WO2021000814A1 - 一种语音控制方法及相关装置 - Google Patents
一种语音控制方法及相关装置 Download PDFInfo
- Publication number
- WO2021000814A1 WO2021000814A1 PCT/CN2020/098707 CN2020098707W WO2021000814A1 WO 2021000814 A1 WO2021000814 A1 WO 2021000814A1 CN 2020098707 W CN2020098707 W CN 2020098707W WO 2021000814 A1 WO2021000814 A1 WO 2021000814A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- user
- voice
- authentication
- triggers
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 230000004044 response Effects 0.000 claims abstract description 56
- 230000001815 facial effect Effects 0.000 claims description 26
- 230000015654 memory Effects 0.000 claims description 17
- 230000001960 triggered effect Effects 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 8
- 238000001514 detection method Methods 0.000 abstract description 40
- 238000004904 shortening Methods 0.000 abstract 1
- 230000006870 function Effects 0.000 description 37
- 238000010586 diagram Methods 0.000 description 21
- 230000005236 sound signal Effects 0.000 description 21
- 238000004891 communication Methods 0.000 description 15
- 230000008569 process Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 9
- 229920001621 AMOLED Polymers 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 230000002618 waking effect Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 238000013528 artificial neural network Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 239000013598 vector Substances 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013529 biological neural network Methods 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000019771 cognition Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000002569 neuron Anatomy 0.000 description 1
- 239000002096 quantum dot Substances 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
- G06F3/167—Audio in a user interface, e.g. using voice commands for navigating, audio feedback
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/08—Speech classification or search
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/08—Speech classification or search
- G10L2015/088—Word spotting
Definitions
- This application relates to the field of terminal technology, and in particular to a voice control method and related devices.
- an electronic device such as a mobile phone, a tablet computer, etc.
- a user needs to operate the electronic device, he needs to unlock the electronic device first, enter the main interface, and then perform corresponding operations.
- a user when a user needs to make an electronic device payment, take WeChat payment as an example.
- the screen of the electronic device is locked, the user needs to unlock the electronic device first and enter the main interface. Then, find the WeChat icon in the main interface, and click the WeChat icon to make the electronic device display the WeChat user interface.
- the user also needs to operate the corresponding virtual button on the WeChat user interface to make the electronic device display the two-dimensional code interface for WeChat payment and receipt, so that the user can make payment to the merchant.
- This application provides a voice control method and related devices.
- one operation of the user can trigger the user's authentication authentication and voice command detection at the same time, and when the authentication authentication is successful and the voice command is detected Execute the operation corresponding to the voice instruction, which simplifies the operation steps when the user controls the electronic device by voice, and saves the user operation time.
- the present application provides a voice control method, including: first, the electronic device is in a locked screen state and the first operation is detected. Then, in response to the first operation, the electronic device triggers authentication of the user and triggers the voice recognition application to detect the voice command. Then, when the voice recognition application of the electronic device detects the voice command and the authentication succeeds, the electronic device unlocks and executes the operation corresponding to the voice command.
- the voice control method when the electronic device is in the locked screen state, the user can be authenticated in response to the received user operation, and at the same time, the voice recognition application can be triggered to detect the voice command input by the user. After the electronic device is unlocked and the voice recognition application detects the voice command, the detected voice command can be executed safely. In this way, the user can trigger authentication unlocking and voice recognition applications to detect voice commands through one operation when the electronic device is in the locked screen state to control the functions or applications on the electronic device, which simplifies the operation when the user controls the electronic device by voice Steps, saving user operating time.
- the electronic device in response to the first operation, triggers the authentication of the user and triggers the voice recognition application to detect the voice command, which specifically includes: in response to the first operation, the electronic device triggers the authentication of the user. Right, meanwhile, in response to the first operation, trigger the voice recognition application to detect the voice command.
- the unlocking instruction in the electronic device can simultaneously trigger the authentication unlocking of the electronic device and trigger the voice command detection function of the voice recognition application.
- the electronic device in response to the first operation, triggers the authentication of the user and triggers the voice recognition application to detect the voice command, which specifically includes: in response to the first operation, the electronic device triggers the authentication of the user. right.
- the electronic device detects that the authentication of the user is triggered, it triggers the voice recognition application to detect the voice command.
- the electronic device in response to the first operation, triggers the authentication of the user and triggers the voice recognition application to detect the voice command, which specifically includes: in response to the first operation, the electronic device triggers the authentication of the user. right. When the authentication succeeds, the electronic device triggers the voice recognition application to detect the voice command; when the authentication succeeds, the electronic device unlocks. After the electronic device is unlocked, when the voice recognition application detects the voice instruction, the electronic device executes the operation corresponding to the voice instruction. For example, the unlocking success instruction of the electronic device, whether it is an unlocking instruction such as fingerprint unlocking, face unlocking, etc., or while entering the unlocking interface, can directly trigger the voice instruction detection function of the voice recognition application.
- the unlocking success instruction of the electronic device whether it is an unlocking instruction such as fingerprint unlocking, face unlocking, etc., or while entering the unlocking interface, can directly trigger the voice instruction detection function of the voice recognition application.
- the electronic device when the electronic device triggers the voice recognition application to detect the voice instruction and does not detect the voice instruction within a specified time, the electronic device closes the voice recognition application. In this way, when the user unintentionally controls the electronic device by voice, the voice recognition application can be closed in time, saving power consumption.
- the electronic device when the electronic device fails to authenticate the user, the electronic device outputs a first prompt for prompting the user to trigger the electronic device to authenticate the user again. In this way, when the authentication fails, the electronic device can prompt to authenticate the user again, and the user can perform the authentication again when the user enters the wrong authentication information.
- the first operation includes a lifting operation.
- the electronic device triggers the authentication of the user, which specifically includes: the electronic device triggers the facial authentication of the user.
- the electronic device triggers face authentication of the user and triggers the voice recognition application to detect the voice command.
- the user does not need to say a voice wake-up word.
- the user lifts the electronic device to trigger the face unlock, the user can directly speak the voice command, which can realize the control of the function or application on the electronic device , Simplifies the operation steps when the user controls the electronic device by voice, and saves the user operation time.
- the first operation includes an operation of triggering the display of a fingerprint identification icon.
- the electronic device triggers the authentication of the user, which specifically includes: the electronic device triggers the fingerprint authentication of the user.
- the electronic device triggers fingerprint authentication of the user, and triggers the voice recognition application to detect the voice command.
- the electronic device can directly trigger the voice recognition application to detect the voice command when the user triggers the fingerprint unlock without detecting the user's voice wake-up word when the screen is locked, which simplifies the operation when the user controls the function or application on the electronic device by voice Steps, saving user operating time.
- the first operation includes an operation of triggering the display of the password unlock interface.
- the electronic device triggers the authentication of the user, which specifically includes: the electronic device triggers the password authentication of the user.
- the electronic device triggers password authentication of the user and triggers the voice recognition application to detect the voice command.
- the electronic device can directly trigger the voice recognition application to detect the voice command after the password unlock interface is displayed when the screen is locked, without the need to detect the voice wake-up word, which simplifies the operation when the user controls the function or application on the electronic device by voice Steps, saving user operating time.
- the first operation includes a wake-up speech containing a preset wake-up word.
- the electronic device triggers authentication of the user and triggers the voice recognition application to detect the voice command.
- the electronic device can trigger the voice recognition application to detect the voice command input by the user when the screen is locked and only need to detect the wake-up voice, and at the same time, trigger the user authentication (such as face authentication, fingerprint authentication, Password authentication, etc.).
- the electronic device can perform the operation corresponding to the voice command. It simplifies the operation steps when the user controls the function or application on the electronic device through voice, and saves the user operation time.
- the electronic device triggering the authentication of the user specifically includes: the electronic device triggering the facial authentication of the user. And/or, the electronic device triggers fingerprint authentication of the user. And/or, the electronic device triggers password authentication of the user.
- the electronic device can turn on or turn off the voice recognition application in the background, so that the user is unaware, and the user experience is improved.
- the present application provides a voice control method, which includes: first, when the electronic device is in a locked screen state, collecting a user's voice signal.
- the voice signal includes a wake-up word, the wake-up word corresponds to a voice command, and the voice command is used to request the electronic device to perform an operation corresponding to the voice command.
- the electronic device detects the wake-up word from the voice signal, it triggers the opening of the voice recognition application and triggers the authentication of the user. After the user's authentication is successful, the voice recognition application of the electronic device executes the operation corresponding to the voice command.
- the electronic device can receive a voice signal that includes a wake-up word and is also a voice command when the screen is locked
- the wake-up word in the voice signal triggers the recognition of the voice recognition application
- the voice command is issued, at the same time, the authentication of the user is triggered, and the voice command is executed after the authentication is successful.
- the operation steps when the user controls the electronic device by voice are simplified, and the operation time of the user is saved.
- the electronic device when the electronic device authentication fails, the electronic device outputs a first prompt for prompting the user to trigger the electronic device to authenticate the user again. In this way, when the authentication fails, the electronic device can prompt to authenticate the user again, and the user can perform the authentication again when the user enters the wrong authentication information.
- the electronic device when the electronic device triggers the authentication of the user, it specifically includes: the electronic device triggers the facial authentication of the user. And/or, the electronic device triggers fingerprint authentication of the user. And/or, the electronic device triggers password authentication of the user.
- the present application provides an electronic device including one or more processors and one or more memories.
- the one or more memories are coupled with one or more processors, and the one or more memories are used to store computer program codes.
- the computer program codes include computer instructions.
- the communication device executes A voice communication method in any possible implementation manner of any one of the foregoing aspects.
- embodiments of the present application provide a computer storage medium, including computer instructions, which when the computer instructions run on an electronic device, cause the communication device to execute the voice communication method in any one of the possible implementations of any of the above aspects .
- the embodiments of the present application provide a computer program product, which when the computer program product runs on a computer, causes the computer to execute the voice communication method in any one of the possible implementation manners of any of the foregoing aspects.
- the present application provides an electronic device including: an unlocking operation detection module, an unlocking detection module, a voice recognition module, and a voice command execution module.
- the unlocking operation detection module is used to detect that the user triggers the authentication unlocking (for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking).
- the unlock detection module is used to perform authentication unlocking on the user in response to the user triggering the authentication unlock operation.
- the voice command recognition module is used to detect the voice command input by the user in response to the user triggering the authentication and unlocking operation.
- the voice command execution module is used to execute the operation corresponding to the voice command when the unlocking is successful and the voice command is detected.
- this application provides an electronic device, including: a wake-up word detection module, an unlock detection module, a voice command recognition module, and a voice command execution module.
- wake word detection module used to detect the wake word input by the user.
- the unlock detection module is used to authenticate and unlock the user when the wake word detection module detects the wake word input by the user.
- the voice command recognition module is used to detect the voice command input by the user when the wake word detection module detects the wake word input by the user.
- the voice command execution module can be used to execute the operation corresponding to the voice command when the unlocking is successful and the voice command is detected.
- the present application provides an electronic device including: a voice hot word detection module, an unlock detection module, and a hot word instruction execution module.
- the voice hot word detection module is used to detect the voice hot words (that is, wake-up words) input by the user, and the voice hot words correspond to voice instructions.
- the unlock detection module is used to authenticate and unlock the user when the voice hot word detection module detects the voice hot word input by the user.
- the hot word instruction execution module is used to execute the voice instruction corresponding to the voice hot word when unlocking is successful.
- FIG. 1 is a schematic structural diagram of an electronic device provided by an embodiment of the application.
- 2A-2D are schematic diagrams of a set of interfaces provided in the prior art
- 3A-3D are schematic diagrams of a set of interfaces provided by embodiments of this application.
- FIGS. 4A-4C are schematic diagrams of another set of interfaces provided by embodiments of this application.
- 5A-5D are schematic diagrams of another set of interfaces provided by embodiments of this application.
- FIGS. 6A-6C are schematic diagrams of another set of interfaces provided by embodiments of this application.
- FIGS. 7A-7E are schematic diagrams of another set of interfaces provided by an embodiment of the application.
- FIGS. 8A-8E are schematic diagrams of another set of interfaces provided by an embodiment of this application.
- FIGS. 9A-9D are schematic diagrams of another set of interfaces provided by an embodiment of this application.
- FIGS. 10A-10D are schematic diagrams of another set of interfaces provided by embodiments of this application.
- FIGS. 11A-11D are schematic diagrams of another set of interfaces provided by an embodiment of this application.
- FIGS. 12A-12D are schematic diagrams of another set of interfaces provided by an embodiment of this application.
- FIGS. 13A-13C are schematic diagrams of another set of interfaces provided by an embodiment of this application.
- FIGS. 14A-14D are schematic diagrams of another set of interfaces provided by an embodiment of this application.
- FIG. 15 is a schematic flowchart of a voice control method provided by an embodiment of this application.
- FIG. 16 is a schematic structural diagram of an electronic device provided by another embodiment of this application.
- FIG. 17 is a schematic structural diagram of an electronic device provided by another embodiment of this application.
- FIG. 18 is a schematic structural diagram of an electronic device according to another embodiment of this application.
- first and second are only used for descriptive purposes, and cannot be understood as implying or implying relative importance or implicitly specifying the number of indicated technical features. Therefore, the features defined with “first” and “second” may explicitly or implicitly include one or more of these features. In the description of the embodiments of the present application, unless otherwise specified, “multiple” The meaning is two or more.
- FIG. 1 shows a schematic structural diagram of an electronic device 100.
- the electronic device 100 shown in FIG. 1 is only an example, and the electronic device 100 may have more or fewer components than those shown in FIG. 1, two or more components may be combined, or Can have different component configurations.
- the various components shown in the figure may be implemented in hardware, software, or a combination of hardware and software including one or more signal processing and/or application specific integrated circuits.
- the electronic device 100 may include: a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2.
- Mobile communication module 150 wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone interface 170D, sensor module 180, buttons 190, camera 193, display screen 194, and subscriber identification module (subscriber identification) module, SIM) card interface 195, etc.
- the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an acceleration sensor 180E, a proximity light sensor 180G, a fingerprint sensor 180H, a touch sensor 180K, and so on.
- the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the electronic device 100.
- the electronic device 100 may include more or fewer components than shown, or combine certain components, or split certain components, or arrange different components.
- the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
- the processor 110 may include one or more processing units.
- the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
- AP application processor
- modem processor modem processor
- GPU graphics processing unit
- image signal processor image signal processor
- ISP image signal processor
- controller memory
- video codec digital signal processor
- DSP digital signal processor
- NPU neural-network processing unit
- the different processing units may be independent devices or integrated in one or more processors.
- the processor 110 may include a voice wake-up module and a voice command recognition module.
- the voice wake-up module and the voice command recognition module may be integrated in different processor chips and executed by different chips.
- the voice wake-up module can be integrated in a coprocessor or DSP chip with lower power consumption, and the voice command recognition module can be integrated in an AP or NPU or other chips.
- the voice wake-up module and the voice command recognition module can also be integrated in the same processor chip, and the same chip performs related functions.
- the voice wake-up module and the voice command recognition module can be integrated In the AP chip.
- the voice wake-up module and the voice command recognition module may be functional modules of different applications.
- the voice wake-up module may be a functional module of the first application
- the voice command recognition module is a functional module of the second application
- the first application and the second application are different applications.
- the voice wake-up module and the voice command recognition module may also be functional modules of the same application.
- the processor 110 may also include a voice instruction execution module, that is, after the voice instruction is recognized, an operation corresponding to the voice instruction is executed.
- voice assistant applications including voice command recognition applications, can directly perform the operation corresponding to the voice command after recognizing the voice command, or if the operation corresponding to the voice command involves a third application, call the third application to execute the corresponding operating.
