real time.
  • the fraud risk probability corresponding to the operation of the smart phone by the authorized user analyzed in real time represents the possibility that the authorized user is currently operating the smart phone due to fraud.
  • the authorized user is in the process of the caller’s call
  • the smartphone is also operated to make online transfers to the account bound to the caller’s mobile phone number, and the account bound to the caller’s mobile phone number frequently receives payments recently, it means that all The user with the above rights is more likely to be fraudulent.
  • the fraud risk probability corresponding to the content of the call between the authorized user and the caller analyzed in real time represents the possibility of the caller currently cheating on the authorized user.
  • the caller claims that the health products he sells can cure all diseases and need to make a quick payment.
  • the fraud risk model can determine that the caller is likely to cheat the authorized user.
  • the real-time analysis of the risk probability corresponding to the sound feature of the environment where the caller is located represents the possibility that the environment where the caller is located is a den of fraud.
  • the caller's voice is noisy and unclear, and there are voices of other people around, which means that the environment in which the caller corresponds is likely to be a fraudulent den, that is, a place where fraudsters gather.
  • the risk probability corresponding to the voice feature of the caller analyzed in real time represents the possibility of the caller disguised identity and/or disguised emotion.
  • the caller claims that he is in the hospital to continue the authorization user to make money, but the voice characteristics show that the caller's emotions are not eager, so the caller is more likely to pretend to be an emotional fraud user.
  • the caller claims to be a relative of the authorized user, but the voice feature (mainly timbre) of the caller does not match the voice feature of the relative of the authorized user obtained by the call analysis module. Therefore, the caller pretends to be fraudulent The possibility of authorized users is higher.
  • the call analysis module may obtain the fraud risk probability corresponding to the operation of the smart phone by the authorized user and the fraud risk probability corresponding to the content of the call between the authorized user and the caller obtained by real-time analysis; the caller The risk probability corresponding to the sound feature of the environment and the risk probability corresponding to the voice feature of the caller determine the real-time analysis result.
  • the call analysis module can analyze the fraud risk probability corresponding to the operation of the smart phone by the authorized user and the fraud risk probability corresponding to the content of the call between the authorized user and the caller obtained by real-time analysis; the incoming call The risk probability corresponding to the sound feature of the environment where the object is located and the risk probability corresponding to the voice feature of the caller object are weighted and calculated to obtain the real-time comprehensive risk probability as a real-time analysis result.
  • the call analysis module can push real-time analysis results to the authorized user during the call between the authorized user using the smart phone and the caller. Whenever the call analysis module generates a real-time analysis result, it can be pushed to the authorized users in time.
  • the call analysis module may also generate a real-time notification based on the fraud risk probability corresponding to the operation of the smart phone by the authorized user analyzed in real time, and push it to the authorized user.
  • the call analysis module can analyze in real time the fraud risk probability corresponding to the content of the call between the authorized user and the caller, and analyze the risk probability corresponding to the sound characteristics of the environment in which the caller is located in real time. Or the risk probability corresponding to the voice feature of the caller is analyzed in real time, and a real-time notification is generated and pushed to the authorized user.
  • the function implemented by the call module can realize the accompanying risk reminder for the authorized user of the smart phone, and analyze and identify potential fraud risks in real time during the conversation between the authorized user and the caller, and promptly remind the user of the fraud risk.
  • the smart phone may also include an automatic answering module.
  • the automatic answering module automatically answers unfamiliar calls; makes smart calls with the caller; during the call, based on a preset fraud risk model, analyzes the content of the call in real time; when the real-time analysis result indicates a fraud risk, the authority is The user gives a risk warning.
  • the automatic answering module may conduct an intelligent call with the caller for the purpose of guiding the caller to disclose effective information.
  • the effective information is information that can provide a basis for the strong identification of fraud risks.
  • the automatic answering module (A) can have the following dialogue with the caller (B):
  • B guides A to reveal a lot of effective information, and based on this, it can be analyzed that the fraud risk probability is relatively high, and the authorized user can be prompted to report this unfamiliar call.
  • the automatic answering module can also remind the authorized user to answer the unfamiliar call if the real-time analysis result indicates that there is no risk of fraud after the intelligent call with the caller for a specified period of time.
  • the automatic answering module cannot confirm the risk of fraud within a certain period of time, it can basically determine that the possibility of fraud involving unfamiliar calls is low, and it can be answered by authorized users.
  • the smart phone may also include a blockchain wallet module.
  • the blockchain wallet module can receive the payment instruction issued by the authorized user; make payment according to the payment instruction, and submit the payment record to the blockchain network through the blockchain account of the authorized user Deposit evidence.
  • the blockchain wallet module uses encryption algorithms, identity verification, trusted computing and other technologies to allow authorized users to pay safely and conveniently in any scenario, so that transactions can be traced, and personal data privacy and assets are protected.
  • the circulation status information of the commodity can be obtained in the circulation link, and the obtained circulation status information and the commodity identification of the commodity can be written into the circulation of the commodity. Record, and submit the circulation record of the commodity generated in the circulation link to the blockchain for deposit.
  • the mobile phone may also include a blockchain traceability module.
  • the block chain traceability module can obtain the commodity identification of the commodity to be traced; obtain the circulation record containing the commodity identification of the commodity to be traced from the blockchain; determine the circulation process of the commodity to be traced according to the obtained circulation record, so as to check The commodity to be traced is traceable.
  • the smart phone may also include an application recommendation module, which uses the location-based service LBS to determine the location of the smart phone; according to the location of the smart phone, analyze the current application scenario ; According to the current application scenario, send a recommendation message to the authorized user.
  • the recommendation message is used to recommend that the authorized user install one or more applications on the smart phone.
  • the operating system of the smart phone in the embodiment of this specification may also have a built-in smart application store.
  • the LBS technology can be used to recommend the applications that the authorized user may need according to the current location of the authorized user.
  • the authorized user of the smart phone may be at the entrance of a certain restaurant, and the smart application store can determine that the authorized user may want to eat according to the location of the authorized user. Therefore, it can recommend the installation of food review applications to the user.
  • the smart phones in the embodiments of this specification have at least the following technical effects:
  • Smart phones can identify the attributes of items, identify genuine and fake products, identify whether the food is expired or corrupt, and have anti-counterfeiting functions.
  • Smart phones can actively answer suspicious calls and identify possible fraud risks. Smart phones can also monitor calls between users and others, analyze in real time whether there is a risk of fraud, promptly remind users to pay attention to property safety, and have anti-fraud features.
  • Smart phones support users to use blockchain wallets to make secure payments and protect users' personal privacy.
  • payment records will also be stored on the blockchain, making every payment verifiable and traceable.
  • Users can also use smart phones to trace the source of a certain commodity on the blockchain, understand the circulation status information of the commodity in each circulation link, and identify the authenticity of the commodity.
  • the user can trigger the smartphone to give an alarm through instructions, or trigger the smartphone to fly to the charging location for charging.
  • FIG. 11 is a schematic flowchart of a method for automatically moving a smart phone according to an embodiment of this specification, including the following steps:
  • S1101 The smart phone obtains flight operation instructions.
  • S1103 Fly along the flight trajectory through at least one electric turbofan engine installed.
  • the flight operation instructions specifically include: voice instructions, or, action instructions, or, "voice + action” instructions.
  • determining the flight trajectory specifically includes: if it is determined that the flight operation instruction is a mobile phone recall instruction or a mobile phone follow instruction, determining the flight trajectory for reaching the position of the authorized user.
  • determining the flight trajectory specifically includes: if the flight operation instruction is a mobile phone recall instruction, after controlling the smart phone to complete the flight trajectory, landing at the position of the authorized user; If the flight operation instruction is a mobile phone follow instruction, after the smart phone is controlled to complete the flight trajectory, the electric turbofan engine is used to continue to control the smart phone to be in a flying state, so that the smart phone and the authority Maintain a fixed distance between users.