- the processor 110 can also authenticate and unlock the user. For example, when the electronic device detects an operation of raising a hand, the processor 110 may trigger an authentication process for the user, such as turning on face detection and recognition.
- a user's operation can simultaneously trigger the electronic device to authenticate the user and trigger the voice recognition application to detect the voice command. Triggering the voice recognition application to detect voice commands is to activate the function of voice command recognition. For example, it can be to open the voice recognition application (open the application to start to recognize the user's voice commands, and the wake-up word is not required); it can also be the voice recognition application has been opened , Activate the function of voice command recognition, no wake-up words are needed at this time; etc.
- the voice wake word may be a hot word.
- the hot word corresponds to a voice command.
- the processor 110 may include a hot word detection module and a voice instruction execution module.
- the hot word detection module and the voice instruction execution module may be integrated in different processor chips and executed by different chips.
- the hot word detection module can be integrated in a coprocessor or DSP chip or other chips with low power consumption, and the voice instruction execution module can be integrated in the AP. In this way, after the hot word detection module detects the hot word and detects the voice instruction corresponding to the hot word, the voice instruction execution module can be awakened to execute the voice instruction corresponding to the hot word.
- the hot word detection module and the voice instruction execution module can also be integrated in the same processor chip, and the same chip performs related functions. For example, the hot word detection module and the voice instruction execution module are both integrated. Can be integrated in AP chip.
- a memory may also be provided in the processor 110 to store instructions and data.
- the memory in the processor 110 is a cache memory.
- the memory can store instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided, the waiting time of the processor 110 is reduced, and the efficiency of the system is improved.
- the charging management module 140 is used to receive charging input from the charger.
- the charger can be a wireless charger or a wired charger. While the charging management module 140 charges the battery 142, it can also supply power to the electronic device through the power management module 141.
- the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
- the power management module 141 receives input from the battery 142 and/or the charge management module 140, and supplies power to the processor 110, the internal memory 121, the external memory, the display screen 194, the camera 193, and the wireless communication module 160.
- the wireless communication function of the electronic device 100 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, and the baseband processor.
- the antenna 1 and the antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in the electronic device 100 can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- the mobile communication module 150 can provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the electronic device 100.
- at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
- the wireless communication module 160 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), and global navigation satellites.
- WLAN wireless local area networks
- BT wireless fidelity
- BT wireless fidelity
- GNSS global navigation satellite system
- FM frequency modulation
- NFC near field communication technology
- IR infrared technology
- the electronic device 100 implements a display function through a GPU, a display screen 194, and an application processor.
- the GPU is a microprocessor for image processing, connected to the display 194 and the application processor.
- the GPU is used to perform mathematical and geometric calculations for graphics rendering.
- the processor 110 may include one or more GPUs, which execute program instructions to generate or change display information.
- the display screen 194 is used to display images, videos, etc.
- the display screen 194 includes a display panel.
- the display panel can adopt liquid crystal display (LCD), organic light-emitting diode (OLED), active-matrix organic light-emitting diode or active-matrix organic light-emitting diode (active-matrix organic light-emitting diode).
- LCD liquid crystal display
- OLED organic light-emitting diode
- active-matrix organic light-emitting diode active-matrix organic light-emitting diode
- AMOLED flexible light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (QLED), etc.
- the electronic device 100 may include one or N display screens 194, and N is a positive integer greater than one.
- the electronic device 100 can implement a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, and an application processor.
- the ISP is used to process the data fed back from the camera 193. For example, when taking a picture, the shutter is opened, the light is transmitted to the photosensitive element of the camera through the lens, the light signal is converted into an electrical signal, and the photosensitive element of the camera transfers the electrical signal to the ISP for processing and is converted into an image visible to the naked eye.
- the camera 193 is used to capture still images or videos.
- the object generates an optical image through the lens and projects it to the photosensitive element.
- the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
- CMOS complementary metal-oxide-semiconductor
- the photosensitive element converts the optical signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
- ISP outputs digital image signals to DSP for processing.
- DSP converts digital image signals into standard RGB, YUV and other formats.
- the electronic device 100 may include 1 or N cameras 193, and N is a positive integer greater than 1.
- Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects the frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
- Video codecs are used to compress or decompress digital video.
- the electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in a variety of encoding formats, such as: moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, and so on.
- MPEG moving picture experts group
- NPU is a neural-network (NN) computing processor.
- NN neural-network
- the NPU can realize applications such as intelligent cognition of the electronic device 100, such as image recognition, face recognition, voice recognition, text understanding, and so on.
- the internal memory 121 may be used to store computer executable program code, where the executable program code includes instructions.
- the processor 110 executes various functional applications and data processing of the electronic device 100 by running instructions stored in the internal memory 121.
- the electronic device 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. For example, music playback, recording, etc.
- the audio module 170 is used to convert digital audio information into an analog audio signal for output, and is also used to convert an analog audio input into a digital audio signal.
- the audio module 170 can also be used to encode and decode audio signals.
- the audio module 170 may be provided in the processor 110, or part of the functional modules of the audio module 170 may be provided in the processor 110.
- the speaker 170A also called a “speaker” is used to convert audio electrical signals into sound signals.
- the electronic device 100 can listen to music through the speaker 170A, or listen to a hands-free call.
- the receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
- the electronic device 100 answers a call or voice message, it can receive the voice by bringing the receiver 170B close to the human ear.
- the microphone 170C also called “microphone”, “microphone”, is used to convert sound signals into electrical signals.
- the user can approach the microphone 170C through the mouth to make a sound, and input the sound signal to the microphone 170C.
- the electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, which can implement noise reduction functions in addition to collecting sound signals.
- the pressure sensor 180A is used to sense the pressure signal and can convert the pressure signal into an electrical signal.
- the pressure sensor 180A may be provided on the display screen 194.
- the capacitance between the electrodes changes.
- the electronic device 100 determines the intensity of the pressure according to the change in capacitance.
- the electronic device 100 detects the intensity of the touch operation according to the pressure sensor 180A.
- the electronic device 100 may also calculate the touched position according to the detection signal of the pressure sensor 180A.
- the gyro sensor 180B may be used to determine the movement posture of the electronic device 100.
- the angular velocity of the electronic device 100 around three axes ie, x, y, and z axes
- the gyro sensor 180B can be determined by the gyro sensor 180B.
- the acceleration sensor 180E can detect the magnitude of the acceleration of the electronic device 100 in various directions (generally three axes). When the electronic device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices, and used in applications such as horizontal and vertical screen switching, pedometers, etc.
- the fingerprint sensor 180H is used to collect fingerprints.
- the electronic device 100 can use the collected fingerprint characteristics to realize fingerprint unlocking, access application locks, fingerprint photographs, fingerprint answering calls, etc.
- Touch sensor 180K also called “touch panel”.
- the touch sensor 180K may be disposed on the display screen 194, and the touch screen is composed of the touch sensor 180K and the display screen 194, which is also called a “touch screen”.
- the touch sensor 180K is used to detect touch operations acting on or near it.
- the touch sensor 180K may also be disposed on the surface of the electronic device 100, which is different from the position of the display screen 194.
- the button 190 includes a power button, a volume button, and so on.
- the button 190 may be a mechanical button. It can also be a touch button.
- the electronic device 100 may receive key input, and generate key signal input related to user settings and function control of the electronic device 100.
- the SIM card interface 195 is used to connect to the SIM card.
- the SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to achieve contact and separation with the electronic device 100.
- electronic devices have a voice wake-up function.
- the voice recognition application of the electronic device for example, the voice assistant application, can be used to detect the voice command input by the user, and execute the voice command after the voice command is detected. The operation corresponding to the voice command) is closed. The voice command in the user's input voice cannot be detected.
- the user needs to input a wake-up word by voice, such as "Xiaoyi Xiaoyi".
- the wake-up module on the electronic device 100 detects the preset wake-up word, it can start the voice recognition application on the electronic device.
- the user can input a voice signal (for example, "open the WeChat payment interface"), and the electronic device receives the voice signal input by the user (for example, "open the WeChat payment interface") ,
- the voice command in the voice signal input by the user can be detected through the voice recognition application (for example, display the payment interface in the WeChat application).
- the electronic device can trigger the unlocking module (for example, face recognition module, fingerprint recognition module, password) Unlocking module), and output a prompt for the user to unlock the electronic device first.
- the electronic device performs the operation corresponding to the voice command (for example, opening the payment interface in the WeChat application).
- the electronic device when the electronic device is in a locked screen state, the electronic device may obtain the first segment of voice signal input by the user.
- the electronic device can parse out whether the specified wake-up word (such as "Xiaoyi Xiaoyi") is included in the first segment of speech, and if so, the electronic device can recognize the voice command input by the user next.
- the specified wake-up word such as "Xiaoyi Xiaoyi”
- the electronic device may output a prompt for prompting the user to continue inputting the voice signal.
- the electronic device may display a text prompt 211 (for example, "Hey, I am listening") on the display screen.
- the electronic device can receive the second segment of voice signal input by the user, and the electronic device can detect the control instruction in the second segment of voice signal through a voice recognition application.
- the electronic device can output an unlocking prompt to prompt the user to unlock the electronic device.
- the electronic device can receive an unlocking operation of the user (for example, for the fingerprint identification icon 213 under the touch screen).
- the electronic device can perform the operation corresponding to the voice instruction in the second segment of the voice signal.
- the voice command is to display the WeChat payment interface
- the electronic device can start the WeChat application and display the WeChat payment interface 220 on the display screen.
- the electronic device when the electronic device is in the locked screen state, if the user needs to use voice to operate the electronic device, the user needs to use the wake-up word to wake up the voice assistant on the electronic device. After waking up the voice assistant of the electronic device, the electronic device Only then began to recognize voice commands from the voice signal input by the user. After the electronic device recognizes the voice instruction, the electronic device requires the user to unlock it first, and only after the unlock is successful, can the corresponding operation be performed according to the voice instruction. In this way, when the user needs to control the electronic device by voice, the operation is complicated, the user operation time is long, and the user experience is poor.
- the embodiments of the present application provide a voice control method, which can perform identity authentication on the user in response to the received user operation when the electronic device is in the locked screen state, and at the same time, trigger the voice recognition application to detect user input Voice commands. After the electronic device is unlocked and the voice recognition application detects the voice command, the detected voice command can be executed safely.
- the user can trigger authentication unlocking and voice recognition applications to detect voice commands through one operation when the electronic device is in the locked screen state to control the functions or applications on the electronic device, which simplifies the operation when the user controls the electronic device by voice Steps, saving user operating time.
- the following describes the process of the electronic device 100 authenticating the user.
- the electronic device 100 may collect authentication information (such as face information, fingerprint information, digital password, pattern password) input by the user in response to the received user operation.
- authentication information such as face information, fingerprint information, digital password, pattern password
- the electronic device 100 can determine whether the collected authentication information matches the stored authentication information template, if so, the user authentication is successful, and the electronic device 100 Unlock.
- the following describes the process of the electronic device 100 triggering the activation of the voice recognition application through the wake-up word.
- the electronic device 100 can receive audio signals through a microphone. Wherein, when the user speaks a wake-up voice around the electronic device 100, the audio signal may include a wake-up voice. After receiving the audio signal, the electronic device 100 can separate the user's wake-up voice from the audio signal. Then, the electronic device 100 can decode the phoneme sequence from the user's voice signal by using the acoustic model from the wake-up speech. After decoding the phoneme sequence from the wake-up speech, the electronic device 100 can determine whether the decoded phoneme sequence matches the stored wake-up word phoneme sequence. If so, it indicates that the wake-up speech contains a wake-up word, and the electronic device 100 can Trigger to recognize the voice command in the voice signal input by the user next. For the process of the electronic device 100 to recognize the voice command, please refer to the foregoing embodiment, which will not be repeated here.
- the electronic device 100 can receive audio signals through a microphone. Wherein, when the user speaks a wake-up voice around the electronic device 100, the audio signal may include a wake-up voice. After receiving the audio signal, the electronic device 100 can separate the user's wake-up voice from the audio signal. Then, the electronic device 100 can decode the phoneme sequence from the user's voice signal by using the acoustic model from the wake-up speech. Then, through the phonetic model and the pronunciation dictionary of the phonetic model, the text information is further decoded from the decoded phoneme sequence. After the electronic device 100 decodes the text information, the electronic device 100 can determine whether the text information decoded from the wake-up voice includes the stored wake-up word text.
- the electronic device 100 can extract the wake-up word and the user's voiceprint feature from the user's voice signal.
- the wake-up word matches the stored wake-up word template and the user's voiceprint feature matches the stored wake-up word template
- the electronic device 100 can recognize the voice command input by the user next. In this way, it can be realized that only a specific user can wake up the voice assistant to recognize the voice command, which improves the information security of the terminal.
- the following describes the process of detecting the voice command after the electronic device 100 triggers the voice recognition application.
- the electronic device 100 can receive audio signals through a microphone. Wherein, when the user speaks a voice around the electronic device 100, the audio signal includes the user's voice signal, and the user's voice signal may include a voice command for requesting the electronic device 100 to perform an operation corresponding to the voice command.
- the electronic device 100 can separate the user's voice signal from the audio signal. Then, the electronic device 100 can extract multiple feature vectors containing sound information from the user's voice signal through a feature extraction algorithm.
- the feature extraction algorithm may include Mel-frequency cepstral coefficient (MFCC) or linear predictive codes (LPC), etc.
- the electronic device 100 can input multiple feature vectors containing sound information into the acoustic model to obtain multiple phoneme sequences.
- the electronic device 100 can obtain the text information corresponding to the multiple phoneme sequences according to the language model and the phoneme dictionary.
- the electronic device 100 can match the voice command corresponding to the keyword in the text information from the command library.
- audio signal in the embodiment of the present application may also be called audio singal or sound singal
- voice signal may also be called speech singal or voice singal.
- the electronic device 100 may have two states: a locked state and an unlocked state.
- some functions are locked, that is, the electronic device does not provide some functions.
- the functions provided by electronic devices in the locked state have lower requirements for data security.
- the functions provided by the electronic device in the locked screen state may include: answering a call, hanging up a call, adjusting the volume of music, starting a camera application, turning on/off the airplane mode, and so on.
- the locked function has higher requirements for data security.
- the function whose unlocked state is locked may include: starting a part of an application (for example, a WeChat application), and a function provided by the application (for example, displaying a WeChat payment interface), etc.
- the electronic device 100 can determine whether the authentication information input by the user is the same as the stored authentication information template in response to the authentication information input by the user. If the authentication information is the same, the screen will be locked. Switch to the unlocked state.
- the authentication information can be used to authenticate whether the current user has the authority to use the electronic device 100.
- the authentication information may include, but is not limited to: face information, fingerprint information, password information, voiceprint information, etc.
- the electronic device 100 may receive a user triggering an authentication unlocking operation (such as face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking, etc.), and respond to this Triggering the authentication and unlocking operation, the electronic device 100 can authenticate the user, and at the same time, trigger the voice recognition application to detect the voice command input by the user, for example, the electronic device opens the voice recognition application, or the electronic device is already running the voice recognition application in the background. Trigger the voice recognition application's detection function of voice commands.
- an authentication unlocking operation such as face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking, etc.
- the electronic device 100 can perform the operation corresponding to the voice command (for example, displaying the WeChat payment interface). In this way, the electronic device 100 can trigger the electronic device 100 to authenticate the user and trigger the voice recognition application to detect the voice command by responding to the unlocking operation in the locked state, that is, the user does not need to speak the voice wake-up word, and directly
- the user can control the functions or applications on the electronic device, which simplifies the operation steps when the user controls the electronic device by voice, and saves the user operation time.