  • Determining the flight trajectory specifically includes: using the location-based service LBS to determine the current location of the smart phone; collecting the image of the authorized user at the current location through the camera; according to the current location and the current location The image of the authorized user collected by the location determines the relative position of the authorized user with respect to the current position; according to the relative position of the current position and the authorized user with respect to the current position, it is determined for reaching the The flight trajectory of the user’s location.
  • the authorized user is located in the IoT area; for each IoT member device in the IoT area, the IoT member device monitors the surrounding environment in real time, and uploads the monitoring data to the IoT management device.
  • Determining the flight trajectory specifically includes: the smart phone uploads the identification information of the authorized user and the location of the smart phone to the Internet of Things management device; the Internet of Things management device according to the monitoring in the Internet of Things area Data and the identification information of the authorized user, determine the location of the authorized user, and determine the flight trajectory used to reach the location of the authorized user according to the location of the authorized user and the location of the smartphone; The smart phone learns the flight trajectory from the IoT management device.
  • the method further includes: learning the updated flight trajectory returned by the Internet of Things device after updating the flight trajectory, and flying along the updated flight trajectory.
  • determining the flight trajectory specifically includes: if it is determined that the flight operation instruction is a mobile phone charging instruction, determining the flight trajectory for reaching the charging position.
  • the method further includes: obtaining an alarm instruction; if it is determined that the alarm instruction is issued by the authorized user, executing an alarm operation.
  • the method further includes: when the smart phone is in the standby state, if it is detected that an unknown user sends out a wake-up signal, it enters the wake-up state; collecting identification information of the unknown user through the identification information collector set to obtain the unknown user User identification information collection; and comparing the identification information collection of the unknown user with the pre-stored identification information collection of the authorized user, and determine whether the unknown user is the authorized user according to the comparison result.
  • Obtaining a flight operation instruction specifically includes: receiving a flight operation instruction issued by the unknown user when the smart phone is in an awake state.
  • Comparing the identification information set of the unknown user with the pre-stored identification information set of the authorized user specifically includes: comparing the collected image information with the pre-stored image information; comparing the collected voice information with the pre-stored image information; The stored voice information is compared; the collected posture information is compared with the pre-stored posture information; the collected scent information is compared with the pre-stored scent information.
  • Judging whether the unknown user is the authorized user according to the comparison result specifically includes:
  • the unknown user is determined to be the authorized user, and if the number of consistent comparison results is not greater than the specified number, then the unknown user is determined not to be the authorized user. user.
  • the method further includes: before performing identification information collection on the unknown user, performing live detection on the unknown user; if it is determined that the unknown user is a living body, performing identification information collection on the unknown user.
  • FIG. 12 is a schematic flowchart of an item identification method provided by an embodiment of this specification, including the following steps:
  • S1201 The smart phone performs item feature collection on the item to be identified to obtain the item feature set.
  • S1202 Input the item feature set into a pre-trained item recognition model to obtain a recognition result corresponding to the item to be recognized.
  • the item feature set includes: at least one of a visible light plane image, an infrared plane image, a three-dimensional image, and odor information of the item to be identified.
  • the item to be identified is a food to be identified.
  • the collection of item features of the items to be identified to obtain the collection of item features specifically includes: collecting the features of the food to be identified through the collection of item feature collectors to obtain the collection of food features.
  • Inputting the item feature set to a pre-trained item recognition model to obtain the recognition result corresponding to the item to be recognized includes: inputting the food feature set to a pre-trained food recognition model to determine the item to be recognized Whether the food is normal.
  • FIG. 13 is a schematic flowchart of a call analysis method provided by an embodiment of this specification, including the following steps:
  • S1301 The smart phone analyzes the fraud risk in real time based on one or more preset fraud risk models during the conversation between the smart phone authorized user using the smart phone and the caller.
  • Real-time analysis of fraud risk includes: real-time analysis of the fraud risk probability corresponding to the operation of the smart phone by the authorized user; real-time analysis of the fraud risk probability corresponding to the content of the call between the authorized user and the caller; The risk probability corresponding to the sound feature of the environment in which the caller is located is described; the risk probability corresponding to the voice feature of the caller is analyzed in real time.
  • Determining the real-time analysis result specifically includes: the fraud risk probability corresponding to the operation of the smart phone by the authorized user and the fraud risk probability corresponding to the content of the call between the authorized user and the caller obtained according to the real-time analysis; The risk probability corresponding to the sound feature of the environment where the caller is located, and the risk probability corresponding to the voice feature of the caller, determine the real-time analysis result.
  • the fraud risk probability corresponding to the operation of the smart phone by the authorized user obtained by real-time analysis, the fraud risk probability corresponding to the content of the call between the authorized user and the caller; where the caller is located
  • the risk probability corresponding to the sound feature of the environment and the risk probability corresponding to the voice feature of the caller are weighted and calculated to obtain the real-time comprehensive risk probability as the real-time analysis result.
  • the method shown in FIG. 13 further includes: pushing a real-time analysis result to the authorized user during the call between the authorized user using the smart phone and the caller.
  • FIG. 14 is a schematic flowchart of a method for automatically answering an incoming call provided by an embodiment of this specification, including the following steps:
  • S1403 During the call, analyze the content of the call in real time based on the preset fraud risk model.
  • Performing a smart call with a caller specifically includes: conducting a smart call with the caller for the purpose of guiding the caller to disclose effective information; wherein the effective information is information that can provide a basis for strong fraud risk identification.
  • the method shown in FIG. 14 further includes: after a specified period of time has elapsed in the smart call with the caller, if the real-time analysis result indicates that there is no risk of fraud, then reminding the authorized user to answer the strange call.
  • FIG. 15 shows a more specific hardware structure diagram of a smart phone provided by an embodiment of this specification.
  • the device may include a processor 1510, a memory 1520, an input/output interface 1530, a communication interface 1540, and a bus 1550.
  • the processor 1510, the memory 1520, the input/output interface 1530, and the communication interface 1540 realize the communication connection between each other in the device through the bus 1550.
  • the processor 1510 may be implemented by a general CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits for execution related Program to implement the technical solutions provided in the embodiments of this specification.
  • a general CPU Central Processing Unit, central processing unit
  • a microprocessor an application specific integrated circuit (Application Specific Integrated Circuit, ASIC)
  • ASIC Application Specific Integrated Circuit
  • the memory 1520 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc.
  • the memory 1520 may store an operating system and other application programs. When the technical solutions provided in the embodiments of the present specification are implemented through software or firmware, related program codes are stored in the memory 1520 and called and executed by the processor 1510.
  • the input/output interface 1530 is used to connect an input/output module to realize information input and output.
  • the input/output/module can be configured in the device as a component (not shown in the figure), or can be connected to the device to provide corresponding functions.
  • the input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and an output device may include a display, a speaker, a vibrator, an indicator light, and the like.
  • the communication interface 1540 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices.
  • the communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.).
  • the bus 1550 includes a path to transmit information between various components of the device (for example, the processor 1510, the memory 1520, the input/output interface 1530, and the communication interface 1540).
  • the device may also include the equipment necessary for normal operation. Other components.
  • the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than all the components shown in the figures.
  • the embodiment of this specification also provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the function of each module shown in FIG. 8 is realized.
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • a typical implementation device is a computer.
  • the specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet computer, a wearable device, or a combination of any of these devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Chemical & Material Sciences (AREA)
  • Combustion & Propulsion (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Mechanical Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

公开了一种智能手机,该智能手机的权限用户可通过指令方式触发该智能手机以飞行方式抵达该权限用户指定的目的地。具体地,该智能手机包括指令响应模块、飞行控制模块以及至少一个电动涡轮风扇引擎。其中,所述指令响应模块用于对权限用户发出的飞行操作指令进行响应,确定飞行轨迹;电动涡轮风扇引擎为该智能手机提供飞行能力,所述飞行控制模块通过所述电动涡轮风扇,控制所述智能手机实现所述飞行轨迹,以抵达权限用户指定的目的地。

Description

一种智能手机 技术领域
本说明书实施例涉及数码产品领域,尤其涉及一种智能手机。
背景技术
在移动互联网时代,智能手机已成为人们在日常生活中使用频率最高的数码产品,甚至已成为重要的生产力工具。
在实际生活中,用户有时并不方便以携带方式将自己的智能手机移动到某处。例如,有时用户的智能手机与用户不在同一位置,用户当想要使用自己的智能手机时,不得不前往智能手机所在的位置拿取智能手机。又如,有时用户希望将自己的智能手机放置在其他位置,因此需要携带智能手机前往该其他位置进行放置。
发明内容
为了提升用户移动自己的手机的便利性,本说明书实施例提供一种智能手机,如下:
一种智能手机,包括:指令响应模块、飞行控制模块与至少一个电动涡轮风扇引擎;
所述指令响应模块,获取飞行操作指令;并且,若确定所述飞行操作指令是所述智能手机的权限用户发出的,则根据所述飞行操作指令,确定飞行轨迹,并将确定的飞行轨迹通知给所述飞行控制模块;
所述飞行控制模块,通过所述至少一个电动涡轮风扇引擎,控制所述智能手机沿所述飞行轨迹飞行。
本说明书实施例的技术方案,提供了一种智能手机,该智能手机的权限用户可通过指令方式触发该智能手机以飞行方式抵达该权限用户指定的目的地。具体地,该智能手机包括指令响应模块、飞行控制模块以及至少一个电动涡轮风扇引擎。其中,所述指令响应模块用于对权限用户发出的飞行操作指令进行响应,确定飞行轨迹;电动涡轮风扇引擎为该智能手机提供飞行能力,所述飞行控制模块通过所述电动涡轮风扇,控制所述智能手机实现所述飞行轨迹,以抵达权限用户指定的目的地。通过本说明书实施例,用户不必以携带方式移动自己的智能手机到某个位置,而是直接向智能手机发出飞行操作指令,智能手机会根据飞行操作指令自动飞行到用户指定的位置。如此,对用户而言更 为便利。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本说明书实施例。
此外,本说明书实施例中的任一实施例并不需要达到上述的全部效果。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书实施例中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的附图。
图1是本说明书实施例提供的一种智能手机的硬件结构示意图;
图2是本说明书实施例提供的涡轮风扇引擎的示意图;
图3a~3b是本说明书实施例提供的智能手机处于飞行状态的示意图;
图4a~4b是本说明书实施例提供的对智能手机进行折叠的过程示意图;
图5是本说明书实施例提供的智能手机处于功能状态3的示意图;
图6是本说明书实施例提供的智能手机处于功能状态2的示意图;
图7是本说明书实施例提供的智能手机处于功能状态1的示意图;
图8是本说明书实施例提供的智能手机的软件结构示意图;
图9是本说明书实施例提供的更具体的智能手机的软件结构示意图;
图10是本说明书实施例提供的一种权限用户召回智能手机的示意图;
图11是本说明书实施例提供的一种智能手机的自动移动方法的流程示意图;
图12是本说明书实施例提供的一种物品识别方法的流程示意图;
图13是本说明书实施例提供的一种通话分析方法的流程示意图;
图14是本说明书实施例提供的一种自动接听来电的方法的流程示意图;
图15是本说明书实施例提供的一种更为具体的智能手机硬件结构示意图。
具体实施方式
为了使本领域技术人员更好地理解本说明书实施例中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行详细地描述,显然,所描述的实施例仅仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员所获得的所有其他实施例,都应当属于保护的范围。
以下结合附图,详细说明本说明书各实施例提供的技术方案。
图1是本说明书实施例提供的一种智能手机的硬件结构示意图。需要说明的是,图1所示的智能手机的硬件结构只是作为示例,并不构成对本说明书实施例提供的智能手机的限制。
如图1所示,智能手机的机身的上部(或称顶部)与下部(或称底部)分别开设有贯穿机身的通孔,用于在机身内嵌入式地安装电动涡轮风扇引擎。此外,本说明书实施例中的智能手机也可以没有通孔,电动涡轮风扇可以安装于机身之外。
此处有必要对电动涡轮风扇引擎的原理进行说明。图2是本说明书实施例提供的涡轮风扇引擎的示意图。电动涡轮风扇引擎包括正向涡轮风扇与反向涡轮风扇。电动涡轮风扇引擎是受所述智能手机的电池的供电驱动的,电动涡轮风扇引擎运转时,通常是控制正向涡轮风扇与反向涡轮风扇以不同的旋转速度旋转,在相反的两个方向产生气压差,从而为所述智能手机的飞行提供动力。所述正向涡轮风扇所在的平面与所述反向涡轮风扇所在的平面可以是同一平面,也可以是平行的平面。正向涡轮风扇与反向涡轮风扇所在的平面相对于地平面的倾斜角度是可调节的,通过调节倾斜角度,可以改变所述电动涡轮风扇引擎的动力方向,从而驱动所述智能手机向不同的方向飞行。
例如,参见图3a,如果想要所述智能手机垂直于地面上升,则可以使正向涡轮风扇与所述反向涡轮风扇的平面相对于地面平行,并控制正向涡轮风扇的旋转速度大于反向涡轮风扇的旋转速度,产生气压差后,所述智能手机会垂直于地面上升。
又如,参见图3b,如果想要所述智能手机在水平方向上飞行,则可以使正向涡轮风扇与所述反向涡轮风扇的平面相对于地面有一定的倾斜角度,并控制正向涡轮风扇的旋转速度大于反向涡轮风扇的旋转速度,产生气压差后,所述智能手机会在水平方向上向前飞行。
在本说明书的一个或多个实施例中,智能手机的机身正面(除通孔口外)可以覆盖有屏幕,智能手机的机身背面可以分为背面上部、背面中部、与背面下部,背面上部(除 通孔口外)覆盖有屏幕。
在本说明书的一个或多个实施例中,智能手机的机身正面可以覆盖有柔性屏幕,实现机身正面的全面屏效果。所述智能手机的机身背面可以分为背面上部、背面中部、背面与下部,所述背面上部覆盖有屏幕(可以不是柔性屏幕)。
进一步地,所述背面上部与所述背面中部的衔接处可内折,所述背面中部与所述背面下部的衔接处可内折。如此,可以通过如下方式对智能手机的机身进行连续两次折叠:
将所述背面下部向内折叠,以完成单次折叠;继续将所述背面上部向内折叠,以完成再次折叠。对智能手机的折叠过程可参见图4a与图4b。
如图4a以及图4b所示中序号1~3表示所述智能手机的3个功能状态。
功能状态3是智能手机全展开时的全面屏形态,用户使用智能手机观看视频节目,如图5所示。
功能状态2是智能手机进行第一次折叠后的形态,用户可以使用智能手机识别商品真假或者打电话,如图6所示。
功能状态1是智能手机进行第二次折叠后的形态,用户可以使用智能手机进行支付。由于功能状态1下的智能手机的正面与背面都是屏幕显示区域,因此,可以在正面(面向用户的一面)显示订单信息,在背面显示付款二维码,用户可以持有智能手机,将智能手机背面贴近支付设备,进行支付,如图7所示。
在本说明书的一个或多个实施例中,智能手机可以包括一个或多个后置摄像头。进一步地,所述一个或多个后置摄像头可以隐藏于机身背面的屏幕下。
在本说明书的一个或多个实施例中,智能手机可以包括一个或多个前置摄像头。进一步地,所述一个或多个前置摄像头可以隐藏在机身正面的屏幕下。此外,所述一个或多个前置摄像头可用于实现人脸采集,以便用户通过人脸识别的方式解锁智能手机。
在本说明书的一个或多个实施例中,智能手机还可以包括听筒、麦克风、扬声器与指纹传感器中的一种或多种。进一步地,智能手机的听筒、麦克风、扬声器以及指纹传感器皆可以置于机身正面的屏幕下。此外,所述智能手机也可不包括听筒与扬声器,而是采用屏幕发声技术进行发声。
在本说明书的一个或多个实施例中,所述智能手机可以搭载石墨烯新能源电池。使用二维结构的石墨烯作为超导材料,可以实现较大的电池容量(如7200毫安)。所述 智能手机还可以支持快速充电(如100瓦功率的快速充电)。如此,所述智能手机可以具有较长的续航时间,而充满电量所需的充电时间却较短。此外,所述智能手机也可以支持无线悬浮充电,即智能手机悬浮于无线充电器上方进行充电。
在本说明书的一个或多个实施例中,所述智能手机可以搭载量子芯片,拥有大数量的(如100个)量子位。众所周知,量子是最小的不可分割的能量单位,而1个量子位同时有0和1两个状态,相应的N个量子位可同时存储2的N次方个数据。所以,量子芯片操作一次的效果和普通芯片要进行2的N次方次操作的效果等同,换言之量子芯片能一次完成2的N次方个数据的并行处理,这样的并行计算速度远高于传统芯片。
相较于搭载传统芯片,搭载量子芯片的智能手机的并行计算能力和速度都大幅提高,可用于处理海量数据。尤其是,随着5G时代与物联网时代的来临,对手机芯片的数据处理能力提出了很高的要求。所述智能手机搭载量子芯片后,可以基于5G通信技术接入物联网,成为物联网成员设备,处理大量的物联网数据。
图8是本说明书实施例提供的智能手机的软件结构示意图。
如图8所示,所述智能手机内置指令响应模块与飞行控制模块,用于实现:所述智能手机的权限用户可通过指令方式,触发所述智能手机以飞行方式抵达所述权限用户指定的目的地。
所述指令响应模块,获取飞行操作指令;并且,若确定所述飞行操作指令是所述智能手机的权限用户发出的,则根据所述飞行操作指令,确定飞行轨迹,并将确定的飞行轨迹通知给所述飞行控制模块。
所述飞行控制模块,通过所述至少一个电动涡轮风扇引擎,控制所述智能手机沿所述飞行轨迹飞行。
需要说明的是,所述权限用户是有权限操作所述智能手机的用户,其一般是所述智能手机的拥有者。
所述飞行操作指令是指用于触发所述智能手机以飞行方式飞往权限用户指定的目的地的指令。
在实践中,所述智能手机获取到的飞行操作指令不一定是所述权限用户发出的,也可能是未知用户发出的。因此,所述指令响应模块需要判断接收到的飞行操作指令是否为权限用户发出的,如果确定所述飞行操作指令是权限用户发出的,才会执行所述飞行操作指令,即根据所述飞行操作指令,确定目的地位置信息。在后文中,当使用“用户” 表述时,说明此处并不会限制是权限用户还是未知用户。
在实际应用中,用户可以手持智能手机,向智能手机输入飞行操作指令,所述飞行操作指令中包含用户指定的目的地位置信息。如果智能手机不在用户手边,用户也可以发出语音飞行操作指令,或发出动作飞行操作指令,或发出“语音+动作”指令(即语音与动作进行结合产生的指令)。当然,哪怕智能手机在用户手边,用户也可以选择发出语音、动作或“语音+动作”飞行操作指令。