- the electronic device 100 when the electronic device 100 is in the locked screen state, the electronic device 100 can respond to the unlocking triggering operation to authenticate the user, and at the same time, in response to the unlocking triggering operation, trigger the voice recognition application Detect voice commands entered by the user.
- the electronic device 100 can unlock and perform the operation corresponding to the voice command.
- the unlocking instruction in the electronic device 100 can simultaneously trigger the authentication and unlocking of the electronic device 100 and trigger the voice command detection function of the voice recognition application.
- the electronic device 100 when the electronic device 100 is in the locked screen state, the electronic device 100 can authenticate the user in response to the unlocking operation. After the electronic device 100 starts to authenticate the user, the electronic device 100 may trigger the voice recognition application to detect the voice command input by the user. When the authentication is successful and the electronic device 100 detects the voice command through the voice recognition application, the electronic device 100 can unlock and perform the operation corresponding to the voice command.
- the electronic device 100 can authenticate the user in response to the unlocking operation.
- the electronic device 100 can unlock and trigger the voice assistant to detect the voice command.
- the unlocking success instruction of the electronic device whether it is an unlocking instruction such as fingerprint unlocking, face unlocking, etc., or while entering the unlocking interface, can directly trigger the voice instruction detection function of the voice recognition application.
- the electronic device 100 may close the voice recognition application. In this way, when the user unintentionally controls the electronic device by voice, the voice recognition application can be closed in time, saving power consumption.
- the following is an exemplary authentication method using face authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 can collect and verify facial information when receiving an operation (such as lifting) that triggers facial authentication by the user, and can trigger a voice recognition application (such as a voice assistant) at the same time Detect voice commands entered by the user. After the face authentication is successful and the electronic device 100 detects the voice command through the voice recognition application, the electronic device 100 can unlock and perform the operation corresponding to the voice command. In this way, when the electronic device 100 is locked, the user does not need to say a voice wake-up word. When the user lifts the electronic device 100 to trigger the face unlock, the user can directly speak the voice command, which can realize the function or function on the electronic device 100.
- the application control simplifies the operation steps when the user controls the electronic device through voice, and saves the user operation time.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 can receive the user's lifting operation. In response to the lifting operation, the electronic device 100 can collect the user's facial information and trigger the voice recognition application to detect the user input Voice commands.
- the electronic device 100 can detect the lifting operation of the user in the following ways: the electronic device 100 can detect the rotation of the electronic device 100 through one or more sensors, the electronic device 100 moves forward relative to the user, and the electronic device 100 moves upward relative to the horizon. Exercise to determine whether the position state of the electronic device has changed in accordance with the preset condition. If so, the electronic device 100 can determine that the user's lifting operation is received. Specifically, the terminal can detect the motion parameters of the terminal; and then determine whether the terminal is rotated, whether it moves forward relative to the user, or whether it moves upward relative to the horizon according to the motion parameters; finally, the terminal is determined according to the judgment result Whether the status of the location has changed in accordance with the preset conditions.
- the electronic device 100 may collect facial information, and trigger the voice recognition application to detect the voice command in the voice signal of the user collected by the microphone.
- the electronic device 100 can collect facial information through a camera, and the electronic device 100 can display the lock screen interface 310 on a bright screen when the facial information is collected.
- the electronic device 100 may display a face recognition prompt 311 on the lock screen interface to prompt the user to perform face recognition. In specific implementation, the electronic device 100 may not display the face recognition prompt 311.
- the collected face information can be matched with the stored face information template.
- the electronic device 100 may detect the voice command in the user's voice signal through a voice recognition application, and then determine that the processed face information matches the stored face information template. In this case, the electronic device 100 can unlock and directly execute the operation corresponding to the voice command.
- the electronic device 100 first detects the voice command in the user's voice signal through the voice recognition application, and then determines that the collected facial information matches the stored facial information template. After determining that the processed face information matches the stored face information template, the electronic device 100 may output a face recognition success prompt 312 to prompt the user that the face recognition is successful. After the electronic device 100 outputs a prompt of successful face recognition for a period of time (for example, 0.5 seconds), the electronic device 100 may execute the voice command in the user's voice signal.
- a face recognition success prompt 312 to prompt the user that the face recognition is successful.
- a prompt of successful face recognition for a period of time (for example, 0.5 seconds)
- the electronic device 100 may execute the voice command in the user's voice signal.
- the electronic device 100 can unlock the screen to perform operations corresponding to the voice instructions in the user's voice signal, for example, display the WeChat payment interface 320.
- the electronic device 100 first detects the voice command through the voice recognition application, and when it is determined that the processed face information matches the stored face information template, the electronic device 100 may not output the person shown in FIG. 3C.
- the face recognition is successful, and the voice command is directly unlocked. For example, directly unlock and display the WeChat payment interface 320 as shown in FIG. 3D.
- the electronic device 100 may first unlock (for example, unlock the display main interface) when the electronic device 100 determines that the processed face information matches the stored face information template. After the electronic device 100 detects the voice instruction through the voice recognition application, the electronic device 100 can perform the operation corresponding to the voice instruction.
- the electronic device 100 may collect face information in response to a user triggering a face unlock operation (for example, the lifting operation shown in FIG. 3B), and determine whether the collected face information is different from Whether the stored face information templates match, if so, the electronic device 100 can be unlocked (for example, the main interface is unlocked and displayed).
- the electronic device 100 may collect the user's voice signal through the microphone, and trigger the voice recognition application to detect the voice command. After detecting the voice instruction through the voice recognition application, the electronic device 100 can directly perform the operation corresponding to the voice instruction.
- the electronic device 100 may turn on a face recognition module (such as a dot matrix transmitter and a camera) to collect face information.
- a face recognition module such as a dot matrix transmitter and a camera
- the electronic device 100 may brighten the screen to display the lock screen interface 410.
- the electronic device 100 may display a face recognition prompt 411 on the lock screen interface to prompt the user to perform face recognition. In a specific implementation, the electronic device 100 may not display the face recognition prompt 411.
- the electronic device 100 when the electronic device 100 determines that the collected face information matches the stored face information template successfully, it can unlock the display main interface 420, collect the user's voice signal through the microphone, and trigger voice recognition at the same time
- the application detects the voice commands in the user's voice signal.
- the voice command may include the text message "open WeChat payment interface".
- the main interface 420 displays a page on which application icons are placed.
- the page includes multiple application icons (for example, weather application icons, stock application icons, calculator application icons, settings application icons, mail application icons, and Alipay application icons). , Facebook application icon, browser application icon, gallery application icon, music application icon, video application icon, WeChat application icon).
- tray icons below the multiple application icons to indicate the positional relationship between the currently displayed page and other pages.
- tray icons below the page indicators (such as dial-up application icons, information application icons, contact application icons, camera Application icon), the tray icon remains displayed when the page is switched.
- the page may include multiple application icons and page indicators; the page indicator may not be a part of the page and exist separately.
- the aforementioned tray icon is also optional, which is not limited in the embodiment of the present application.
- the electronic device 100 can perform the operation corresponding to the voice command For example, start the WeChat application, and display the WeChat payment interface 430 in the WeChat application.
- a voice command for example, including the text message "open WeChat payment interface”
- the electronic device 100 can perform the operation corresponding to the voice command For example, start the WeChat application, and display the WeChat payment interface 430 in the WeChat application.
- the electronic device 100 may input an authentication failure prompt to prompt the user to re-enter the password.
- the electronic device 100 can perform face authentication on the user again.
- the following is an exemplary authentication method using fingerprint authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 can collect and verify the user's fingerprint information when receiving a user's fingerprint authentication operation (such as clicking the power button), and can trigger a voice recognition application (such as voice Assistant) detects the voice commands entered by the user. After the fingerprint authentication is successful and the electronic device 100 detects the voice command input by the user through the voice recognition application, the electronic device 100 can perform the operation corresponding to the voice command. In this way, the electronic device 100 can directly trigger the voice recognition application to detect voice commands when the user triggers fingerprint unlocking without detecting the user’s voice wake-up words when the screen is locked, which simplifies the user’s voice control of functions or applications on the electronic device 100 The operation steps save the user operation time.
- a user's fingerprint authentication operation such as clicking the power button
- a voice recognition application such as voice Assistant
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 can receive an input operation (for example, a single click) of the power button 501 from the user.
- an input operation for example, a single click
- the electronic device 100 can collect the user's fingerprint information and trigger the voice recognition application to detect the voice command input by the user.
- the electronic device 100 first detects a voice command from the user's voice signal collected by the microphone through a voice recognition application, then it is determined that the collected fingerprint information matches the stored fingerprint information template. In this case, the electronic device 100 can unlock and directly execute the operation corresponding to the voice command.
- the fingerprint collection module may be arranged under the touch screen and coupled with the touch screen.
- the electronic device 100 may display the fingerprint identification icon 511 on the lock screen interface 510 after turning on the fingerprint collection module under the touch screen.
- the electronic device 100 can collect the fingerprint of the user's finger when the user's finger touches a fixed area of the touch screen. Therefore, the display position of the fingerprint identification icon 511 can be in the area where the fingerprint collection module can collect the fingerprint (for example, in the offset of the touch screen). The bottom middle position).
- the electronic device 100 can recognize the voice command in the user's voice signal (for example, display the WeChat payment interface).
- the electronic device 100 collects the user's fingerprint information.
- the electronic device 100 can determine whether the collected fingerprint information matches the stored fingerprint information template, and if so, the electronic device 100 can unlock and directly perform the operation corresponding to the voice command.
- the electronic device 100 when the electronic device 100 determines that the collected fingerprint information matches the stored fingerprint information template, the electronic device 100 unlocks and displays the WeChat payment interface 520.
- the electronic device 100 if the electronic device 100 first collects the user's fingerprint information and determines that the collected fingerprint information matches the stored fingerprint information template, then it is recognized from the user's voice signal through a voice recognition application Voice commands. In this case, the electronic device 100 can unlock when it is determined that the collected fingerprint information matches the stored fingerprint information template, and then execute this when the electronic device 100 recognizes the voice command input by the user through a voice recognition application. The operation corresponding to the voice command.
- the electronic device 100 may first start collecting fingerprint information of the user in response to the operation of triggering fingerprint unlocking. After the electronic device 100 detects that the user's fingerprint information has been collected, the electronic device 100 triggers the collection of the user's voice signal and triggers to start the voice recognition application to detect the voice command in the user's voice signal. When the electronic device 100 determines that the collected fingerprint information matches the stored fingerprint information template, and the voice command is detected by the voice recognition application, the electronic device 100 can perform the operation corresponding to the voice command.
- the electronic device 100 can determine whether the collected fingerprint information matches the stored fingerprint information template. If it matches, the electronic device 100 can be unlocked, and at the same time, the user is collected The voice signal and trigger the voice recognition application to detect the voice command in the user’s voice signal. After detecting the voice instruction, the electronic device 100 can perform the operation corresponding to the voice instruction.
- the electronic device 100 may turn on the fingerprint collection module and display the fingerprint icon 611 in response to the operation of triggering the fingerprint unlocking.
- the electronic device 100 can receive a user's touch operation on the fingerprint recognition icon 611.
- the electronic device 100 can collect the user's fingerprint information, and determine the collected fingerprint information and the stored fingerprint information template Whether it matches, if so, the electronic device 100 is unlocked and displays the main interface 620 as shown in FIG. 6B.
- the main interface 620 shown in FIG. 6B is the same as the main interface 420 shown in FIG. 4B. Therefore, the above description of the main interface 420 shown in FIG. 4B is also applicable to the main interface 420 shown in FIG. 6B.
- the main interface 620 is not repeated here.
- the electronic device 100 can collect the user's voice signal, and trigger the voice recognition application to detect the voice command in the user's voice signal .
- the text information included in the user's voice signal may be "open WeChat payment interface", and the electronic device 100 can recognize from the user's voice signal that the operation corresponding to the voice control signal instruction is "display payment interface".
- the electronic device 100 can perform the operation corresponding to the voice instruction, for example, start the WeChat application and display the WeChat payment interface 630.
- the electronic device 100 may input an authentication failure prompt to prompt the user to re-enter fingerprint information.
- the electronic device 100 can perform fingerprint authentication on the user again.
- the electronic device 100 can collect the user's fingerprint information through the external fingerprint collection module, and the electronic device 100 detects that the user touches the external fingerprint
- the electronic device 100 can collect the user's fingerprint information, and at the same time, collect the user's voice signal and detect the voice command in the user's voice signal through the voice recognition application.
- the electronic device 100 determines that the collected fingerprint information matches the stored fingerprint information template, and the voice command is detected by the voice recognition application, the electronic device 100 can perform the operation corresponding to the voice command.
- the following exemplary authentication method with password authentication will specifically introduce a voice control method in this application scenario.
- the electronic device 100 may display the password unlock interface when receiving the user's operation to trigger password authentication (for example, a sliding operation on the lock screen interface), and at the same time, trigger the voice recognition application detection (for example Voice assistant) The voice command entered by the user.
- the electronic device 100 After the password is successfully unlocked and the electronic device 100 detects the voice command through the voice recognition application (for example, displaying the WeChat payment interface), the electronic device 100 can perform the operation corresponding to the voice command (for example, displaying the WeChat payment interface).
- the electronic device 100 can directly trigger the voice recognition application to detect voice commands when the screen is locked, without the need to detect the voice wake-up word, after displaying the password unlock interface, which simplifies the user's voice control of functions or applications on the electronic device 100
- the operation steps save the user operation time.
- the electronic device 100 is in a screen-on and screen-locked state.
- the electronic device 100 may display a lock screen interface 710, where the lock screen interface 710 includes an unlock trigger area 711.
- the electronic device 100 may receive the user's input operation on the unlock trigger area 711 (for example, sliding from left to right), and in response to the input operation on the unlock trigger area 711, the electronic device 100 may display
- the password unlocking interface 720 shown in 7C also triggers the voice recognition application to detect the voice command in the voice signal of the user collected by the microphone. It is understandable that the electronic device 100 may also collect the user's voice signal through the microphone and trigger the voice recognition application to detect the voice command in the user's voice signal after displaying the password unlock interface.
- the password unlocking interface 720 includes a virtual numeric keyboard 721, a password input box 722, an emergency call button 723, and a return button 724.
- the virtual numeric keyboard 721 is used to receive the user's input, and fill in the password in the password input box 722.
- the password input box 722 is used to prompt the user to enter a password with a specified number of digits (for example, 6 digits). Each time the user enters a number, the password input box 722 will prompt the user to enter a number.
- the electronic device 100 can determine whether the password of the specified number of digits input by the user matches the stored password template. When the matching is successful, the electronic device 100 is unlocked successfully.
- the electronic device 100 After the electronic device 100 detects the voice command through the voice recognition application, the electronic device 100 judges that the password of the specified number of digits input by the user matches the stored password template, and the electronic device 100 can unlock and execute from the user's voice signal The recognized voice command.
- the user's voice signal may be collected through a microphone, for example, a voice signal including the text message "open the WeChat payment interface".
- the electronic device 100 collects the user's voice signal, it can detect the voice command in the user's voice signal through a voice recognition application.
- the electronic device 100 can receive a password with a specified number of digits entered by the user.
- the electronic device 100 can determine whether the password of the specified number of digits input by the user matches the stored password template, and if it matches, the electronic device 100 can unlock and execute the detected voice command.
- the electronic device 100 can unlock and display the WeChat payment interface 730.