需要说明的是,所述指令响应模块可以预先存储一个映射表,该映射表中记录有不同的语音内容所对应的目的地位置信息,也可以记录有不同的动作所对应的目的地位置信息,还可以记录不同的“语音+动作”所对应的目的地位置信息。
例如,所述指令响应模块存储的映射表中,语音内容“回来”对应的目的地位置信息为“用户手边”,“招手动作”对应的目的地位置信息也是“用户手边”。假设用户在房间的一侧,智能手机在房间的另一侧,用户可以喊“回来”,作为语音飞行操作指令,召回手机,也可以做招手动作,作为动作飞行操作指令,召回手机。
所述指令响应模块可以根据确定的目的地位置信息与所述智能手机当前所处的位置,确定飞行轨迹。
进一步地,还可以从功能角度对飞行操作指令进行区分。例如,用户发出的飞行操作指令可以是用于指令智能手机飞回到用户手边的手机召回指令,也可以是用于指令智能手机保持对用户跟随状态的手机跟随指令,还可以是用于指令智能手机前往充电位置的手机充电指令,以及可以是用于指令智能手机执行其他飞行操作的飞行操作指令。
所述指令响应模块在确定是权限用户发出所述飞行操作指令之后,如果确定所述飞行操作指令是手机召回指令或手机跟随指令,则可以确定用于抵达所述权限用户的位置的飞行轨迹。其中,所述权限用户的位置具体可以是一个小范围的区域,所述权限用户位于所述小范围的区域中,智能手机飞入所述小范围的区域内,就视为抵达所述权限用户的位置。所述权限用户的位置具体也可以是所述权限用户的手掌中。
相应地,所述飞行控制模块对于手机召回指令,可以在控制所述智能手机完成所述飞行轨迹之后,降落于所述权限用户的位置(例如降落于所述权限用户的手掌中)。
所述飞行控制模块对于手机跟随指令,可以在控制所述智能手机完成所述飞行轨迹之后,通过所述电动涡轮风扇引擎,继续控制所述智能手机处于飞行状态,使得所述智能手机与所述权限用户之间保持固定距离。
需要说明的是,所述智能手机可以安装有距离传感器。智能手机在跟随权限用户的过程中,如果权限用户静止,则所述飞行控制模块通过距离传感器检测到依然与所述权限用户保持固定距离,此时会控制所述智能手机会保持悬空状态;如果权限用户移动,则飞行控制模块会控制智能手机以飞行方式进行移动,以便继续保持与所述权限用户之间的固定距离。
此外,本说明书给出了以下两种确定飞行轨迹的方式。
方式一
方式一适用于智能手机与所述权限用户相距不远的情况下,在此场景下,所述智能手机需要具有摄像头,所述权限用户应当在所述智能手机的摄像头的拍摄范围内。
所述指令响应模块可以使用基于位置服务(Location Based Service,LBS),确定所述智能手机的当前位置;然后通过所述摄像头,在所述当前位置采集所述权限用户的图像;根据所述当前位置与在所述当前位置采集的所述权限用户的图像,确定所述权限用户相对于所述当前位置的相对位置;根据所述当前位置与所述权限用户相对于所述当前位置的相对位置,确定用于抵达所述权限用户的位置的飞行轨迹。
此处需要说明的是,由于对于智能手机而言,所述权限用户距离越远,在对所述权限用户进行拍摄得到的图像中所述权限用户所占的大小比例就越小。并且,根据对权限用户拍摄得到的图像中所述权限用户的身体朝向,也可以分析出所述权限用户的位置相对于所述智能手机的位置的相对方向。如此,所述指令响应模块可以根据智能手机的当前位置与在所述当前位置采集的所述权限用户的图像,分析出所述权限用户相对于所述当前位置的相对位置,进而得到所述权限用户的位置,最终确定飞行轨迹。
方式二
在方式二中,所述权限用户需要位于物联网区域内。所述物联网区域内存在多个物联网成员设备。需要说明的是,物联网区域内的物联网成员设备可以包括由物联网管理方布设的设备,也可以包括处于物联网区域内的每个用户的智能手机。
针对物联网区域内的每个物联网成员设备,该物联网成员设备可以实时对周边环境进行监控,并将监控数据上传给物联网管理方的物联网管理设备。监控数据一般包括图片、视频以及声音。
此处需要说明的是,本文中出现的各种“实时”操作,是指持续执行或周期性执行的操作。由于执行操作的对象可能在持续变化或周期性变化,因此,对该对象执行的操 作需要是“实时”的。
根据物联网管理设备存储的物联网区域内的监控数据,可以针对物联网区域内的每个瞬间,根据权限用户的识别信息,寻找权限用户在该瞬间于物联网区域内的位置。
其中,智能手机可以预先存储有所述权限用户的识别信息,具体可包括:权限用户的人脸图像、权限用户的身份证号、权限用户的手机号、权限用户的姓名与性别等等。
如此,所述指令响应模块可以将所述权限用户的识别信息与所述智能手机的位置上传给所述物联网管理设备,以使得所述物联网管理设备根据所述物联网区域内的监控数据与所述权限用户的识别信息,确定所述权限用户的位置,并根据所述权限用户的位置与所述智能手机的位置,确定用于抵达所述权限用户的位置的飞行轨迹;从所述物联网管理设备获取所述飞行轨迹。
当然,所述指令响应模块也可以不向物联网管理设备上传智能手机的位置,而是物联网管理设备把所述权限用户的位置直接发送给智能手机,由智能手机内的指令相应模块来直接确定飞行轨迹。
进一步地,由于在智能手机向权限用户的位置飞行的过程中,所述权限用户在物联网区域内的位置有可能发生变化。
因此,所述物联网设备当监测到所述权限用户的位置发生变化时,可以获取所述智能手机当前所处的位置(飞行轨迹上的某个位置),然后根据所述权限用户的变化后的位置于所述智能手机当前所处的位置,重新确定飞行轨迹,即更新飞行轨迹,并且,将更新后的飞行轨迹发送给所述智能手机的指令相应模块。所述指令响应模块可以将更新后的所述飞行轨迹通知给所述飞行控制模块,所述飞行控制模块可以控制所述智能手机沿更新后的所述飞行轨迹飞行。
此外,所述物联网设备当监测到所述权限用户的位置发生变化时,也可以将所述权限用户的变化后的位置发送给所述指令响应模块。指令响应模块根据所述权限用户变化后的位置与所述智能手机当前所在的位置,更新所述飞行轨迹,并将更新后的所述飞行轨迹发送给飞行控制模块。
需要说明的是,更新后的飞行轨迹一般是智能手机当前所在的位置为起点的。
此处需要说明的是,对于方式二,由于所述智能手机需要向物联网管理设备上传的权限用户的识别信息往往也是权限用户的隐私信息,因此,对于权限用户而言,其可能不想将自己的隐私信息泄露给物联网管理设备。
为此,在方式二中,智能手机与物联网管理设备之间,可以采用多方安全计算技术。具体地,智能手机使用与物联网管理设备约定的、一次性不可逆的变换算法,对权限用户的识别信息进行变换,将变换后的识别信息发送给物联网管理设备,物联网管理设备可以基于模糊匹配技术,在不获取权限用户的识别信息明文的前提下,确定到权限用户在物联网区域内的位置。
此外,所述指令相应模块若确定所述飞行操作指令是手机充电指令,则确定用于抵达充电位置的飞行轨迹。其中,所述智能手机可以具有无线悬浮充电功能,所述充电位置可以是无线悬浮充电器的上空。
图9是本说明书实施例提供的更具体的智能手机的软件结构示意图。
在本说明书的一个或多个实施例中,所述智能手机还可以包括报警模块。所述指令响应模块可以获取报警指令,若确定所述报警指令是所述权限用户发出的,则根据所述报警指令,触发所述报警模块。所述报警模块可以在被所述指令响应模块触发之后,执行报警操作。
其中,所述报警操作可以是拨通报警电话,向警务平台发送短信等。
在实践中,如果权限用户的智能手机被盗,或者权限用户遭遇紧迫危险时,可以通过发出报警指令的方式,触发自己的智能手机进行报警。
在本说明书的一个或多个实施例中,所述智能手机还可以包括答复模块。所述指令响应模块可以将获取的飞行操作指令发送给所述答复模块,然后,答复模块可以根据所述飞行操作指令,进行语音答复。
例如,权限用户发出的语音飞行操作指令为“回来”,智能手机可以通过答复模块答复“好的”。
另外,在本说明书的一个或多个实施例中,所述智能手机可以有待机状态、唤醒状态、飞行状态。当智能手机处于待机状态下,需要被唤醒后,才能进入唤醒状态。智能手机处于唤醒状态下,才可以响应各种操作指令。并且,在实践中,智能手机不一定被权限用户唤醒,也可能被非权限用户唤醒。因此,智能手机在被未知用户唤醒之后,在执行未知用户发出的操作指令之前,需要确定未知用户是否为权限用户。
还需要说明的是,唤醒智能手机的方式可以是语音唤醒,也可以是通过触发所述智能手机的屏幕或电源键来唤醒。
具体地,所述智能手机还可以包括唤醒模块、用户识别模块与包含至少一个识别信息采集器的识别信息采集器集合。所述至少一个识别信息采集器可以布设在所述智能手机的机身内部。
所述唤醒模块,当监测到有未知用户发出唤醒信号时,触发所述智能手机进入唤醒状态。
所述用户识别模块,在所述智能手机处于唤醒状态时,通过所述识别信息采集器集合,对所述未知用户进行识别信息采集,得到所述未知用户的识别信息集合;并且,对所述未知用户的识别信息集合与预先存储的所述权限用户的识别信息集合进行比对,根据比对结果判断所述未知用户是否为所述权限用户;用户识别模块一般会将判断结果通知给所述指令响应模块。
所述指令响应模块,在所述智能手机处于唤醒状态时,接收所述未知用户发出的飞行操作指令;并且,若确定所述用户识别模块识别出所述未知用户为所述权限用户,则根据所述飞行操作指令,确定飞行轨迹。
其中,所述识别信息采集器集合可以包括摄像头、化学传感器等。采集的识别信息可以包括:所述未知用户的图像信息、所述未知用户的语音信息、所述未知用户的姿态信息、所述未知用户的气味信息中的一种或多种。
预先存储的所述权限用户的识别信息包括:所述权限用户的图像信息、所述权限用户的语音信息、所述权限用户的姿态信息、所述权限用户的气味信息中的一种或多种。
进一步地,所述身份识别模块,可以将采集的图像信息与预先存储的图像信息进行比对;将采集的语音信息与预先存储的语音信息进行比对;将采集的姿态信息与预先存储的姿态信息进行比对;将采集的气味信息与预先存储的气味信息进行比对;若比对一致的比对结果数量大于指定数量,则确定所述未知用户为所述权限用户,若比对一致的比对结果数量不大于指定数量,则确定所述未知用户不为所述权限用户。
此外,所述智能手机还包括活体监测装置。所述身份识别模块,可以在对所述未知用户进行识别信息采集之前,对所述未知用户进行活体检测;若确定所述未知用户为活体,则对所述未知用户进行识别信息采集。
对未知用户进行活体监测的目的是,避免出现所述未知用户是假人(如权限用户的人体模型),欺骗所述识别信息传感器集合的情况。
图10是本说明书实施例提供的一种权限用户召回智能手机的示意图。如图10 所示,智能手机处于唤醒状态时,会悬浮于空中,待到权限用户发出手机召回指令时,智能手机会改变电动涡轮风扇的倾斜角度,使得智能手机可以向权限用户所在的位置飞行。
在本说明书的一个或多个实施例中,所述智能手机还具有识别物品属性的功能。
具体地,所述智能手机还可以包括物品识别模块与包含至少一个物品特征采集器的物品特征采集器集合。所述至少一个物品特征采集器可以布设在所述智能手机的机身内部。
所述物品识别模块可以通过所述物品特征采集器集合,对待识别物品进行物品特征采集,得到物品特征集合;将所述物品特征集合输入到预先训练的物品识别模型,得到所述待识别物品对应的识别结果。
需要说明的是,所述物品识别模型的训练方法一般是:
搜集多个物品,针对搜集的每个物品,采集该物品的物品特征,得到该物品的物品特征集合,并且,为该物品分配标签,该物品的标签记载了该物品的属性。然后,采用有监督机器学习算法,以搜集的每个物品的物品特征集合与标签为样本,训练得到物品识别模块。
在本说明书实施例中,所述物品特征采集器集合包括:至少一个可见光摄像头、投影仪、红外线摄像头、至少一个化学传感器。通过所述物品特征采集器集合采集得到的物品特征集合包括:所述待识别物品的可见光平面图像、红外线平面图像、三维图像、气味信息中的至少一种。上述各物品特征可以从多个维度反映出物品的特点。
需要说明的是,所述至少一个可见光摄像头用于采集所述待识别物品的可见光平面图像。当有不止一个可见光摄像头时,各可见光摄像头的焦距不同。物品识别模块可以通过各可见光摄像头可以分别对所述待识别物品进行拍摄,然后将得到的各可见光平面图像进行图形配准,得到一个综合的可见光平面图像。
所述红外线摄像头用于采集所述待识别物品的红外线平面图像。
所述至少一个化学传感器用于采集所述待识别物品周围的空气中各类化学分子的浓度信息。众所周知,气味实际上是各种化学分子以一定的浓度组合成的。因此,所述物体识别模块通过所述至少一个化学传感器获取所述待识别物品周围的空气中各类化学分子的浓度信息后,可以据此确定所述待识别物品的气味信息。
所述多个可见光摄像头、所述红外线摄像头、所述点阵投影仪结合起来,可以用于进行三维模型的构建。所述物品识别模块可以通过所述多个可见光摄像头、所述红外线摄像头、所述点阵投影仪,对所述待识别物品进行三维建模,得到所述待识别物品的三维图像。
进一步地,所述智能手机可以内置陀螺仪,用于定位所述智能手机在三维空间中的位置。如此,权限用户在使用智能手机扫描待识别物品时,物品识别模块可以通过陀螺仪定位所述智能手机的位置,进而辅助对待识别物品的特征采集。
举例来说,上述的物品识别功能可以用于判断一枚鸡蛋是否是土鸡蛋,识别一瓶酒的度数,判断一瓶酒是否是假酒,判断食品是否新鲜等等。
在实际应用中,可以预先获取多个食品样本,所述多个食品样本包括正常食品与异常食品;针对每个食品样本,采集该食物样本的食品特征集合,该食物样本的食品特征集合包括该食品样本的可见光平面图像、红外线平面图像、三维图像与气味信息;以每个食品样本的食品特征集合为特征,以每个食品样本是否正常为标签,训练用于识别食物是否正常的食品识别模型。
如此,假设所述待识别物品为待识别食品,那么,所述物品识别模块,通过所述物品特征采集器集合,对待识别食品进行食品特征采集,得到食品特征集合;将所述食品特征集合输入到预先训练的食品识别模型,以便判断所述待识别食品是否正常。
在本说明书的一个或多个实施例中,所述智能手机还包括通话分析模块。
通话分析模块可以在所述权限用户使用所述智能手机与来电对象的通话过程中,基于预设的一个或多个欺诈风险模型,实时分析欺诈风险;当实时分析结果表征具有欺诈风险时,对所述权限用户进行风险提示。
其中,实时分析欺诈风险,可以是随着通话过程的推进,持续分析通话所涉及的欺诈风险。如此,当权限用户与陌生人进行通话时,如果出现欺诈风险,智能手机可以及时提醒权限用户避免被骗。
进一步地,所述通话分析模块可以实时分析所述权限用户对所述智能手机的操作对应的欺诈风险概率、实时分析所述权限用户与所述来电对象的通话内容对应的欺诈风险概率、实时分析所述来电对象所处的环境的声音特征对应的风险概率以及实时分析所述来电对象的语音特征对应的风险概率。
其中,实时分析出的所述权限用户对所述智能手机的操作对应的欺诈风险概率, 表征所述权限用户当前因被欺诈而对所述智能手机的进行操作的可能性。
例如,权限用户在于来电对象进行通话过程中,如果同时操作智能手机向来电对象的手机号绑定的账户进行在线转账,而来电对象的手机号绑定的账户近期频繁收款,则意味着所述权限用户被欺诈的可能性较高。
实时分析出的所述权限用户与所述来电对象的通话内容对应的欺诈风险概率,表征所述来电对象当前对所述权限用户进行欺诈的可能性。
例如,所述来电对象在通话中声称自己售卖的保健品包治百病,需要赶紧付款抢购,此时,欺诈风险模型可以判断出所述来电对象很可能在对所述权限用户进行欺诈。
实时分析出的所述来电对象所处的环境的声音特征对应的风险概率,表征所述来电对象所处的环境是欺诈行为窝点的可能性。
例如,所述来电对象的通话声音嘈杂不清,周围还有其他人的声音,意味着所述来电对应所处的环境很可能是个欺诈行为窝点,即欺诈分子聚集的地点。
实时分析出的所述来电对象的语音特征对应的风险概率,表征所述来电对象伪装身份和/或伪装情绪的可能性。
例如,来电对象声称自己在医院继续权限用户打款,但是语音特征显出,来电对象的情绪并不急切,因此来电对象伪装情绪欺诈权限用户的可能性较高。又如,来电对象声称自己的是权限用户的某个亲属,但是来电对象的语音特征(主要是音色)与通话分析模块获取的权限用户的该亲属的语音特征不符,因此,来电对象伪装身份欺诈权限用户的可能性较高。
所述通话分析模块可以根据实时分析得到的所述权限用户对所述智能手机的操作对应的欺诈风险概率、所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;所述来电对象所处的环境的声音特征对应的风险概率、所述来电对象的语音特征对应的风险概率,确定实时分析结果。
具体地,通话分析模块可以对实时分析得到的所述权限用户对所述智能手机的操作对应的欺诈风险概率、所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;所述来电对象所处的环境的声音特征对应的风险概率、所述来电对象的语音特征对应的风险概率进行加权计算,得到实时综合风险概率,作为实时分析结果。
此外,通话分析模块可以在所述权限用户使用所述智能手机与来电对象的通话 过程中,向所述权限用户推送实时分析结果。通话分析模块每当产生一个实时分析结果,就可以及时推送给权限用户。
进一步地,通话分析模块还可以根据实时分析出的所述权限用户对所述智能手机的操作对应的欺诈风险概率,生成实时通知,推送给权限用户。类似的,通话分析模块可以根据实时分析出的所述权限用户与所述来电对象的通话内容对应的欺诈风险概率、实时分析出的所述来电对象所处的环境的声音特征对应的风险概率,或实时分析出的所述来电对象的语音特征对应的风险概率,生成实时通知,推送给权限用户。
所述通话模块实现的功能,可以实现对智能手机的权限用户的陪伴式风险提醒,在权限用户与来电对象的通话过程中,实时分析识别潜在的欺诈风险,并及时提醒用户欺诈风险。
在本说明书的一个或多个实施例中,所述智能手机还可以包括自动接听模块。
所述自动接听模块,自动接听陌生来电;与来电对象进行智能通话;在通话过程中,基于预设的欺诈风险模型,实时分析通话内容;当实时分析结果表征具有欺诈风险时,对所述权限用户进行风险提示。
如此,对于有可能是欺诈电话的陌生来电,不会打扰到权限用户,而是由自动接听模块自动接听,与来电对象进行智能通话,来识别是否存在欺诈风险。
进一步地,所述自动接听模块可以以引导来电对象透露有效信息为目的,与所述来电对象进行智能通话。其中,所述有效信息为,可为欺诈风险强识别提供依据的信息。
例如,当要陌生来电时,所述自动接听模块(A)可以与来电对象(B)进行如下对话:
B:喂,你是xx的家人吗?
A:我是,怎么了?
B:你儿子出车祸了。
A:啊!什么情况?
B:颅内出血,需要手术,要七万块。
A:不可能吧!
B:你的电话就是警察提供的。
A:你是什么人?
B:我是送你儿子到医院的好心人。
A:你们在什么地方,我现在过来。
B:来不及了,先转钱救命吧,我现在就在xxxx医院的收费窗口。
可见,在上述智能通话中,B引导A透露了很多有效信息,据此可以分析出诈骗风险概率较大,可以提示权限用户对此陌生来电进行举报。
此外,自动接听模块还可以在与来电对象进行智能通话经过指定时长后,若实时分析结果表征不具有欺诈风险,则提醒所述权限用户接听所述陌生来电。
也就是所,自动接听模块如果在一定时间内无法确认具有欺诈风险,那么,就可以基本认定陌生来电涉及欺诈的可能性较低,可以由权限用户来接听。
在本说明书的一个或多个实施例中,智能手机还可以包括区块链钱包模块。
所述区块链钱包模块,可以接收所述权限用户发出的支付指令;根据所述支付指令,进行支付,并通过所述权限用户的区块链账户,将支付记录提交给区块链网络进行存证。
此外,区块链钱包模块通过加密算法、身份验证、可信计算等技术,让权限用户可以在任何场景安全、方便的支付,让交易可追溯,让个人数据隐私和资产都得到保护。
在本说明书的一个或多个实施例中,可以预先针对商品的每个流通环节,在该流通环节获取商品的流通状态信息,并将获取的流通状态信息与商品的商品标识写入商品的流通记录,并且,将在该流通环节产生的商品的流通记录提交给区块链进行存证。
如此,所述手机还可以包括区块链溯源模块。所述区块链溯源模块可以获取待溯源商品的商品标识;从区块链获取包含待溯源商品的商品标识的流通记录;根据获取的流通记录,确定所述待溯源商品的流通过程,以便对所述待溯源商品进行溯源。
在实际应用中,权限用户在购买商品时,可以使用自己的智能手机扫描商品的条形码,获取商品标识,进而使用自己的智能手机对商品进行溯源,了解商品的出产地、出产日期以及中间的各个流通环节的情况。
在本说明书的一个或多个实施例中,智能手机还可以包括应用推荐模块,使用基于位置服务LBS,确定所述智能手机的位置;根据所述智能手机的位置,分析当前所处的应用场景;根据当前所处的应用场景,向所述权限用户发送推荐消息。其中,所述推荐消息用于推荐所述权限用户在所述智能手机上安装一个或多个应用。
也就是说,本说明书实施例中的智能手机的操作系统中还可以内置智能应用商店。权限用户操作智能手机打开智能应用商店时,可以利用LBS技术,根据苏权限用户当前所处的位置,为权限用户推荐其可能需要的应用。
例如,智能手机的权限用户可能在某个饭店门口,智能应用商店可以根据权限用户位置,判断出权限用户可能想用餐,因此,可以向用户推荐安装美食点评类应用。
综上,本说明书各实施例中的智能手机至少具有以下技术效果:
可以响应于用户的指令,以飞行方式抵达用户指定的位置,哪怕用户的智能手机丢失,用户也可以通过指令将自己的智能手机召回,也就是说,智能手机具有防盗功能。
智能手机可以识别物品属性,识别真假货、识别食物是否过期或是否败腐,具有防假货功能。
智能手机可以主动接听可疑来电,识别出可能存在的诈骗风险。智能手机也可以监听用户与他人之间的通话,实时分析是否存在诈骗风险,及时提醒用户注意财产安全,具有防欺诈功能。