- the electronic device 100 first receives the password of the specified number of digits input by the user and determines that the password of the specified number of digits input by the user matches the stored password template, then it will use voice
- the recognition application detects the voice command from the user's voice signal.
- the electronic device 100 can unlock (for example, unlock and display the main interface) after determining that the password with the specified number of digits input by the user matches the stored password template, and then the electronic device 100 can use voice recognition
- the application detects the voice instruction from the user's voice signal, it executes the operation corresponding to the voice instruction (for example, "display the WeChat payment interface").
- the electronic device 100 may display the password unlocking interface in response to the user triggering the password unlocking operation. After displaying the password unlocking interface, the electronic device 100 can receive a password with a specified number of digits (for example, 6 digits) input by the user. After the electronic device 100 receives the password of the specified number of digits input by the user, the electronic device 100 can determine whether the password of the specified number of digits matches the stored password template, and if it matches, the electronic device 100 can unlock and display the main interface. After the electronic device 100 is unlocked, the electronic device 100 can collect the user's voice signal and detect the voice command in the user's voice signal through a voice recognition application. After the electronic device 100 detects the voice instruction through the voice recognition application, the electronic device 100 can perform the operation corresponding to the voice instruction (for example, "display the WeChat payment interface).
- a voice instruction for example, "display the WeChat payment interface
- the electronic device 100 displays a password unlocking interface 720.
- the electronic device 100 may receive a password of a specified number of digits (for example, 6 digits) input by the user.
- the electronic device 100 can determine whether the password of the specified number of digits matches the stored password template. If it matches, the electronic device 100 can be unlocked and the main interface 740 as shown in FIG. 8B is displayed.
- the main interface 740 shown in FIG. 7B is the same as the main interface 420 shown in FIG. 4B. Therefore, the above description of the main interface 420 shown in FIG. 4B is also applicable to the main interface 420 shown in FIG. 7B.
- the main interface 740 is not repeated here.
- the electronic device 100 can collect the user's voice signal, and detect the voice command in the user's voice signal through a voice recognition application .
- the text information in the user's voice signal may be "open the WeChat payment interface", and the operation corresponding to the voice command recognized by the electronic device 100 is "display the payment interface”.
- the electronic device 100 can perform operations corresponding to the voice instruction, for example, start a WeChat application and display a WeChat payment interface 730.
- password authentication unlocking may include text password unlocking and pattern password unlocking.
- the text password unlock interface can refer to the password unlock interface 720 shown in FIG. 7C.
- the pattern password unlocking may be a pattern unlocking interface 810 as shown in FIG. 8D.
- the electronic device 100 displays a pattern unlock interface 810.
- the pattern unlocking interface 810 includes multiple contact areas (for example, contact area 811A, contact area 811B, contact area 811C, contact area 811D, contact area 811E, contact area 811F, contact area 811G , Contact area 811H, contact area 811I, ), emergency call button 812, exit button 813.
- each contact area can correspond to an identifier, for example, contact area 811A can correspond to "1", contact area 811B can correspond to “2”, contact area 811C can correspond to “3”, contact area 811D Can correspond to "4", contact area 811E can correspond to "5", contact area 811F can correspond to "6", contact area 811G can correspond to "7”, contact area 811H can correspond to "8”, contact area 811I Can correspond to "9".
- the electronic device 100 can splice the identifiers corresponding to the multiple contact areas sequentially traversed by the sliding track of the user's finger into a text password in the sequence of tracing, and then match the text password with the stored text password, After success, the electronic device 100 can be unlocked.
- the device 100 can detect that the password text entered by the user is "1235789”. If the stored text password is also “1235789”, the password authentication is successful and the electronic device 100 can be unlocked.
- the electronic device 100 may input an authentication failure prompt to prompt the user to re-enter the password.
- the electronic device 100 can perform password authentication on the user again.
- the voice recognition application when the electronic device 100 runs a voice recognition application, the voice recognition application can detect a voice command in the background. After the voice command is detected and unlocked, the electronic device 100 can perform an operation corresponding to the voice command. If the voice command is not detected within a period of time (for example, 5 seconds), the electronic device 100 may close the voice recognition application in the background, so that the user is not aware of the opening and closing of the voice recognition application.
- a period of time for example, 5 seconds
- the electronic device 100 when the electronic device 100 is in a locked state, the electronic device 100 can detect the user's wake-up voice, and the wake-up voice includes a wake-up word (for example, " ⁇ ") for requesting the electronic device 100 triggers a voice recognition application to detect a voice instruction, for example, the electronic device opens a voice recognition application, or the electronic device has a voice recognition application running in the background, triggers the voice recognition application to detect voice instructions.
- the electronic device 100 can trigger the voice recognition application to detect the voice command, and at the same time, trigger the authentication of the user (for example, face authentication, fingerprint authentication, password authentication, etc.).
- the electronic device 100 After the electronic device 100 detects the voice command through the voice recognition application and the authentication is successful, the electronic device 100 can unlock and execute the operation corresponding to the voice command (for example, display a WeChat payment interface). In this way, the electronic device 100 can trigger the voice recognition application to detect the next voice command input by the user when the screen is locked, as long as the wake-up voice is detected, and at the same time, trigger the authentication of the user (such as face authentication, fingerprint authentication) , Password authentication, etc.). After the authentication is successful and the voice command is detected, the electronic device 100 can perform the operation corresponding to the voice command. It simplifies the operation steps when the user controls the function or application on the electronic device through voice, and saves the user operation time.
- the following is an exemplary authentication method using face authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 may also trigger face authentication when it receives the user's wake-up voice to trigger the voice recognition application to detect the next voice command input by the user.
- the electronic device 100 can unlock and execute the operation corresponding to the voice command (for example, display a WeChat payment interface). In this way, the electronic device 100 can trigger the electronic device to recognize the voice command input by the user by waking up the screen in the locked state, and at the same time, trigger the face authentication unlocking, which simplifies the operation steps when the user controls the electronic device through voice, and saves User operation time.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 may collect the user's wake-up voice through the microphone. After the electronic device 100 collects the user's wake-up voice, the electronic device 100 can determine whether there is a wake-up word (for example, " ⁇ ") in the wake-up voice. If so, the electronic device 100 can trigger a voice recognition application to detect the next user The input voice command simultaneously triggers the electronic device 100 to collect the user's facial information. Among them, the electronic device 100 can collect the user's face information through a camera.
- a wake-up word for example, " ⁇ ”
- the electronic device 100 may continue to collect the user's voice signal through the microphone when the wake-up voice is detected, and trigger the voice recognition application to detect the voice command in the user's voice signal, and at the same time, trigger the electronic device 100 to collect the face information.
- the electronic device 100 can collect facial information through a camera, and the electronic device 100 can display the lock screen interface 910 on a bright screen when the facial information is collected.
- the electronic device 100 may output a facial recognition prompt 911 to prompt the user to perform facial recognition. In a specific implementation, the electronic device 100 may not display the face recognition prompt 911.
- the electronic device 100 may output a start prompt for prompting the user to input a voice command.
- the opening prompt may be one or more of text prompt, voice prompt, and mechanical vibration prompt.
- the opening prompt may be a text prompt 912 as shown in FIG. 9B (for example, "Hi, I am listening."), and the text content in the text prompt 912 is voiced at the same time.
- the electronic device 100 After the electronic device 100 collects the face information, it can match the collected face information with a stored face information template. After the electronic device 100 collects the user's voice signal (for example, the voice signal containing the text message "open WeChat payment interface"), it can detect the voice command in the user's voice signal (for example, display the WeChat payment interface) through the voice recognition assistant.
- the user's voice signal for example, the voice signal containing the text message "open WeChat payment interface”
- the voice command in the user's voice signal for example, display the WeChat payment interface
- the electronic device 100 may first detect the voice command in the user's voice signal through a voice recognition application, and then determine that the processed face information matches the stored face information template. In this case, the electronic device 100 can unlock and directly execute the operation corresponding to the voice command.
- the electronic device 100 first recognizes the voice command in the user's voice signal, and then determines that the collected face information matches the stored face information template. After detecting the voice instruction through the voice recognition application, the electronic device 100 may output an instruction prompt 914 (for example, the text prompt "recognizes the instruction "display WeChat payment interface""). After determining that the processed face information matches the face information template, the electronic device 100 may output a face recognition success prompt 913.
- an instruction prompt 914 for example, the text prompt "recognizes the instruction "display WeChat payment interface""
- the electronic device 100 may output a face recognition success prompt 913.
- the electronic device 100 may perform operations corresponding to the voice instructions in the user's voice signal, for example, display a WeChat payment interface 920.
- the electronic device 100 may also not need to output the instruction prompt 914.
- the electronic device 100 may also directly unlock the screen to execute the voice command without outputting the face recognition success prompt shown in FIG. 9C. For example, directly unlock and display the WeChat payment interface 920 as shown in FIG. 9D.
- the electronic device 100 may first unlock (for example, unlock the main interface when the electronic device 100 determines that the processed face information matches the stored face information template). After the electronic device 100 recognizes the voice command, the electronic device 100 can perform the operation corresponding to the voice command.
- the following is an exemplary authentication method using fingerprint authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 may also trigger fingerprint authentication when it receives the user's wake-up voice to trigger the voice recognition application to detect the next voice command input by the user.
- the electronic device 100 can unlock and execute the operation corresponding to the voice command (for example, display a WeChat payment interface). In this way, the electronic device 100 can trigger the voice recognition application to detect the next voice command input by the user by waking up the screen in the locked state, and at the same time, trigger the fingerprint authentication and unlocking, which simplifies the operation steps when the user controls the electronic device by voice, and saves User operation time.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 may collect the user's wake-up voice through the microphone. After the electronic device 100 collects the user's wake-up voice, the electronic device 100 can determine whether there is a wake-up word (for example, " ⁇ ") in the wake-up voice. If so, the electronic device 100 can trigger a voice recognition application to detect the next user The input voice command simultaneously triggers the electronic device 100 to collect the user's fingerprint information. Among them, the electronic device 100 can collect the user's fingerprint information through the fingerprint collection module under the screen.
- a wake-up word for example, " ⁇ ”
- the electronic device 100 may continue to collect the user's voice signal through the microphone when the wake-up voice is detected, and trigger the voice recognition application to detect and recognize the voice command in the user's voice signal, and at the same time, trigger the electronic device 100 to collect the user Fingerprint information.
- the fingerprint collection module when the fingerprint collection module is arranged below the touch screen and coupled with the touch screen, when the electronic device 100 turns on the fingerprint collection module to collect user fingerprint information, it may display a fingerprint identification icon 1012 on the display screen to prompt the user to input Fingerprint information.
- the fingerprint collection module can also be externally installed on the electronic device 100.
- the electronic device 100 determines that the user’s voice signal includes a wake-up word, the electronic device 100 can collect it through the external fingerprint recognition module.
- the fingerprint information of the user, at this time, the above fingerprint icon 1012 may not be displayed.
- the electronic device 100 may output an opening prompt for prompting the user to input a voice command.
- the opening prompt may be one or more of text prompt, voice prompt, and mechanical vibration prompt.
- the opening prompt may be a text prompt 1012 as shown in FIG. 10B (for example, "Hi, I am listening."), and the text content in the text prompt 1011 is voiced at the same time.
- the electronic device first detects the voice command in the user's voice signal through the voice recognition application, it then determines that the collected fingerprint information matches the stored fingerprint information template. In this case, the electronic device 100 can unlock and directly execute the operation corresponding to the voice command.
- the electronic device 100 first detects the voice command in the user's voice signal through the voice recognition application, and then determines that the collected fingerprint information matches the stored face information template. After detecting the voice instruction, the electronic device 100 may output an instruction prompt 1013 (for example, the text prompt "recognizes the instruction "display WeChat payment interface""). When it is determined that the processed fingerprint information matches the stored fingerprint information template, the electronic device 100 can unlock and execute the operation corresponding to the voice command.
- an instruction prompt 1013 for example, the text prompt "recognizes the instruction "display WeChat payment interface"
- the electronic device 100 unlocks and displays the WeChat payment interface 1020.
- the electronic device 100 may not need to output the command prompt 1013.
- the electronic device 100 if the electronic device 100 first collects the user's fingerprint information and determines that the collected fingerprint information matches the stored fingerprint information template, then it is detected from the user's voice signal through a voice recognition application Voice commands.
- the electronic device 100 can unlock (for example, unlock the main interface) when it determines that the collected fingerprint information matches the stored fingerprint information template, and wait for the electronic device 100 to obtain information from the user’s voice signal through a voice recognition application. After the voice command is detected, the operation corresponding to the voice command is executed.
- the following exemplary authentication method with password authentication will specifically introduce a voice control method in this application scenario.
- the electronic device 100 may also trigger password authentication when it receives the user's wake-up voice to trigger the voice recognition application to detect the next voice command input by the user.
- the electronic device 100 can unlock and perform the operation corresponding to the voice command (for example, display a WeChat payment interface). In this way, the electronic device 100 can trigger the voice recognition application to detect the next voice command input by the user by waking up the screen in the locked state, and at the same time, trigger the password authentication and unlocking, which simplifies the operation steps when the user controls the electronic device by voice, and saves User operation time.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 may collect the user's wake-up voice through the microphone. After the electronic device 100 collects the user's wake-up speech, the electronic device 100 can determine whether there is a wake-up word (for example, " ⁇ ") in the wake-up speech. If so, the electronic device 100 can trigger the voice recognition application to detect the next The voice command input by the user simultaneously triggers the electronic device 100 to display the password unlock interface 1110.
- a wake-up word for example, " ⁇ "
- the password unlocking interface 1110 may include a virtual numeric keyboard 1111, a password input box 1112, an emergency call button 1113, and a delete button 1114.
- the virtual numeric keyboard 1111 is used to receive the user's input, and fill in the password in the password input box 1112.
- the password input box 1112 is used to prompt the user to enter a password with a specified number of digits (for example, 6 digits). Each time the user enters a number, the password input box 722 will prompt the user to enter a number.
- the electronic device 100 can determine whether the password of the specified number of digits input by the user matches the stored password template. When the matching is successful, the electronic device 100 is unlocked successfully.
- the electronic device 100 When the electronic device 100 detects the wake-up voice, it may continue to collect the user's voice signal through the microphone, and trigger the voice recognition application to detect the voice command in the user's voice signal.
- the electronic device 100 may output an opening prompt for prompting the user to input a voice command.
- the opening prompt may be one or more of text prompt, voice prompt, and mechanical vibration prompt.
- the opening prompt may be a text prompt 1115 as shown in FIG. 11B (for example, "Hi, I am listening."), and the text content in the text prompt 1115 is voiced at the same time.
- the electronic device 100 may first detect a voice command from the user's voice signal through a voice recognition application, and then determine that the password input by the user matches a stored password template. In this case, the electronic device 100 can unlock and execute the operation corresponding to the voice command.
- the user's voice signal may be collected through the microphone, for example, the voice signal including the text message "open the WeChat payment interface".
- the electronic device 100 collects the user's voice signal, it can detect the voice command in the user's voice signal through a voice recognition application.
- the electronic device 100 may output a command prompt 1116, for example, a text prompt "recognized command'display WeChat payment interface'".
- the electronic device 100 may first recognize the voice command from the user's voice signal, and then receive the password with the specified number of digits input by the user.
- the electronic device 100 can determine whether the password of the specified number of digits input by the user matches the stored password template. If it matches, the electronic device 100 can unlock and perform the operation corresponding to the voice command (for example, display the WeChat payment interface).
- the electronic device 100 can unlock and display the WeChat payment interface 1120.
- the electronic device 100 first receives the password of the specified number of digits input by the user and determines that the password of the specified number of digits input by the user matches the stored password template, then it will use voice
- the recognition application detects a voice command from the user's voice signal (for example, "display WeChat payment interface").