智能手机支持用户使用区块链钱包进行安全支付,保护用户的个人隐私,并且,支付记录也会被存证于区块链,使得每笔支付都是可查证可追溯的。用户也可以使用智能手机对某个商品进行区块链溯源,了解商品在各个流通环节的流通状态信息,识别商品真假。
此外,用户可以通过指令触发智能手机进行报警,或触发智能手机以飞行方式抵达充电位置进行充电。
图11是本说明书实施例提供的一种智能手机的自动移动方法的流程示意图,包括如下步骤:
S1101:智能手机获取飞行操作指令。
S1102:若确定所述飞行操作指令是所述智能手机的权限用户发出的,则根据所 述飞行操作指令,确定飞行轨迹。
S1103:通过安装的至少一个电动涡轮风扇引擎,沿所述飞行轨迹飞行。
所述飞行操作指令具体包括:语音指令,或,动作指令,或,“语音+动作”指令。
根据所述飞行操作指令,确定飞行轨迹,具体包括:若确定所述飞行操作指令是手机召回指令或手机跟随指令,则确定用于抵达所述权限用户的位置的飞行轨迹。
根据所述飞行操作指令,确定飞行轨迹,具体包括:若所述飞行操作指令是手机召回指令,则在控制所述智能手机完成所述飞行轨迹之后,降落于所述权限用户的位置;若所述飞行操作指令是手机跟随指令,则在控制所述智能手机完成所述飞行轨迹之后,通过所述电动涡轮风扇引擎,继续控制所述智能手机处于飞行状态,使得所述智能手机与所述权限用户之间保持固定距离。
确定飞行轨迹,具体包括:使用基于位置服务LBS,确定所述智能手机的当前位置;通过所述摄像头,在所述当前位置采集所述权限用户的图像;根据所述当前位置与在所述当前位置采集的所述权限用户的图像,确定所述权限用户相对于所述当前位置的相对位置;根据所述当前位置与所述权限用户相对于所述当前位置的相对位置,确定用于抵达所述权限用户的位置的飞行轨迹。
所述权限用户位于物联网区域内;针对所述物联网区域内的每个物联网成员设备,该物联网成员设备实时对周边环境进行监控,并将监控数据上传给物联网管理设备。
确定飞行轨迹,具体包括:所述智能手机将所述权限用户的识别信息与所述智能手机的位置上传给所述物联网管理设备;所述物联网管理设备根据所述物联网区域内的监控数据与所述权限用户的识别信息,确定所述权限用户的位置,并根据所述权限用户的位置与所述智能手机的位置,确定用于抵达所述权限用户的位置的飞行轨迹;所述智能手机从所述物联网管理设备获知所述飞行轨迹。
所述方法还包括:获知物联网设备在对所述飞行轨迹进行更新后返回的更新后的所述飞行轨迹,沿更新后的所述飞行轨迹飞行。
根据所述飞行操作指令,确定飞行轨迹,具体包括:若确定所述飞行操作指令是手机充电指令,则确定用于抵达充电位置的飞行轨迹。
所述方法还包括:获取报警指令;若确定所述报警指令是所述权限用户发出的, 则执行报警操作。
所述方法还包括:智能手机当处于待机状态时,若监测到有未知用户发出唤醒信号,则进入唤醒状态;通过识别信息采集器集合,对所述未知用户进行识别信息采集,得到所述未知用户的识别信息集合;并且,对所述未知用户的识别信息集合与预先存储的所述权限用户的识别信息集合进行比对,根据比对结果判断所述未知用户是否为所述权限用户。
获取飞行操作指令,具体包括:在所述智能手机处于唤醒状态时,接收所述未知用户发出的飞行操作指令。
对所述未知用户的识别信息集合与预先存储的所述权限用户的识别信息集合进行比对,具体包括:将采集的图像信息与预先存储的图像信息进行比对;将采集的语音信息与预先存储的语音信息进行比对;将采集的姿态信息与预先存储的姿态信息进行比对;将采集的气味信息与预先存储的气味信息进行比对。
根据比对结果判断所述未知用户是否为所述权限用户,具体包括:
若比对一致的比对结果数量大于指定数量,则确定所述未知用户为所述权限用户,若比对一致的比对结果数量不大于指定数量,则确定所述未知用户不为所述权限用户。
所述方法还包括:在对所述未知用户进行识别信息采集之前,对所述未知用户进行活体检测;若确定所述未知用户为活体,则对所述未知用户进行识别信息采集。
图12是本说明书实施例提供的一种物品识别方法的流程示意图,包括如下步骤:
S1201:智能手机对待识别物品进行物品特征采集,得到物品特征集合。
S1202:将所述物品特征集合输入到预先训练的物品识别模型,得到所述待识别物品对应的识别结果。
所述物品特征集合包括:所述待识别物品的可见光平面图像、红外线平面图像、三维图像、气味信息中的至少一种。
进一步地,所述待识别物品为待识别食品。
通过物品特征采集器集合,对待识别物品进行物品特征采集,得到物品特征集合,具体包括:通过所述物品特征采集器集合,对待识别食品进行食品特征采集,得到食品特征集合。
将所述物品特征集合输入到预先训练的物品识别模型,得到所述待识别物品对应的识别结果,具体包括:将所述食品特征集合输入到预先训练的食品识别模型,以便判断所述待识别食品是否正常。
图13是本说明书实施例提供的一种通话分析方法的流程示意图,包括如下步骤:
S1301:智能手机在所述智能手机的权限用户使用所述智能手机与来电对象的通话过程中,基于预设的一个或多个欺诈风险模型,实时分析欺诈风险。
S1302:当实时分析结果表征具有欺诈风险时,对所述权限用户进行风险提示。
实时分析欺诈风险,具体包括:实时分析所述权限用户对所述智能手机的操作对应的欺诈风险概率;实时分析所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;实时分析所述来电对象所处的环境的声音特征对应的风险概率;实时分析所述来电对象的语音特征对应的风险概率。
确定实时分析结果,具体包括:根据实时分析得到的所述权限用户对所述智能手机的操作对应的欺诈风险概率、所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;所述来电对象所处的环境的声音特征对应的风险概率、所述来电对象的语音特征对应的风险概率,确定实时分析结果。
进一步地,对实时分析得到的所述权限用户对所述智能手机的操作对应的欺诈风险概率、所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;所述来电对象所处的环境的声音特征对应的风险概率、所述来电对象的语音特征对应的风险概率进行加权计算,得到实时综合风险概率,作为实时分析结果。
图13所示的方法还包括:在所述权限用户使用所述智能手机与来电对象的通话过程中,向所述权限用户推送实时分析结果。
图14是本说明书实施例提供的一种自动接听来电的方法的流程示意图,包括如下步骤:
S1401:智能手机自动接听陌生来电。
S1402:与来电对象进行智能通话。
S1403:在通话过程中,基于预设的欺诈风险模型,实时分析通话内容。
S1404:当实时分析结果表征具有欺诈风险时,对所述权限用户进行风险提示。
与来电对象进行智能通话,具体包括:以引导来电对象透露有效信息为目的, 与所述来电对象进行智能通话;其中,所述有效信息为,可为欺诈风险强识别提供依据的信息。
图14所示的方法还包括:在与来电对象进行智能通话经过指定时长后,若实时分析结果表征不具有欺诈风险,则提醒所述权限用户接听所述陌生来电。
图15示出了本说明书实施例所提供的一种更为具体的智能手机硬件结构示意图,该设备可以包括:处理器1510、存储器1520、输入/输出接口1530、通信接口1540和总线1550。其中处理器1510、存储器1520、输入/输出接口1530和通信接口1540通过总线1550实现彼此之间在设备内部的通信连接。
处理器1510可以采用通用的CPU(Central Processing Unit,中央处理器)、微处理器、应用专用集成电路(Application Specific Integrated Circuit,ASIC)、或者一个或多个集成电路等方式实现,用于执行相关程序,以实现本说明书实施例所提供的技术方案。
存储器1520可以采用ROM(Read Only Memory,只读存储器)、RAM(Random Access Memory,随机存取存储器)、静态存储设备,动态存储设备等形式实现。存储器1520可以存储操作系统和其他应用程序,在通过软件或者固件来实现本说明书实施例所提供的技术方案时,相关的程序代码保存在存储器1520中,并由处理器1510来调用执行。
输入/输出接口1530用于连接输入/输出模块,以实现信息输入及输出。输入输出/模块可以作为组件配置在设备中(图中未示出),也可以外接于设备以提供相应功能。其中输入设备可以包括键盘、鼠标、触摸屏、麦克风、各类传感器等,输出设备可以包括显示器、扬声器、振动器、指示灯等。
通信接口1540用于连接通信模块(图中未示出),以实现本设备与其他设备的通信交互。其中通信模块可以通过有线方式(例如USB、网线等)实现通信,也可以通过无线方式(例如移动网络、WIFI、蓝牙等)实现通信。
总线1550包括一通路,在设备的各个组件(例如处理器1510、存储器1520、输入/输出接口1530和通信接口1540)之间传输信息。
需要说明的是,尽管上述设备仅示出了处理器1510、存储器1520、输入/输出接口1530、通信接口1540以及总线1550,但是在具体实施过程中,该设备还可以包括实现正常运行所必需的其他组件。此外,本领域的技术人员可以理解的是,上述设备中也 可以仅包含实现本说明书实施例方案所必需的组件,而不必包含图中所示的全部组件。
本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现图8所示的每个模块的功能。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本说明书实施例可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本说明书实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本说明书实施例各个实施例或者实施例的某些部分所述的方法。
上述实施例阐明的系统、方法、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于方法和设备实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的方法实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,在实施本说明书实施例方案时可以把各模块的功能在同一个或多个软件和/或硬件中实现。也可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在 不付出创造性劳动的情况下,即可以理解并实施。
以上所述仅是本说明书实施例的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本说明书实施例原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本说明书实施例的保护范围。