- the electronic device 100 can unlock (for example, unlock the main interface) when it is determined that the password with the specified number of digits input by the user matches the stored password template, and wait for the electronic device 100 to obtain information from the user through the voice recognition application.
- the voice command is detected in the voice signal, the operation corresponding to the voice command is executed (for example, "display WeChat payment interface").
- password authentication unlocking may include text password unlocking and pattern password unlocking.
- pattern password unlocking please refer to the foregoing embodiment, which will not be repeated here.
- the electronic device 100 can trigger the voice recognition application to detect the voice command through the wake-up voice input by the user, and trigger multiple identity authentications, for example, can trigger face authentication and fingerprint authentication at the same time.
- multiple identity authentications for example, can trigger face authentication and fingerprint authentication at the same time.
- the electronic device 100 can also trigger face authentication and password authentication at the same time, or trigger fingerprint authentication and password authentication at the same time, or trigger face authentication and fingerprint at the same time Unlock and password authentication.
- the electronic device 100 can unlock and execute the operation corresponding to the voice command recognized from the user's voice signal.
- the electronic device 100 when the electronic device 100 is set with multiple unlocking methods (for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking), the electronic device 100 can trigger face authentication unlocking and fingerprint authentication unlocking first, and when the authentication fails, Then trigger password authentication unlocking (for example, text password authentication unlocking or pattern password unlocking).
- multiple unlocking methods for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking
- the electronic device 100 can trigger face authentication unlocking and fingerprint authentication unlocking first, and when the authentication fails, Then trigger password authentication unlocking (for example, text password authentication unlocking or pattern password unlocking).
- the electronic device 100 when the electronic device 100 is in a locked state, the electronic device 100 can detect a user's voice signal, where the user's voice signal may include a wake-up word for the electronic device 100 to trigger a voice recognition application
- the voice command is detected, and at the same time, the wake-up word corresponds to the voice command.
- the electronic device 100 detects the wake-up word from the voice signal, it triggers the voice recognition application to detect the voice command in the voice signal, and at the same time, triggers the authentication of the user (such as face authentication, fingerprint authentication, password authentication, etc.).
- the electronic device 100 detects the voice command and the authentication is successful, the electronic device 100 can perform the operation corresponding to the voice command (for example, display a WeChat payment interface).
- the electronic device 100 can receive a voice signal that includes a wake-up word and is also a voice command when the screen is locked, the wake-up word in the voice signal triggers the voice recognition application to recognize the voice command, and at the same time, triggers The user is authenticated, and the voice command is executed after the authentication is successful.
- the operation steps when the user controls the electronic device by voice are simplified, and the operation time of the user is saved.
- the following is an exemplary authentication method using face authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 can receive a user's voice signal, where the user's voice signal includes a preset wake-up word, and the preset wake-up word also corresponds to a voice command.
- the electronic device 100 can determine whether the user's voice signal includes a preset wake-up word, and if so, the electronic device 100 can trigger a voice recognition application to detect the voice command in the voice signal , At the same time, trigger face unlock. After the face is successfully unlocked, the electronic device 100 can execute the voice command.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 can collect the user's voice signal through a microphone (for example, the voice signal includes the text information "open WeChat payment interface"). After the electronic device 100 collects the user's voice signal, the electronic device 100 can determine whether there is a preset wake-up word (for example, "WeChat payment”) in the user's voice signal, and if so, the electronic device 100 can trigger a voice recognition application The voice command in the voice signal is detected, and at the same time, the electronic device 100 is triggered to collect the user's facial information.
- a preset wake-up word for example, "WeChat payment”
- the electronic device 100 when the electronic device 100 determines that the user's voice signal includes a preset wake-up word, the electronic device 100 triggers a voice recognition application to detect the voice command in the user's voice signal. At the same time, the electronic device 100 can display the lock screen interface 1210 on a bright screen, and collect facial information.
- the electronic device 100 may output a face recognition prompt 1211 to prompt the user to perform face recognition. After the electronic device 100 collects the facial information, it can match the facial information with a stored facial information template. In a specific implementation, the electronic device 100 may not output the aforementioned face recognition prompt 1211 after the face recognition module is turned on.
- the electronic device 100 may output an instruction prompt 1212 (for example, a text prompt "recognizes the instruction "display WeChat payment interface”"). In specific implementation, the electronic device 100 may not display the instruction prompt 1212.
- the electronic device 100 may first recognize the voice command in the user's voice signal, and then determine that the processed face information matches the stored face information template. In this case, the electronic device 100 can unlock and directly execute the operation corresponding to the voice command.
- the electronic device 100 may output a face recognition success prompt 1213.
- the electronic device 100 may execute the voice command in the user's voice signal, for example, display a WeChat payment interface 1230.
- the electronic device 100 may not output the instruction prompt 1212, and after the face recognition is successful, it directly unlocks and executes the operation corresponding to the voice instruction. After determining that the processed face information matches the stored face information template, the electronic device 100 may not output the face recognition success prompt 1213 shown in FIG. 12C, but directly unlock and execute the operation corresponding to the voice command. For example, directly unlocking the screen displays the WeChat payment interface 1220 as shown in FIG. 12D.
- the following is an exemplary authentication method using fingerprint authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 may receive a user's voice signal, where the user's voice signal includes a preset wake-up word, and the preset wake-up word is also Corresponding with voice commands.
- the electronic device 100 can determine whether the user's voice signal includes a preset wake-up word, and if so, the electronic device 100 can trigger a voice recognition application to detect the voice command in the voice signal , At the same time, trigger fingerprint unlock. After the fingerprint is successfully unlocked, the electronic device 100 can execute the voice command.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 can collect the user's voice signal through a microphone (for example, the voice signal includes the text information "open WeChat payment interface"). After the electronic device 100 collects the user's voice signal, the electronic device 100 can determine whether there is a preset wake-up word (for example, "WeChat payment”) in the user's voice signal, and if so, the electronic device 100 can trigger a voice recognition application The voice command in the voice signal of the user is detected, and at the same time, the electronic device 100 is triggered to collect the user's fingerprint information.
- a preset wake-up word for example, "WeChat payment”
- the electronic device 100 when the electronic device 100 determines that the user's voice signal includes a wake-up word, it triggers the voice recognition application to detect the voice command in the user's voice signal. At the same time, the electronic device 100 may brighten the screen to display the lock screen interface 1310, and collect the user's fingerprint information. If the fingerprint collection module is arranged under the touch screen and coupled with the touch screen, after the fingerprint collection module is turned on, the electronic device 100 may output a fingerprint identification icon 1311 to prompt the user to input fingerprint information. After the electronic device 100 collects fingerprint information, it can match the collected fingerprint information with a stored fingerprint information template.
- the fingerprint collection module can also be externally installed on the electronic device 100.
- the electronic device 100 determines that the user’s voice signal includes a wake-up word, the electronic device 100 can collect through the external fingerprint collection module The fingerprint information of the user, at this time, does not need to display the fingerprint identification icon 1311.
- the electronic device 100 may first detect the voice command in the user's voice signal, and then determine that the processed fingerprint information matches the stored fingerprint information template. In this case, the electronic device 100 can directly unlock and execute the operation corresponding to the voice command (for example, display the WeChat payment interface).
- the electronic device 100 may output an instruction prompt 1312 (for example, the text prompt "recognizes the instruction'display WeChat payment interface'").
- the electronic device 100 can collect the user's fingerprint information.
- the electronic device 100 may not output the command prompt 1312, and after the fingerprint recognition is successful, it directly unlocks the screen to execute the voice command.
- the electronic device 100 can unlock and perform operations corresponding to the voice instructions in the user's voice signal, for example, display a WeChat payment interface 1320.
- the following is an exemplary authentication method using face authentication to specifically introduce a voice control method in this application scenario.
- the electronic device 100 can receive the user's voice signal, where the user's voice signal includes a preset wake-up word, and the preset wake-up word also corresponds to a voice command.
- the electronic device 100 can determine whether the user’s voice signal includes a preset wake-up word. If so, the electronic device 100 can trigger a voice recognition application to detect the user’s voice signal. The voice command, at the same time, triggers the display of the password unlock interface. After the user enters the password and unlocks successfully, the electronic device 100 can execute the voice command.
- the electronic device 100 is in a screen-off and screen-locked state.
- the electronic device 100 can collect the user's voice signal through a microphone (for example, the voice signal includes the text information "open WeChat payment interface"). After the electronic device 100 collects the user's voice signal, the electronic device 100 can determine whether there is a preset wake-up word (for example, "WeChat payment”) in the user's voice signal, and if so, the electronic device 100 can trigger a voice recognition application The voice command in the voice signal is detected, and at the same time, the electronic device 100 is triggered to display the password unlock interface.
- a preset wake-up word for example, "WeChat payment”
- the electronic device 100 when the electronic device 100 determines that the user's voice signal includes a preset wake-up word, the electronic device 100 can trigger a voice recognition application to detect the voice command in the user's voice signal. At the same time, the electronic device 100 may display the unlocking interface 1410 on a bright screen.
- the password unlock interface 1410 may include a virtual numeric keyboard 1411, a password input box 1412, an emergency call button 1413, and a delete button 1414.
- the virtual numeric keyboard 1411 is used to receive the user's input, and fill in the password in the password input box 1412.
- the password input box 1412 is used to prompt the user to enter a password with a specified number of digits (for example, 6 digits).
- the password input box 1412 will prompt the user to enter a number.
- the electronic device 100 can determine whether the password of the specified number of digits input by the user matches the stored password template. When the matching is successful, the electronic device 100 is unlocked successfully.
- the electronic device 100 If the electronic device 100 detects the voice command in the user's voice signal through the voice recognition application, the electronic device 100 determines that the processed face information matches the stored face information template successfully, then the electronic device 100 can unlock and execute The operation corresponding to the voice command.
- the electronic device 100 may output an instruction prompt 1415 (for example, the text prompt "recognizes the instruction'display WeChat payment interface'").
- the electronic device 100 receives the user's input of the password with the specified number of digits.
- the electronic device 100 can determine whether the password of the specified number of digits input by the user matches the stored password template, and if it matches, the electronic device 100 can unlock the screen and perform the operation corresponding to the voice command.
- the electronic device 100 can unlock and display WeChat Payment interface 1420.
- the electronic device 100 may not output the instruction prompt 1415, and after the password is successfully matched, it directly unlocks the screen to execute the voice instruction.
- password authentication unlocking may include text password unlocking and pattern password unlocking.
- pattern password unlocking For the content of unlocking with the pattern password, reference may be made to the foregoing embodiment, which is not repeated here.
- the electronic device 100 can trigger multiple identity authentication unlocking through a voice signal input by the user that includes both a wake-up word and a voice command. For example, facial authentication unlocking and fingerprint authentication unlocking can be triggered simultaneously. Not limited to this, when the electronic device 100 wakes up the voice assistant through the wake-up word input by the user, it can also trigger face authentication unlocking and password authentication unlocking at the same time, or trigger fingerprint authentication unlocking and password authentication unlocking at the same time, or trigger people at the same time. Face authentication unlocking, fingerprint unlocking and password authentication unlocking. When multiple types of identity authentication unlocking are triggered, and any one of the identity authentication unlocking succeeds, the electronic device 100 can perform the operation corresponding to the voice command.
- the electronic device 100 when the electronic device 100 is set with multiple unlocking methods (for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking), the electronic device 100 can trigger face authentication unlocking and fingerprint authentication unlocking first, and when the authentication fails, Then trigger password authentication unlocking (for example, text password authentication unlocking or pattern password unlocking).
- multiple unlocking methods for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking
- the electronic device 100 can trigger face authentication unlocking and fingerprint authentication unlocking first, and when the authentication fails, Then trigger password authentication unlocking (for example, text password authentication unlocking or pattern password unlocking).
- FIG. 15 is a voice control method provided by an embodiment of this application. The method includes the following steps:
- the electronic device is in a lock screen state, and a first operation is detected.
- the electronic device can trigger authentication of the user in response to the first operation, and at the same time, in response to the first operation, trigger the voice recognition application to detect the voice command.
- the electronic device detects the lifting operation of the user, it triggers the face authentication of the user, and at the same time, when the electronic device detects the lifting operation, it triggers the voice recognition application to detect the voice command input by the user.
- the first operation may be the lifting operation in the embodiment shown in FIG. 3B, and so on.
- the first operation may be the lifting operation in the embodiment shown in FIG. 3B, and so on.
- the electronic device can trigger the authentication of the user in response to the first operation.
- the electronic device can trigger the voice recognition application to detect the voice command.
- the electronic device detects the lifting operation of the user, it triggers facial authentication of the user.
- the electronic device can trigger the voice recognition application to detect the voice command input by the user.
- the first operation may be a single-click operation on the power button 501 in the embodiment shown in FIG. 5A, and so on.
- the first operation may be a single-click operation on the power button 501 in the embodiment shown in FIG. 5A, and so on.
- the electronic device may respond to the first operation to trigger authentication of the user, and when the electronic device successfully authenticates the user, unlock and trigger the voice recognition application to detect the voice command input by the user. For example, when the electronic device detects the user's lifting operation, it triggers facial authentication of the user. After the electronic device successfully authenticates the user's face, the electronic device can trigger a voice recognition application to detect the voice command input by the user.
- the first operation may be a sliding operation for the unlocking trigger area 711 in the embodiment shown in FIG. 7B, and so on.
- the electronic device when the electronic device triggers the voice recognition application to detect the voice command and does not detect the voice command within a specified time (for example, 5 seconds), the electronic device may close the voice recognition application.
- a specified time for example, 5 seconds
- the operation of the electronic device and the closing of the voice recognition application can both run in the background, making the user unaware.
- the electronic device when the electronic device fails to authenticate the user, the electronic device outputs a first prompt for prompting the user to trigger the authentication of the user corresponding to the electronic device again.
- the user can input the authentication information again, and the electronic device can verify the authentication information input by the user again.
- the electronic device When the electronic device successfully authenticates the user, the electronic device can perform the operation corresponding to the voice command. In this way, when the user inputs the wrong authentication information, the user can be reminded to input again, which increases the fault tolerance of the user's input operation.
- the first operation may include a wake-up voice with a preset wake-up word.
- the electronic device may, in response to detecting the wake-up voice of the preset wake-up word, trigger the authentication of the user, and trigger the voice recognition application to detect the voice command.
- the user's wake-up word may be "Xiaoyi Xiaoyi" in the embodiment shown in FIG. 9A or FIG. 10A or FIG. 11A, and so on.
- authentication methods include: face authentication, fingerprint authentication, password authentication, etc. Not limited to the above methods, the authentication may also be voiceprint authentication and so on.
- the parts that are not exhaustive in specific content please refer to the foregoing embodiment, which will not be repeated here.
- the user's voice signal can be collected.
- the voice signal includes a wake-up word
- the wake-up word corresponds to a voice instruction
- the voice instruction is used to request the electronic device to perform an operation corresponding to the voice instruction.
- the electronic device detects the wake-up word from the voice signal, it triggers the opening of the voice recognition application and triggers the authentication of the user.
- the voice recognition application of the electronic device executes the operation corresponding to the voice command.
- the wake-up word corresponding to the voice command may be "open WeChat payment interface" in the embodiment shown in FIG. 12A or FIG. 13A or FIG. 14A, and so on.
- the electronic device can trigger the unlocking only when the user speaks the wake-up word corresponding to the voice command, and execute the voice command after the unlocking is completed. It simplifies the operation of user voice control and realizes one-call service.
- the parts that are not exhaustive in specific content please refer to the foregoing embodiment, which will not be repeated here.
- the voice control method when the electronic device is in the locked screen state, the user can be authenticated in response to the received user operation, and at the same time, the voice recognition application can be triggered to detect the voice command input by the user. After the electronic device is unlocked and the voice recognition application detects the voice command, the detected voice command can be executed safely. In this way, the electronic device can trigger the authentication authentication unlocking and voice recognition application to detect the voice command through an operation in the locked state, and execute the operation corresponding to the voice command after the unlock is successful and the voice command is detected, which simplifies the user through The operation steps when the electronic device is controlled by voice saves the user operation time.
- FIG. 16 is a schematic structural diagram of an electronic device provided by this application.
- the electronic device 1600 includes: an unlocking operation detection module 1601, an unlocking module 1602, a voice command recognition module 1603, and a voice command execution module 1604.
- the unlocking operation detection module 1601 can be used to detect the user's triggering of authentication unlocking (for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking).
- authentication unlocking for example, face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking
- the operation of triggering authentication and unlocking may be the lifting operation in the embodiment shown in FIG. 3B, or the single-click operation of the power button 501 in the embodiment shown in FIG. 5A, or, in the embodiment shown in FIG. 7B, For the sliding operation of the unlock trigger area 711, etc.
- the unlocking module 1602 can be used to perform authentication unlocking on the user in response to the user triggering the authentication unlocking operation.
- authentication unlocking includes the aforementioned face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking, and so on.
- the voice command recognition module 1603 can be used to detect the voice command input by the user in response to the user triggering the authentication and unlocking operation.
- the voice command execution module 1604 can be used to perform operations corresponding to the voice command when the unlocking is successful and the voice command is detected.
- the operation corresponding to the voice command may be to display the WeChat payment interface in the embodiment shown in FIG. 3D or FIG. 4C or FIG. 5D or FIG. 6C or FIG. 7E or FIG. 8C, etc.
- FIG. 17 is a schematic structural diagram of an electronic device provided by this application.
- the electronic device 1700 includes: a wake word detection module 1701, an unlock module 1702, a voice command recognition module 1703, and a voice command execution module 1704.
- the wake word detection module 1701 can be used to detect the wake word input by the user.
- the user's wake-up word may be "Xiaoyi Xiaoyi" in the embodiment shown in FIG. 9A or FIG. 10A or FIG. 11A, and so on.
- the unlocking module 1702 can be used to authenticate and unlock the user when the wake-up word detection module 1701 detects the wake-up word input by the user.
- authentication unlocking includes the aforementioned face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking, and so on.
- the voice command recognition module 1703 can be used to detect the voice command input by the user when the wake word detection module 1701 detects the wake word input by the user.
- the voice command execution module 1704 can be used to perform operations corresponding to the voice command when the unlocking is successful and the voice command is detected.
- the operation corresponding to the voice command may be to display the WeChat payment interface in the embodiment shown in FIG. 9D or FIG. 10D or FIG. 11D, and so on.
- FIG. 18 is a schematic structural diagram of an electronic device provided by this application.
- the electronic device 1800 includes: a voice hot word detection module 1801, an unlocking module 1802, and a hot word instruction execution module 1803.
- the voice hot word detection module 1801 can be used to detect a voice hot word (that is, a wake-up word) input by a user, and the voice hot word corresponds to a voice command.
- the voice hot word may be "open WeChat payment interface" in the embodiment shown in FIG. 12A or FIG. 13A or FIG. 14A, and so on.
- the unlocking module 1802 can be used to authenticate and unlock the user when the hot voice word detection module 1801 detects the hot voice word input by the user.
- authentication unlocking includes the aforementioned face authentication unlocking, fingerprint authentication unlocking, password authentication unlocking, and so on.
- the hot word instruction execution module 1803 is configured to execute the voice instruction corresponding to the voice hot word when unlocking is successful.
- the operation corresponding to the voice command may be to display the WeChat payment interface shown in FIG. 12D or FIG. 13C or FIG. 14D, and so on.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Acoustics & Sound (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
一种语音控制方法,包括:电子设备处于锁屏状态,检测到第一操作(S1501);响应于第一操作,触发对用户的鉴权,并触发语音识别应用检测语音指令(S1502);当电子设备的语音识别应用检测到语音指令且鉴权成功时,解锁并执行语音指令对应的操作(S1503)。这样,实现了用户的一个操作同时触发用户的鉴权认证和语音指令检测,并在鉴权认证成功且检测语音指令时,执行该语音指令对应的操作,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
Description
本申请要求在2019年6月29日提交中国国家知识产权局、申请号为201910581559.0、发明名称为“一种语音控制方法及相关装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及终端技术领域,尤其涉及一种语音控制方法及相关装置。
目前,电子设备(如手机、平板电脑等)屏幕锁屏时,用户若需要对电子设备进行操作,需要先对电子设备解锁,进入主界面,然后再进行相应的操作。
例如,当用户需要进行电子设备支付时,以微信支付为例。当电子设备屏幕锁屏时,用户需要先对电子设备解锁,进入主界面。然后,从主界面中查找到微信图标,通过点击微信图标,使得电子设备显示微信的用户界面。用户还需要再对微信的用户界面上的相应的虚拟按钮进行操作,来使得电子设备显示微信收付款的二维码界面,从而使得用户可以向商家进行支付。
通过以上描述可知,上述传统方式中,用户使用电子设备的某个功能例如微信支付时,需要两步甚至更多步骤的操作,较为繁琐,用户体验差。
发明内容
本申请提供了一种语音控制方法及相关装置,在电子设备锁屏状态下,实现了用户的一个操作同时触发用户的鉴权认证和语音指令检测,并在鉴权认证成功且检测语音指令时,执行该语音指令对应的操作,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
第一方面,本申请提供了一种语音控制方法,包括:首先,电子设备处于锁屏状态,检测到第一操作。然后,响应于第一操作,电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令。接着,当电子设备的语音识别应用检测到语音指令,并且鉴权成功时,电子设备解锁并执行语音指令对应的操作。
通过本申请提供的一种语音控制方法,可以在电子设备处于锁屏状态下,响应于接收到的用户操作,对用户进行身份认证,同时,触发语音识别应用检测用户输入的语音指令。在电子设备解锁且语音识别应用检测到语音指令后,可以安全地执行检测出的语音指令。这样,用户可以在电子设备处于锁屏状态下,通过一个操作,触发鉴权解锁和语音识别应用检测语音指令,以控制电子设备上的功能或应用,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,上述响应于第一操作,电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于第一操作,电子设备触发对用户的鉴权,同时,响应于第一操作,触发语音识别应用检测语音指令。例如,电子设备中的解锁指令可以 同时触发电子设备鉴权解锁和触发语音识别应用的语音指令检测功能。
在一种可能的实现方式中,上述响应于第一操作,电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于第一操作,电子设备触发对用户的鉴权。电子设备在检测到触发对用户的鉴权时,触发语音识别应用检测语音指令。
在一种可能的实现方式中,上述响应于第一操作,电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于第一操作,电子设备触发对用户的鉴权。电子设备在鉴权成功时,触发语音识别应用检测语音指令;当鉴权成功时,电子设备解锁。在电子设备解锁后,语音识别应用检测到语音指令时,电子设备执行语音指令对应的操作。例如,电子设备的解锁成功指令,无论是指纹解锁、面部解锁等的解锁指令,亦或是在进入解锁界面的同时,均可直接触发语音识别应用的语音指令检测功能。
在一种可能的实现方式中,当电子设备触发语音识别应用检测语音指令后指定时间内未检测到语音指令,电子设备关闭语音识别应用。这样,可以在用户无意通过语音控制电子设备时,及时关闭该语音识别应用,节省了功耗。
在一种可能的实现方式中,当电子设备对用户的鉴权失败时,电子设备输出第一提示,用于提示用户再次触发电子设备对用户的鉴权。这样,当鉴权失败时,电子设备可以提示再次对用户进行鉴权,是用户在输入错误的鉴权信息时可以再次进行鉴权。
在一种可能的实现方式中,第一操作包括抬起操作。电子设备触发对用户的鉴权,具体包括:电子设备触发对用户的人脸认证。响应于抬起操作,电子设备触发对用户的人脸认证,并触发语音识别应用检测语音指令。这样,电子设备可以在锁屏状态下,不需要用户说语音唤醒词,在用户抬起电子设备以触发人脸解锁时,直接说出语音指令,即可以实现对电子设备上功能或应用的控制,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,第一操作包括触发显示指纹识别图标的操作。电子设备触发对用户的鉴权,具体包括:电子设备触发对用户的指纹认证。响应于触发显示指纹识别图标的操作,电子设备触发对用户的指纹认证,并触发语音识别应用检测语音指令。这样,电子设备可以在锁屏状态下,不用检测用户说语音唤醒词,在用户触发指纹解锁时,直接触发语音识别应用检测语音指令,简化了用户通过语音控制电子设备上功能或应用时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,第一操作包括触发显示密码解锁界面的操作。电子设备触发对用户的鉴权,具体包括:电子设备触发对用户的密码认证。响应于触发显示密码解锁界面的操作,电子设备触发对用户的密码认证,并触发语音识别应用检测语音指令。这样,电子设备可以在锁屏状态下,不需要检测语音唤醒词,在显示出密码解锁界面后,直接触发语音识别应用检测语音指令,简化了用户通过语音控制电子设备上功能或应用时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,第一操作包括含有预设唤醒词的唤醒语音。响应于检测到预设唤醒词的唤醒语音,电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令。这样,电子设备可以在锁屏状态下,只需检测到唤醒语音,就可以触发语音识别应用检测接下来用户输入的语音指令,同时,触发对用户的鉴权(例如人脸认证、指纹认证、密码认证等)。鉴权成功且检测到语音指令后,电子设备可以执行该语音指令对应的操作。简化了用户通过语音控制电子设备上功能或应用时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,电子设备触发对用户的鉴权,具体包括:电子设备触发对用户的人脸认证。和/或,电子设备触发对用户的指纹认证。和/或,电子设备触发对用户的密码认证。