Claims (28)

  1. 一种智能手机,包括:指令响应模块、飞行控制模块与至少一个电动涡轮风扇引擎;
    所述指令响应模块,获取飞行操作指令;并且,若确定所述飞行操作指令是所述智能手机的权限用户发出的,则根据所述飞行操作指令,确定飞行轨迹,并将确定的飞行轨迹通知给所述飞行控制模块;
    所述飞行控制模块,通过所述至少一个电动涡轮风扇引擎,控制所述智能手机沿所述飞行轨迹飞行。
  2. 如权利要求1所述的智能手机,所述智能手机的机身的上部与下部分别开设有贯穿机身的通孔;
    每个通孔中安装有电动涡轮风扇引擎。
  3. 如权利要求1所述的智能手机,所述智能手机的机身正面覆盖有柔性屏幕;
    所述智能手机的机身背面分为背面上部、背面中部、背面与下部;所述背面上部覆盖有屏幕,所述背面上部与所述背面中部的衔接处可内折,所述背面中部与所述背面下部的衔接处可内折;
    对所述智能手机的机身的折叠方式如下:
    将所述背面下部向内折叠,以完成单次折叠;
    继续将所述背面上部向内折叠,以完成再次折叠。
  4. 如权利要求1所述的智能手机,所述飞行操作指令为语音指令,或,动作指令,或,“语音+动作”指令。
  5. 如权利要求1所述的智能手机,所述指令响应模块,若确定所述飞行操作指令是手机召回指令或手机跟随指令,则确定用于抵达所述权限用户的位置的飞行轨迹;
    所述飞行控制模块,若所述飞行操作指令是手机召回指令,则在控制所述智能手机完成所述飞行轨迹之后,降落于所述权限用户的位置;若所述飞行操作指令是手机跟随指令,则在控制所述智能手机完成所述飞行轨迹之后,通过所述电动涡轮风扇引擎,继续控制所述智能手机处于飞行状态,使得所述智能手机与所述权限用户之间保持固定距离。
  6. 如权利要求5所述的智能手机,所述智能手机还包括:摄像头;
    所述指令响应模块,使用基于位置服务LBS,确定所述智能手机的当前位置;通过所述摄像头,在所述当前位置采集所述权限用户的图像;根据所述当前位置与在所述当前位置采集的所述权限用户的图像,确定所述权限用户相对于所述当前位置的相对位置; 根据所述当前位置与所述权限用户相对于所述当前位置的相对位置,确定用于抵达所述权限用户的位置的飞行轨迹。
  7. 如权利要求5所述的智能手机,所述权限用户位于物联网区域内;针对所述物联网区域内的每个物联网成员设备,该物联网成员设备实时对周边环境进行监控,并将监控数据上传给物联网管理设备;
    所述指令响应模块,将所述权限用户的识别信息与所述智能手机的位置上传给所述物联网管理设备,以使得所述物联网管理设备根据所述物联网区域内的监控数据与所述权限用户的识别信息,确定所述权限用户的位置,并根据所述权限用户的位置与所述智能手机的位置,确定用于抵达所述权限用户的位置的飞行轨迹;从所述物联网管理设备获知所述飞行轨迹。
  8. 如权利要求7所述的智能手机,所述指令响应模块,获知物联网设备在对所述飞行轨迹进行更新后返回的更新后的所述飞行轨迹,并将更新后的所述飞行轨迹通知给所述飞行控制模块;
    所述飞行控制模块,控制所述智能手机沿更新后的所述飞行轨迹飞行。
  9. 如权利要求1所述的智能手机,所述指令响应模块,若确定所述飞行操作指令是手机充电指令,则确定用于抵达充电位置的飞行轨迹。
  10. 如权利要求1所述的智能手机,所述智能手机还包括:报警模块;
    所述指令响应模块,获取报警指令;若确定所述报警指令是所述权限用户发出的,则根据所述报警指令,触发所述报警模块;
    所述报警模块,在被所述指令响应模块触发之后,执行报警操作。
  11. 如权利要求1所述的智能手机,所述智能手机还包括:唤醒模块、用户识别模块与包含至少一个识别信息采集器的识别信息采集器集合;
    所述唤醒模块,当监测到有未知用户发出唤醒信号时,触发所述智能手机进入唤醒状态;
    所述用户识别模块,在所述智能手机处于唤醒状态时,通过所述识别信息采集器集合,对所述未知用户进行识别信息采集,得到所述未知用户的识别信息集合;并且,对所述未知用户的识别信息集合与预先存储的所述权限用户的识别信息集合进行比对,根据比对结果判断所述未知用户是否为所述权限用户;
    所述指令响应模块,在所述智能手机处于唤醒状态时,接收所述未知用户发出的飞行操作指令;并且,若确定所述用户识别模块识别出所述未知用户为所述权限用户,则根据所述飞行操作指令,确定飞行轨迹。
  12. 如权利要求11所述的智能手机,采集的识别信息包括:所述未知用户的图像信息、所述未知用户的语音信息、所述未知用户的姿态信息、所述未知用户的气味信息;
    预先存储的所述权限用户的识别信息包括:所述权限用户的图像信息、所述权限用户的语音信息、所述权限用户的姿态信息、所述权限用户的气味信息。
  13. 如权利要求12所述的智能手机,所述身份识别模块,将采集的图像信息与预先存储的图像信息进行比对;将采集的语音信息与预先存储的语音信息进行比对;将采集的姿态信息与预先存储的姿态信息进行比对;将采集的气味信息与预先存储的气味信息进行比对;若比对一致的比对结果数量大于指定数量,则确定所述未知用户为所述权限用户,若比对一致的比对结果数量不大于指定数量,则确定所述未知用户不为所述权限用户。
  14. 如权利要求11所述的智能手机,所述身份识别模块,在对所述未知用户进行识别信息采集之前,对所述未知用户进行活体检测;若确定所述未知用户为活体,则对所述未知用户进行识别信息采集。
  15. 如权利要求1所述的智能手机,所述智能手机还包括:物品识别模块与包含至少一个物品特征采集器的物品特征采集器集合;
    所述物品识别模块,通过所述物品特征采集器集合,对待识别物品进行物品特征采集,得到物品特征集合;将所述物品特征集合输入到预先训练的物品识别模型,得到所述待识别物品对应的识别结果。
  16. 如权利要求15所述的智能手机,所述物品特征集合包括:所述待识别物品的可见光平面图像、红外线平面图像、三维图像、气味信息中的至少一种。
  17. 如权利要求16所述的智能手机,预先获取多个食品样本,所述多个食品样本包括正常食品与异常食品;针对每个食品样本,采集该食物样本的食品特征集合,该食物样本的食品特征集合包括该食品样本的可见光平面图像、红外线平面图像、三维图像与气味信息;以每个食品样本的食品特征集合为特征,以每个食品样本是否正常为标签,训练用于识别食物是否正常的食品识别模型;
    所述待识别物品为待识别食品;
    所述物品识别模块,通过所述物品特征采集器集合,对待识别食品进行食品特征采集,得到食品特征集合;将所述食品特征集合输入到预先训练的食品识别模型,以便判断所述待识别食品是否正常。
  18. 如权利要求1所述的智能手机,所述智能手机还包括:通话分析模块;
    所述通话分析模块,在所述权限用户使用所述智能手机与来电对象的通话过程中, 基于预设的一个或多个欺诈风险模型,实时分析欺诈风险;当实时分析结果表征具有欺诈风险时,对所述权限用户进行风险提示。
  19. 如权利要求18所述的智能手机,所述通话分析模块,实时分析所述权限用户对所述智能手机的操作对应的欺诈风险概率;实时分析所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;实时分析所述来电对象所处的环境的声音特征对应的风险概率;实时分析所述来电对象的语音特征对应的风险概率;
    其中,实时分析出的所述权限用户对所述智能手机的操作对应的欺诈风险概率,表征所述权限用户当前因被欺诈而对所述智能手机的进行操作的可能性;
    实时分析出的所述权限用户与所述来电对象的通话内容对应的欺诈风险概率,表征所述来电对象当前对所述权限用户进行欺诈的可能性;
    实时分析出的所述来电对象所处的环境的声音特征对应的风险概率,表征所述来电对象所处的环境是欺诈行为窝点的可能性;
    实时分析出的所述来电对象的语音特征对应的风险概率,表征所述来电对象伪装身份和/或伪装情绪的可能性。
  20. 如权利要求19所述的智能手机,所述通话分析模块,根据实时分析得到的所述权限用户对所述智能手机的操作对应的欺诈风险概率、所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;所述来电对象所处的环境的声音特征对应的风险概率、所述来电对象的语音特征对应的风险概率,确定实时分析结果。
  21. 如权利要求20所述的智能手机,所述通话分析模块,对实时分析得到的所述权限用户对所述智能手机的操作对应的欺诈风险概率、所述权限用户与所述来电对象的通话内容对应的欺诈风险概率;所述来电对象所处的环境的声音特征对应的风险概率、所述来电对象的语音特征对应的风险概率进行加权计算,得到实时综合风险概率,作为实时分析结果。
  22. 如权利要求18所述的智能手机,所述通话分析模块,在所述权限用户使用所述智能手机与来电对象的通话过程中,向所述权限用户推送实时分析结果。
  23. 如权利要求1所述的智能手机,所述智能手机还包括:自动接听模块;
    所述自动接听模块,自动接听陌生来电;与来电对象进行智能通话;在通话过程中,基于预设的欺诈风险模型,实时分析通话内容;当实时分析结果表征具有欺诈风险时,对所述权限用户进行风险提示。
  24. 如权利要求23所述的智能手机,所述自动接听模块,以引导来电对象透露有效信息为目的,与所述来电对象进行智能通话;
    其中,所述有效信息为,可为欺诈风险强识别提供依据的信息。
  25. 如权利要求23所述的智能手机,所述自动接听模块,在与来电对象进行智能通话经过指定时长后,若实时分析结果表征不具有欺诈风险,则提醒所述权限用户接听所述陌生来电。
  26. 如权利要求1所述的智能手机,所述智能手机还包括区块链钱包模块;
    所述区块链钱包模块,接收所述权限用户发出的支付指令;根据所述支付指令,进行支付,并通过所述权限用户的区块链账户,将支付记录提交给区块链网络进行存证。
  27. 如权利要求1所述的智能手机,预先针对商品的每个流通环节,在该流通环节获取商品的流通状态信息,并将获取的流通状态信息与商品的商品标识写入商品的流通记录,并且,将在该流通环节产生的商品的流通记录提交给区块链进行存证;
    所述智能手机还包括区块链溯源模块;
    所述区块链溯源模块,获取待溯源商品的商品标识;从区块链获取包含待溯源商品的商品标识的流通记录;根据获取的流通记录,确定所述待溯源商品的流通过程,以便对所述待溯源商品进行溯源。
  28. 如权利要求1所述的智能手机,所述智能手机还包括:应用推荐模块;
    所述应用推荐模块,使用基于位置服务LBS,确定所述智能手机的位置;根据所述智能手机的位置,分析当前所处的应用场景;根据当前所处的应用场景,向所述权限用户发送推荐消息;
    其中,所述推荐消息用于推荐所述权限用户在所述智能手机上安装一个或多个应用。
PCT/CN2020/073814 2019-03-29 2020-01-22 一种智能手机 WO2020199742A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910252878.7 2019-03-29
CN201910252878.7A CN111343330A (zh) 2019-03-29 2019-03-29 一种智能手机