其中,本申请中,电子设备可以开启或关闭语音识别应用都在后台进行,做到用户无感知,提高了用户的体验。
第二方面,本申请提供了一种语音控制方法,包括:首先,电子设备处于锁屏状态时,采集用户的语音信号。其中,语音信号包括唤醒词,唤醒词对应有语音指令,语音指令用于请求电子设备执行语音指令对应操作。当电子设备从语音信号中检测到唤醒词时,触发开启语音识别应用,并且触发对用户的鉴权。在用户的鉴权成功后,电子设备的语音识别应用执行语音指令对应的操作。
通过本申请提供的一种语音控制方法,电子设备可以在锁屏状态下,可以接收到包括有唤醒词同时也是语音指令的语音信号时,通过该语音信号中的唤醒词,触发语音识别应用识别出该语音指令,同时,触发对用户的鉴权,并在鉴权成功后执行该语音指令。简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,当电子设备鉴权失败时,所述电子设备输出第一提示,用于提示用户再次触发电子设备对用户鉴权。这样,当鉴权失败时,电子设备可以提示再次对用户进行鉴权,是用户在输入错误的鉴权信息时可以再次进行鉴权。
在一种可能的实现方式中,当电子设备触发对用户的鉴权,具体包括:电子设备触发对用户的人脸认证。和/或,电子设备触发对用户的指纹认证。和/或,电子设备触发对用户的密码认证。
第三方面,本申请提供了一种电子设备,包括一个或多个处理器和一个或多个存储器。该一个或多个存储器与一个或多个处理器耦合,一个或多个存储器用于存储计算机程序代码,计算机程序代码包括计算机指令,当一个或多个处理器执行计算机指令时,使得通信装置执行上述任一方面任一项可能的实现方式中的语音通信方法。
第四方面,本申请实施例提供了一种计算机存储介质,包括计算机指令,当计算机指令在电子设备上运行时,使得通信装置执行上述任一方面任一项可能的实现方式中的语音通信方法。
第五方面,本申请实施例提供了一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行上述任一方面任一项可能的实现方式中的语音通信方法。
第六方面,本申请提供了一种电子设备,包括:解锁操作检测模块、解锁检测模块、语音识别模块、语音指令执行模块。其中:解锁操作检测模块,用于检测用户触发鉴权解锁(例如人脸认证解锁、指纹认证解锁、密码认证解锁)的操作。解锁检测模块,用于响应于用户触发鉴权解锁的操作,对用户进行鉴权解锁。语音指令识别模块,用于响应于用户触发鉴权解锁的操作,检测用户输入的语音指令。语音指令执行模块,用于在解锁成功且检测到语音指令时,执行语音指令对应的操作。
第七方面,本申请提供了一种电子设备,包括:唤醒词检测模块、解锁检测模块、语音指令识别模块、语音指令执行模块。其中:唤醒词检测模块,用于检测用户输入的唤醒词。解锁检测模块,用于在唤醒词检测模块检测到用户输入的唤醒词时,对用户进行鉴权解锁。语音指令识别模块,用于在唤醒词检测模块检测到用户输入的唤醒词时,检测用户输入的语音指令。语音指令执行模块,可用于在解锁成功且检测到语音指令时,执行语音指令对应的 操作。
第八方面,本申请提供了一种电子设备,包括:语音热词检测模块、解锁检测模块、热词指令执行模块。其中:语音热词检测模块,用于检测用户输入的语音热词(也即唤醒词),该语音热词对应有语音指令。解锁检测模块,用于在语音热词检测模块检测到用户输入的语音热词时,对用户进行鉴权解锁。热词指令执行模块,用于在解锁成功时,执行该语音热词对应的语音指令。
图1为本申请实施例提供的一种电子设备的结构示意图;
图2A-2D为本现有技术中提供的一组界面示意图;
图3A-3D为本申请实施例提供的一组界面示意图;
图4A-4C为本申请实施例提供的另一组界面示意图;
图5A-5D为本申请实施例提供的另一组界面示意图;
图6A-6C为本申请实施例提供的另一组界面示意图;
图7A-7E为本申请实施例提供的另一组界面示意图;
图8A-8E为本申请实施例提供的另一组界面示意图;
图9A-9D为本申请实施例提供的另一组界面示意图;
图10A-10D为本申请实施例提供的另一组界面示意图;
图11A-11D为本申请实施例提供的另一组界面示意图;
图12A-12D为本申请实施例提供的另一组界面示意图;
图13A-13C为本申请实施例提供的另一组界面示意图;
图14A-14D为本申请实施例提供的另一组界面示意图;
图15为本申请实施例提供的一种语音控制方法的流程示意图;
图16为本申请另一实施例提供的一种电子设备的结构示意图;
图17为本申请另一实施例提供的一种电子设备的结构示意图;
图18为本申请另一实施例提供的一种电子设备的结构示意图。
下面将结合附图对本申请实施例中的技术方案进行清除、详尽地描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;文本中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,另外,在本申请实施例的描述中,“多个”是指两个或多于两个。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为暗示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征,在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
图1示出了电子设备100的结构示意图。
下面以电子设备100为例对实施例进行具体说明。应该理解的是,图1所示电子设备100仅是一个范例,并且电子设备100可以具有比图1中所示的更多的或者更少的部件,可以组合两个或多个的部件,或者可以具有不同的部件配置。图中所示出的各种部件可以在包括一个或多个信号处理和/或专用集成电路在内的硬件、软件、或硬件和软件的组合中实现。
电子设备100可以包括:处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,加速度传感器180E,接近光传感器180G,指纹传感器180H,触摸传感器180K等。
可以理解的是,本发明实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
在本申请的一些实施例中,处理器110可以包括语音唤醒模块和语音指令识别模块。在一种可选的实施方式中,语音唤醒模块和语音指令识别模块可以集成在不同的处理器芯片中,由不同的芯片执行的。例如,语音唤醒模块可以集成在功耗较低的协处理器或DSP芯片中,语音指令识别模块可以集成在AP或NPU或其他芯片中。这样,可以在语音唤醒模块识别到预置的语音唤醒词后,再唤醒语音指令识别的模块所在的芯片触发语音指令识别功能,节省功耗。在另一种可选的实施方式中,语音唤醒模块和语音指令识别模块也可以集成在相同的处理器芯片中,由同一芯片执行相关功能,例如,语音唤醒模块和语音指令识别模块均可集成在AP芯片中。
在本申请的一些实施例中,语音唤醒模块和语音指令识别模块可以是不同应用的功能模块。例如,语音唤醒模块可以是第一应用的功能模块,语音指令识别模块是第二应用的功能模块,第一应用与第二应用是不同的应用。可选的,语音唤醒模块和语音指令识别模块也可以是同一应用的功能模块。
处理器110还可以包括语音指令执行模块,即在识别到语音指令后,执行语音指令对应的操作。例如,语音助手应用,包括语音指令识别功能的应用,识别到语音指令后,可直接执语音指令对应的操作,或者,若语音指令对应的操作涉及第三应用,则调用第三应用执行相应的操作。
处理器110还可以对用户进行鉴权和解锁。例如,当电子设备检测到抬手操作时,处理器110可以触发对用户鉴权过程,例如开启人脸检测和识别。在本发明的一些实施例中,用户的一个操作,可同时触发电子设备对用户的鉴权,和触发语音识别应用检测语音指令。触 发语音识别应用检测语音指令,是激活语音指令识别的功能,例如可以是打开语音识别应用(打开应用即可开始识别用户的语音指令,可以不需要唤醒词);也可以是语音识别应用已打开,激活语音指令识别的功能,此时不需要唤醒词;等。
在本申请的一些实施例中,语音唤醒词可以是热词。该热词对应有语音指令。处理器110可以包括热词检测模块和语音指令执行模块。在一种可选的实施方式中,热词检测模块和语音指令执行模块可以集成在不同的处理器芯片中,由不同的芯片执行的。例如,热词检测模块可以集成在功耗较低的协处理器或DSP芯片或其他芯片中,语音指令执行模块可以集成在AP中。这样,可以在热词检测模块检测到该热词且检测到该热词对应的语音指令后,再唤醒语音指令执行模块执行该热词对应的语音指令。在另一种可选的实施方式中,热词检测模块和语音指令执行模块也可以集成在相同的处理器芯片中,由同一芯片执行相关功能,例如,热词检测模块和语音指令执行模块均可集成在AP芯片中。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。
电子设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed, Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头193,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备100的各种功能应用以及数据处理。
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备100可以通过扬声器170A收听音乐,或收听免提通话。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。电子设备100可以设置至少一个麦克风170C。在另一些实施例中,电子设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中, 压力传感器180A可以设置于显示屏194。当有力作用于压力传感器180A,电极之间的电容改变。电子设备100根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,电子设备100根据压力传感器180A检测所述触摸操作强度。电子设备100也可以根据压力传感器180A的检测信号计算触摸的位置。
陀螺仪传感器180B可以用于确定电子设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备100围绕三个轴(即,x,y和z轴)的角速度。
加速度传感器180E可检测电子设备100在各个方向上(一般为三轴)加速度的大小。当电子设备100静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
指纹传感器180H用于采集指纹。电子设备100可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。在另一些实施例中,触摸传感器180K也可以设置于电子设备100的表面,与显示屏194所处的位置不同。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备100可以接收按键输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备100的接触和分离。
目前,电子设备具有语音唤醒功能,电子设备在锁屏状态时,电子设备的语音识别应用(例如,语音助手应用,可用于检测用户输入的语音指令,并在检测到该语音指令后,执行该语音指令对应的操作)处于关闭状态。无法检测到用户输入语音中的语音指令。用户需要语音输入唤醒词,例如“小艺小艺”。电子设备100上的唤醒模块检测到该预设的唤醒词后,可以开启电子设备上的语音识别应用。在电子设备上的语音识别应用被唤醒模块唤醒打开后,用户可以输入语音信号(例如“打开微信付款界面”),电子设备在接收到用户输入的语音信号(例如“打开微信付款界面”)后,可以通过语音识别应用检测用户输入的语音信号中的语音指令(例如,显示微信应用中的收付款界面)。在电子设备通过语音识别应用检测到用户输入语音信号中的语音指令(例如,打开微信应用中的收付款界面)后,电子设备可以触发开启解锁模块(例如人脸识别模块、指纹识别模块、密码解锁模块),并输出提示,让用户先对电子设备解锁,在用户对电子设备解锁完成之后,电子设备才执行语音指令对应的操作(例如,打开微信应用中的收付款界面)。
示例性的,如图2A所示,当电子设备处于锁屏状态时,电子设备可以获取用户输入的第一段语音信号。电子设备可以解析出第一段语音中,是否包括有指定唤醒词(例如“小艺小艺”),若是,则电子设备可以识别接下来用户输入的语音指令。
如图2B所示,在电子设备检测到用户输入的语音信号中包括有预设的唤醒词(例如“小艺小艺”)后,电子设备可以输出提示,用于提示用户继续输入语音信号。例如,电子设备可以在显示屏上显示文字提示211(例如“嘿,我正在听”)。电子设备可以接收用户输入的第二段语音信号,电子设备可以通过语音识别应用检测第二段语音信号中的控制指令。
如图2C所示,电子设备在语音识别应用检测出第二段语音信号中的控制指令(例如打开微信应用中的付款界面)后,电子设备可以输出解锁提示,用于提示用户解锁电子设备。电子设备可以接收用户的解锁操作(例如针对触摸屏下指纹识别图标213)。
如图2D所示,在电子设备接收用户的解锁操作并解锁成功后,电子设备可以执行第二段语音信号中语音指令对应的操作。例如,语音指令为显示微信付款界面,如图2D所示,电子设备可以启动微信应用,并在显示屏上微信付款界面220。
通过上述方案,当电子设备处于锁屏状态时,若用户需要用语音对电子设备进行操作,需要用户先用唤醒词,唤醒电子设备上的语音助手,在唤醒电子设备的语音助手后,电子设备才开始从用户输入的语音信号中识别语音指令。在电子设备识别出语音指令后,电子设备需要用户先解锁,在解锁成功后,才根据语音指令执行对应的操作。这样,使得在用户需要语音控制电子设备时,操作复杂,用户操作时间较长,用户体验不佳。
基于上述技术问题,本申请实施例提供了一种语音控制方法,可以在电子设备处于锁屏状态下,响应于接收到的用户操作,对用户进行身份认证,同时,触发语音识别应用检测用户输入的语音指令。在电子设备解锁且语音识别应用检测到语音指令后,可以安全地执行检测出的语音指令。这样,用户可以在电子设备处于锁屏状态下,通过一个操作,触发鉴权解锁和语音识别应用检测语音指令,以控制电子设备上的功能或应用,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
下面介绍电子设备100对用户鉴权的过程。
电子设备100处于锁屏状态时:1、电子设备100可以响应于接收到的用户操作,采集用户输入的鉴权信息(例如人脸信息、指纹信息、数字密码、图案密码)。
2、在电子设备100采集到用户输入的鉴权信息后,电子设备100可以判断采集到的鉴权信息与已存储出鉴权信息模板是否匹配,若是,则对用户鉴权成功,电子设备100解锁。
下面介绍电子设备100通过唤醒词触发开启语音识别应用的过程。
1、电子设备100可以通过麦克风接收到音频信号。其中,当用户在电子设备100周围说出唤醒语音时,该音频信号中可以包括有唤醒语音。在接收到该音频信号后,电子设备100可以从该音频信号中分离出用户的唤醒语音。接着,电子设备100可以从唤醒语音中,利用声学模型从用户的语音信号中的解码出音素序列。在从唤醒语音中解码出音素序列后,电子设备100可以判断该解码出的音素序列中是否与已存储的唤醒词音素序列匹配,若是,则表明该唤醒语音中有唤醒词,电子设备100可以触发识别接下来用户输入的语音信号中的语音指令。其中,电子设备100识别语音指令的过程,可以参考前述实施例,在此不再赘述。
2、电子设备100可以通过麦克风接收到音频信号。其中,当用户在电子设备100周围说出唤醒语音时,该音频信号中可以包括有唤醒语音。在接收到该音频信号后,电子设备100可以从该音频信号中分离出用户的唤醒语音。接着,电子设备100可以从唤醒语音中,利用声学模型从用户的语音信号中的解码出音素序列。然后,通过语音模型以及语音模型的发音字典,从解码出来的音素序列中进一步解码出文字信息。在电子设备100解码出文字信息后,电子设备100可以判断从唤醒语音中解码出的文字信息是否包括有已存储的唤醒词文本,若是,则表明该用户的语音信号中有唤醒词,电子设备100可以被触发识别接下来用户输入的语音信号中的语音指令。其中,电子设备100识别语音指令的过程,可以参考前述实施例, 在此不再赘述。
在一种可能的实现方式中,电子设备100可以从用户的语音信号中提取出唤醒词和用户的声纹特征,当唤醒词与已存储的唤醒词模板匹配且用户的声纹特征与已存储的声纹特征模板匹配时,电子设备100可以识别接下来用户输入的语音指令。这样,可以实现由特定的用户才能唤醒语音助手识别语音指令,提高了终端的信息安全。
下面介绍电子设备100触发语音识别应用后检测语音指令的过程。
1、电子设备100可以通过麦克风接收到音频信号。其中,当用户在电子设备100周围说出语音时,音频信号中包括用户的语音信号,用户的语音信号中可以包括语音指令,用于请求电子设备100执行该语音指令对应的操作。
2、在麦克风接收到音频信号后,电子设备100可以从音频信号中分离出用户的语音信号。然后,电子设备100可以通过特征提取算法从用户的语音信号中提取出多个包含有声音信息的特征向量。其中,特征提取算法可以包括梅尔倒谱系数(mel-frequency cepstral coefficient,MFCC)或线性预测编码(linear predictive codes,LPC)等。
3、电子设备100可以将多个包含有声音信息的特征向量输入到声学模型,得到多个音素序列。
4、电子设备100可以根据语言模型和音素字典,得到该多个音素序列对应的文本信息。
5、在得到该多个因素序列对应的文本信息后,电子设备100可以从指令库中匹配出该文本信息中关键字对应的语音指令。
需要说明的是,本申请实施例中音频信号又可以称之为audio singal、或者sound singal,语音信号又可以称之为speech singal、或者voice singal等。
下面介绍本申请实施例中电子设备100的锁屏状态和解锁状态。
本申请实施例中,根据是否被锁定来看,电子设备100可以有两个状态:锁屏状态和解锁状态。电子设备处于锁屏状态时,部分功能被锁定,即电子设备不提供部分功能。电子设备在锁屏状态下提供的功能对数据安全的要求较低。示例性地,电子设备在锁屏状态提供的功能可包括:接听电话、挂断电话、调节音乐音量大小、启动相机应用、打开/关闭飞行模式等。电子设备在解锁状态下,被锁定的功能对数据安全的要求较高。示例性地,解锁状态被锁定的功能可包括:启动部分应用程序(例如微信应用程序),以及,该应用程序提供的功能(例如,显示微信付款界面)等。
在用户设置了鉴权信息的情况下,电子设备100可以响应于用户输入的鉴权信息,判断用户输入的鉴权信息是否和已存储的鉴权信息模板相同,若相同,则由锁屏状态切换为解锁状态。该鉴权信息可用于认证当前用户是否有权限使用电子设备100。该鉴权信息可包括但不限于:人脸信息、指纹信息、密码信息、声纹信息等。
下面结合应用场景,具体介绍本申请提供的一种语音控制方法。