Publications (1)

Publication Number Publication Date
WO2020199742A1 true WO2020199742A1 (zh) 2020-10-08

Family

ID=71185781

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073814 WO2020199742A1 (zh) 2019-03-29 2020-01-22 一种智能手机

Country Status (2)

Country Link
CN (1) CN111343330A (zh)
WO (1) WO2020199742A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114677776A (zh) * 2022-04-29 2022-06-28 遵义职业技术学院 一种用于企业管理的智能设备及使用方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101732873A (zh) * 2009-12-31 2010-06-16 上海杰远环保科技有限公司 一种用以响应用户需求的飞行器型手持终端
WO2014161390A1 (zh) * 2013-11-08 2014-10-09 中兴通讯股份有限公司 一种控制移动终端的方法及移动终端
CN107888730A (zh) * 2017-11-30 2018-04-06 上海孩子国科教设备有限公司 飞行式手机及其充电系统
CN107902088A (zh) * 2017-11-30 2018-04-13 上海孩子国科教设备有限公司 可调整显示尺寸的飞行式移动终端和系统

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458412B (zh) * 2012-06-04 2017-03-15 百度在线网络技术(北京)有限公司 防止电话诈骗的系统、方法及移动终端、云端分析服务器
JP2014212479A (ja) * 2013-04-19 2014-11-13 ソニー株式会社 制御装置、制御方法及びコンピュータプログラム
CN104880195A (zh) * 2015-06-02 2015-09-02 瑞声声学科技(深圳)有限公司 移动通信导航终端及其导航方法
CN105226836B (zh) * 2015-10-20 2017-12-29 杨珊珊 一种能够自动充电的无人机、无人机充电系统和充电方法
CN105721660B (zh) * 2016-02-03 2018-09-11 北京光年无限科技有限公司 骚扰电话识别方法及系统
CN107343077B (zh) * 2016-04-28 2019-12-13 腾讯科技(深圳)有限公司 识别恶意电话及建立识别模型的方法、装置、设备
CN106210511A (zh) * 2016-06-30 2016-12-07 纳恩博(北京)科技有限公司 一种定位用户的方法和装置
KR101841432B1 (ko) * 2016-07-19 2018-03-26 순천향대학교 산학협력단 비행체 및 그 구동방법, 그리고 이동통신 단말 시스템 및 그 구동 방법
CN106713593B (zh) * 2016-12-05 2019-08-02 宇龙计算机通信科技(深圳)有限公司 一种陌生号码自动处理方法及装置
CN106809387A (zh) * 2016-12-12 2017-06-09 广东探金电子科技有限公司 一种自拍无人机
CN206336430U (zh) * 2016-12-26 2017-07-18 览意科技(上海)有限公司 无人机及螺旋桨
CN206336433U (zh) * 2016-12-27 2017-07-18 广州市海智谷机器人有限公司 四轴无人机
CN108663333A (zh) * 2017-03-27 2018-10-16 青岛海尔智能技术研发有限公司 用于检测冰箱内食物的高光谱成像组件与冰箱
CN108974355A (zh) * 2017-06-05 2018-12-11 北京臻迪科技股份有限公司 一种无人机自动充电方法、无人机及充电座
CN107219861B (zh) * 2017-06-28 2020-02-07 段炜 一种飞行陪伴机器人控制方法及装置
CN107612974B (zh) * 2017-08-23 2020-04-17 Oppo广东移动通信有限公司 信息推荐方法、装置、移动终端及存储介质
CN107688638B (zh) * 2017-08-23 2020-02-28 Oppo广东移动通信有限公司 应用列表的推荐方法、装置、存储介质及移动终端
CN107645599A (zh) * 2017-09-21 2018-01-30 宇龙计算机通信科技(深圳)有限公司 一种控制方法、终端及计算机可读存储介质
CN107480660A (zh) * 2017-09-30 2017-12-15 深圳市锐曼智能装备有限公司 危险物品识别系统及其方法
WO2019144295A1 (zh) * 2018-01-23 2019-08-01 深圳市大疆创新科技有限公司 一种飞行控制方法、设备、飞行器、系统及存储介质
CN108428133A (zh) * 2018-03-26 2018-08-21 程玉亮 一种互联网供应链金融信用支付交易方法
CN108828965B (zh) * 2018-05-24 2021-09-14 联想(北京)有限公司 定位方法、电子设备及智能家居系统、存储介质
CN109146514B (zh) * 2018-07-27 2022-09-30 量子云码(福建)科技有限公司 畜牧产品溯源信息记录方法、装置、设备和存储介质
CN109297975A (zh) * 2018-08-16 2019-02-01 奇酷互联网络科技(深圳)有限公司 移动终端及检测方法、存储装置
CN109360000A (zh) * 2018-08-28 2019-02-19 顺丰科技有限公司 一种商品防伪溯源的系统、方法、设备及存储介质
CN109067628B (zh) * 2018-09-05 2021-07-20 广东美的厨房电器制造有限公司 智能家电的语音控制方法、控制装置和智能家电
CN109474757A (zh) * 2018-11-28 2019-03-15 东南大学 一种基于智能问答抗骚扰的电话秘书云服务实现方法
CN109493196A (zh) * 2018-12-29 2019-03-19 杭州趣链科技有限公司 一种基于区块链的房地产存证和交易方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101732873A (zh) * 2009-12-31 2010-06-16 上海杰远环保科技有限公司 一种用以响应用户需求的飞行器型手持终端
WO2014161390A1 (zh) * 2013-11-08 2014-10-09 中兴通讯股份有限公司 一种控制移动终端的方法及移动终端
CN107888730A (zh) * 2017-11-30 2018-04-06 上海孩子国科教设备有限公司 飞行式手机及其充电系统
CN107902088A (zh) * 2017-11-30 2018-04-13 上海孩子国科教设备有限公司 可调整显示尺寸的飞行式移动终端和系统

Also Published As

Publication number Publication date
CN111343330A (zh) 2020-06-26

Similar Documents

Publication Publication Date Title
JP6525229B1 (ja) デジタルサーチ・セキュリティシステム、方法及びプログラム
US11727789B2 (en) Augmented reality system for guards of controlled environment residents
US11093772B2 (en) Liveness detection
JP6550460B2 (ja) 眼信号を識別するためのシステムおよび方法、ならびに連続バイオメトリック認証
CN107209819B (zh) 通过对移动装置的连续鉴定的资产可存取性
CN108960209A (zh) 身份识别方法、装置及计算机可读存储介质
US9706406B1 (en) Security measures for an electronic device
US20170013464A1 (en) Method and a device to detect and manage non legitimate use or theft of a mobile computerized device
TW201737143A (zh) 智慧型可穿戴裝置
CN106663245A (zh) 社交提醒
CN106575344A (zh) 在个人设备上显示私人信息
CN109831549B (zh) 移动终端
US20150098631A1 (en) Apparatus and method for recording evidence of a person's situation
CN107548568A (zh) 用于设备功能的场境发现的系统和方法
KR20210024623A (ko) 가상펫의 정보 표시 방법, 장치, 단말기, 서버 및 저장매체
WO2020199742A1 (zh) 一种智能手机
CN108197558A (zh) 人脸识别方法、装置、存储介质和电子设备
US11310623B2 (en) Network based video surveillance and logistics for multiple users
KR102399809B1 (ko) 전자 장치 및 그 제어 방법
KR20200078155A (ko) 사용자 리뷰 기반 여행지 추천 방법 및 시스템
Rahman et al. Seeing beyond visibility: A four way fusion of user authentication for efficient usable security on mobile devices
US20170344993A1 (en) Context-aware deterrent and response system for financial transaction device security
Mack Privacy and the surveillance explosion
Saxena et al. IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends.
Gowrishankar et al. IoT based Smart ID Card for Working Woman Safety

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20782676

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20782676

Country of ref document: EP

Kind code of ref document: A1