在一些应用场景中,在电子设备100处于锁屏的状态下,电子设备100可以接收到用户触发鉴权解锁(例如人脸认证解锁、指纹认证解锁、密码认证解锁等)的操作,响应于该触发鉴权解锁的操作,电子设备100可以对用户进行鉴权,同时,触发语音识别应用检测用户输入的语音指令,例如,电子设备打开语音识别应用,或电子设备已在后台运行语音识别应 用,触发该语音识别应用对语音指令的检测功能。在鉴权成功且语音识别应用检测出用户输入的语音指令(例如,显示微信付款界面)后,电子设备100可以执行该语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,通过响应于触发解锁的操作,同时触发电子设备100对用户鉴权和触发语音识别应用检测语音指令,即可以不需要用户说出语音唤醒词,直接在用户触发解锁时,说出语音指令,就可以实现用户对电子设备上功能或应用的控制,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
在一种可能的实现方式中,电子设备100处于锁屏状态时,电子设备100可以响应于该触发解锁的操作,对用户进行鉴权,同时,响应于该触发解锁的操作,触发语音识别应用检测用户输入的语音指令。当鉴权成功,且电子设备100通过语音识别应用检测到语音指令后,电子设备100可以解锁并执行该语音指令对应的操作。例如,电子设备中100的解锁指令可以同时触发电子设备100鉴权解锁和触发语音识别应用的语音指令检测功能。
在一种可能的实现方式中,电子设备100处于锁屏状态时,电子设备100可以响应于该触发解锁的操作,对用户进行鉴权。在电子设备100开始对用户鉴权后,电子设备100可以触发语音识别应用检测用户输入的语音指令。当鉴权成功,且电子设备100通过语音识别应用检测到语音指令后,电子设备100可以解锁并执行该语音指令对应的操作。
在一种可能的实现方式中,电子设备100处于锁屏状态时,电子设备100可以响应于该触发解锁的操作,对用户进行鉴权。在鉴权成功时,电子设备100可以解锁并触发语音助手检测语音指令。例如,电子设备的解锁成功指令,无论是指纹解锁、面部解锁等的解锁指令,亦或是在进入解锁界面的同时,均可直接触发语音识别应用的语音指令检测功能。
在一种可能的实现方式中,若电子设备100触发开启语音识别应用后一段时间(例如5s)内未检测语音指令,则电子设备100可以关闭该语音识别应用。这样,可以在用户无意通过语音控制电子设备时,及时关闭该语音识别应用,节省了功耗。
下面示例性的以人脸认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以在接收到用户触发人脸认证的操作(例如抬起)时,采集人脸信息并验证,同时可以触发语音识别应用(例如语音助手)检测用户输入的语音指令。在人脸认证成功且电子设备100通过语音识别应用检测到语音指令后,电子设备100可以解锁并执行该语音指令对应的操作。这样,电子设备100可以在锁屏状态下,不需要用户说语音唤醒词,在用户抬起电子设备100以触发人脸解锁时,直接说出语音指令,即可以实现对电子设备100上功能或应用的控制,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
示例性的,如图3A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以接收用户的抬起操作,响应于该抬起操作,电子设备100可以采集用户的人脸信息,并触发语音识别应用检测用户输入的语音指令。
其中,电子设备100可以通过如下方式检测用户的抬起操作:电子设备100可以通过一个或多个传感器检测电子设备100被旋转、电子设备100相对于用户向前运动、电子设备100相对于地平线向上运动,来判断电子设备的位置状态是否发生符合预设条件的变化,若是,则电子设备100可以确定接收到用户的抬起操作。具体的,终端可以检测该终端的运动参数; 然后根据该运动参数判断该终端是否被旋转、是否相对于用户发生向前运动、是否相对于地平线发上向上运动;最后,根据判断结果确定该终端的位置状态是否发生符合预设条件的变化。
示例性的,如图3B所示,响应于该抬起操作,电子设备100可以采集人脸信息,并触发语音识别应用检测麦克风所采集用户的语音信号中的语音指令。(例如,用户语音输入“打开微信付款界面”)。其中,电子设备100可以通过摄像头采集人脸信息,在采集人脸信息时电子设备100可以亮屏显示锁屏界面310。
在一种可能的实现方式中,当电子设备100采集人脸信息时,电子设备100可以在锁屏界面上显示人脸识别提示311,用于提示用户正在进行人脸识别。具体实现中,电子设备100也可以不显示人脸识别提示311。
电子设备100在采集到人脸信息后,可以采集到的人脸信息与已存储的人脸信息模板进行匹配。
在一种可能的实现方式中,电子设备100可以通过语音识别应用检测出用户语音信号中的语音指令,后判定出处理后的人脸信息与已存储的人脸信息模板相匹配。在该种情况下,电子设备100可以解锁并直接执行该语音指令对应的操作。
示例性的,如图3C所示,电子设备100先通过语音识别应用检测出用户语音信号中的语音指令,后判定出采集到的人脸信息与已存储的人脸信息模板相匹配。在判定出处理后的人脸信息与已存储的人脸信息模板相匹配之后,电子设备100可以输出人脸识别成功提示312,用于提示用户人脸识别成功。在电子设备100输出人脸识别成功提示一段时间(例如0.5秒)后,电子设备100可以执行用户语音信号中的语音指令。
如图3D所示,在电子设备100输出人脸识别成功提示一段时间(例如0.5秒)后,电子设备可以解锁屏幕执行用户语音信号中的语音指令对应的操作,例如,显示微信付款界面320。
具体实现中,电子设备100先通过语音识别应用检测出语音指令,在判定出处理后的人脸信息与已存储的人脸信息模板相匹配时,电子设备100可以不输出图3C所示的人脸识别成功提示,而直接解锁执行语音指令。例如,直接解锁并显示如图3D所示的微信付款界面320。
在一种可能的实现方式中,若电子设备100先判定出处理后的人脸信息与已存储的人脸信息模板匹配后,后通过语音应用检测出用户语音信号中的语音指令。在该种情况下,电子设备100可以在电子设备100在判定出处理后的人脸信息与已存储的人脸信息模板匹配时,先解锁(例如解锁显示主界面)。等电子设备100通过语音识别应用检测出语音指令后,电子设备100可以执行该语音指令对应的操作。
在一种可能的实现方式中,电子设备100可以响应于用户触发人脸解锁的操作(例如图3B中所示的抬起操作)后,采集人脸信息,并判断采集到的人脸信息与已存储的人脸信息模板是否相匹配,若是,则电子设备100可以解锁(例如解锁显示主界面)。在检测到电子设备100由锁屏状态解锁时,电子设备100可以通过麦克风采集用户的语音信号,并触发语音识别应用检测语音指令。在通过语音识别应用检测语音指令后,电子设备100可以直接执行该语音指令对应的操作。
示例性的,如图4A所示,电子设备100响应于用户触发的人脸解锁操作(例如抬起操作),可以开启人脸识别模块(如点阵发射器和摄像头)采集人脸信息。其中,在电子设备 100接收到用户触发的人脸解锁操作(例如抬起操作)时,电子设备100可以亮屏显示锁屏界面410。
其中,当电子设备100采集人脸信息时,电子设备100可以在锁屏界面上显示人脸识别提示411,用于提示用户正在进行人脸识别。具体实现中,电子设备100也可以不显示人脸识别提示411。
如图4B所示,电子设备100在判定采集到的人脸信息与已存储的人脸信息模板匹配成功时,可以解锁显示主界面420,并通过麦克风采集用户的语音信号,同时,触发语音识别应用检测用户的语音信号中的语音指令。例如,语音指令可以包括有文本信息“打开微信付款界面”。其中,该主界面420显示了一个放置有应用图标的页面,该页面包括多个应用图标(例如,天气应用图标、股票应用图标、计算器应用图标、设置应用图标、邮件应用图标、支付宝应用图标、脸书应用图标、浏览器应用图标、图库应用图标、音乐应用图标、视频应用图标、微信应用图标)。多个应用图标下方还包括页面指示符,以表明当前显示的页面与其他页面的位置关系,页面指示符的下方有多个托盘图标(例如拨号应用图标、信息应用图标、联系人应用图标、相机应用图标),托盘图标在页面切换时保持显示。页面可以包括多个应用图标和页面指示符;页面指示符也可以不是页面的一部分,单独存在。上述的托盘图标也是可选的,本申请实施例对此不做限制。
如图4C所示,电子设备100通过语音识别应用从用户的语音信号中检测出语音指令(例如,包括有文本信息“打开微信付款界面”)后,电子设备100可以执行该语音指令对应的操作,例如,启动微信应用,显示微信应用中的微信付款界面430。
可以理解的,当人脸认证失败时,电子设备100可以输入认证失败提示,用于提示用户重新输入密码。电子设备100可以重新对用户进行人脸认证。
下面示例性的以指纹认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以在接收到用户触发指纹认证的操作(例如单击电源键)时,采集用户的指纹信息并验证,同时可以触发语音识别应用(例如语音助手)检测用户输入的语音指令。在指纹认证成功且电子设备100通过语音识别应用检测到用户输入的语音指令后,电子设备100可以执行该语音指令对应的操作。这样,电子设备100可以在锁屏状态下,不用检测用户说语音唤醒词,在用户触发指纹解锁时,直接触发语音识别应用检测语音指令,简化了用户通过语音控制电子设备100上功能或应用时的操作步骤,节省了用户操作时间。
示例性的,如图5A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以接收用户针对电源键501的输入操作(例如单击)。响应于该针对电源键501的输入操作(例如单击),电子设备100可以采集用户的指纹信息,并触发语音识别应用检测用户输入的语音指令。
在一种可能的实现方式中,若电子设备100先通过语音识别应用从麦克风所采集用户的语音信号中检测出语音指令,后判定出采集到的指纹信息与已存储的指纹信息模板相匹配。在该种情况下,电子设备100可以解锁并直接执行该语音指令对应的操作。
示例性的,如图5B所示,指纹采集模块可以设置在触控屏下方与触控屏耦合。电子设备100在开启触控屏下方的指纹采集模块后,可以在锁屏界面510上显示指纹识别图标511。电子设备100可在用户手指触摸触控屏的固定区域时,采集用户手指的指纹,因此,指纹识 别图标511的显示位置可以是在指纹采集模块能够采集指纹的区域内(例如在触控屏偏底部中间位置)。当电子设备100采集到用户语音信号(例如用户输入包括有文本信息“打开微信付款界面”的语音信号)后,电子设备100可以识别用户语音信号中的语音指令(例如,显示微信付款界面)。
如图5C所示,在电子设备100通过语音识别应用检测出语音指令后,电子设备100才采集到用户的指纹信息。电子设备100可以判断采集的指纹信息与已存储的指纹信息模板是否匹配,若是,则电子设备100可以解锁并直接执行该语音指令对应的操作。
如图5D所示,在电子设备100判定采集的指纹信息与已存储的指纹信息模板相匹配时,电子设备100解锁并显示微信付款界面520。
在一种可能的实现方式中,若电子设备100先采集到用户的指纹信息并判定采集的指纹信息与已存储的指纹信息模板相匹配,之后才通过语音识别应用从用户的语音信号中识别出语音指令。在该种情况下,电子设备100可以在判定采集的指纹信息与已存储的指纹信息模板相匹配时,解锁,等接下来电子设备100通过语音识别应用识别出用户输入的语音指令时,执行该语音指令对应的操作。
在一种可能的实现方式中,电子设备100可以响应于触发指纹解锁的操作,先开始采集用户的指纹信息。在电子设备100检测到开始采集用户的指纹信息后,电子设备100才触发采集用户的语音信号并触发开启语音识别应用检测用户的语音信号中的语音指令。在电子设备100判定采集到的指纹信息与已存储的指纹信息模板相匹配,且通过语音识别应用检测出语音指令时,电子设备100可以执行该语音指令对应的操作。
在一种可能的实现方式中,电子设备100在采集到用户的指纹信息后,可以判断采集的指纹信息是否与已存储的指纹信息模板匹配,若匹配,电子设备100可以解锁,同时,采集用户的语音信号并触发语音识别应用检测用户的语音信号中的语音指令。在检测出语音指令后,电子设备100可以执行该语音指令对应的操作。
示例性的,如图6A所示,电子设备100可以响应于触发指纹解锁的操作,开启指纹采集模块并显示指纹图标611。电子设备100可以接收用户针对指纹识别图标611的触摸操作,响应于该针对指纹识别图标611的触摸操作,电子设备100可以采集用户的指纹信息,并判断采集的指纹信息与已存储的指纹信息模板是否匹配,若是,则电子设备100解锁并显示如图6B所示的主界面620。其中,图6B中所示的主界面620与上述图4B中所示的主界面420相同,因此,上述针对图4B中所示的主界面420的文字说明也同样适用于图6B中所示的主界面620,在此不再赘述。
如图6B所示,在电子设备100判定采集的指纹信息与已存储的指纹信息模板相匹配后,电子设备100可以采集用户的语音信号,并触发语音识别应用检测用户的语音信号中的语音指令。其中,用户的语音信号中包括的文本信息可以为“打开微信付款界面”,电子设备100可以从用户的语音信号中识别出语音控制信号指令对应的操作为“显示付款界面”。
如图6C所示,在电子设备100通过语音识别应用从用户的语音信号中检测出语音控制信号指令后,电子设备100可以执行该语音指令对应的操作,例如,启动微信应用,显示微信付款界面630。
可以理解的,当指纹认证失败时,电子设备100可以输入认证失败提示,用于提示用户 重新输入指纹信息。电子设备100可以重新对用户进行指纹认证。
本申请实施例中,若上述指纹采集模块也可以外置在电子设备100上,电子设备100可以通过外置的指纹采集模块采集用户的指纹信息,在电子设备100检测到用户触摸外置的指纹识别模块时,电子设备100可以采集用户的指纹信息,同时,采集用户的语音信号并通过语音识别应用检测用户的语音信号中语音指令。在电子设备100判定采集到的指纹信息与已存储的指纹信息模板相匹配,且通过语音识别应用检测出语音指令时,电子设备100可以执行该语音指令对应的操作。
下面示例性的以密码认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以在接收到用户触发密码认证的操作(例如在锁屏界面的滑动操作)时,显示密码解锁界面,同时,触发语音识别应用检测(例如语音助手)用户输入的语音指令。在密码解锁成功且电子设备100通语音识别应用检测到语音指令(例如,显示微信付款界面)后,电子设备100可以执行语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,不需要检测语音唤醒词,在显示出密码解锁界面后,直接触发语音识别应用检测语音指令,简化了用户通过语音控制电子设备100上功能或应用时的操作步骤,节省了用户操作时间。
示例性的,如图7A所示,电子设备100处于亮屏且锁屏状态。电子设备100可以显示出锁屏界面710,其中,该锁屏界面710上包括有解锁触发区域711。
如图7B所示,电子设备100可以接收到用户针对该解锁触发区域711的输入操作(例如从左往右滑动),响应于该针对解锁触发区域711的输入操作,电子设备100可以显示如图7C所示的密码解锁界面720,同时,触发语音识别应用检测麦克风所采集用户的语音信号中的语音指令。可以理解的是,电子设备100还可以在显示出密码解锁界面后,才通过麦克风采集用户的语音信号并触发语音识别应用检测该用户的语音信号中的语音指令。
如图7C所示,该密码解锁界面720包括有虚拟数字键盘721、密码输入框722、紧急呼叫按钮723和返回按钮724。虚拟数字键盘721用于接收用户的输入,在密码输入框722中填入密码。密码输入框722用于提示用户输入指定位数(例如6位数)的密码,其中,当用户每输入一个数时,密码输入框722都会提示用户已输入一个数,当用户输入完指定位数的密码后,电子设备100可以判断用户输入的指定位数的密码是否与已存储的密码模板匹配,当匹配成功,则电子设备100解锁成功。
电子设备100在通过语音识别应用检测出语音指令后,电子设备100才判断用户输入的指定位数的密码与已存储的密码模板相匹配,则电子设备100可以解锁并执行从用户的语音信号中识别出的语音指令。
示例性的,如图7C所示,电子设备100在显示密码解锁界面720时,可以通过麦克风采集到用户的语音信号,例如,包括有文本信息“打开微信付款界面”的语音信号。电子设备100在采集用户的语音信号时,可以通过语音识别应用检测用户的语音信号中的语音指令。
如图7D所示,在电子设备100通过语音识别应用检测到语音指令(例如显示微信付款界面)后,电子设备100可以接收用户输入完的指定位数的密码。电子设备100可以判断用户输入的指定位数的密码是否与已存储的密码模板匹配,若匹配,则电子设备100可以解锁并执行检测到的语音指令。
如图7E所示,在电子设备100从用户的语音信号中识别到语音指令为“显示微信付款界 面”,且判定用户输入的指定位数的密码与已存储的密码模板相匹配后,电子设备100可以解锁并显示微信付款界面730。
在一种可能的实现方式中,若电子设备100先接收到用户输入完的指定位数的密码并判定出用户输入的指定位数的密码与已存储的密码模板相匹配,之后,才通过语音识别应用从用户的语音信号中检测出语音指令。在该种情况下,电子设备100可以在判定出用户输入的指定位数的密码与已存储的密码模板相匹配后,解锁(例如,解锁显示主界面),等接下来电子设备100通过语音识别应用从用户的语音信号中检测出语音指令后,再执行该语音指令对应的操作(例如,“显示微信付款界面”)。
在一种可能的实现方式中,电子设备100可以响应于用户触发密码解锁的操作后,显示密码解锁界面。在显示出密码解锁界面后,电子设备100可以接收用户输入指定位数(例如6位数)的密码。在电子设备100接收用户输入完指定位数的密码后,电子设备100可以判断该指定位数的密码是否与已存储的密码模板匹配,若匹配,则电子设备100可以解锁并显示主界面。在电子设备100解锁后,电子设备100可以采集用户的语音信号并通过语音识别应用检测用户的语音信号中的语音指令。在电子设备100通过语音识别应用检测出语音指令后,电子设备100可以执行该语音指令对应的操作(例如,为“显示微信付款界面)。
示例性的,如图8A所示,电子设备100显示出密码解锁界面720。电子设备100可以接收用户输入的指定位数(例如,6位数)的密码。电子设备100可以判断该指定位数的密码是否与已存储的密码模板匹配,若匹配,则电子设备100可以解锁,并显示出如图8B所示的主界面740。其中,图7B中所示的主界面740与上述图4B中所示的主界面420相同,因此,上述针对图4B中所示的主界面420的文字说明也同样适用于图7B中所示的主界面740,在此不再赘述。
如图8B所示,在电子设备100判定采集的指纹信息与已存储的指纹信息模板相匹配后,电子设备100可以采集用户的语音信号,并通过语音识别应用检测用户的语音信号中的语音指令。例如,用户的语音信号中的文本信息可以为“打开微信付款界面”,电子设备100识别出的语音指令对应的操作为“显示付款界面”。
如图8C所示,在电子设备100从用户的语音信号中识别出语音控制信号指令后,电子设备100可以执行该语音指令对应的操作,例如,启动微信应用,显示微信付款界面730。
在本申请实施例中,密码认证解锁可以包括文字密码解锁和图案密码解锁。其中,文字密码解锁界面可以参考上述图7C所示的密码解锁界面720。图案密码解锁可以如图8D所示图案解锁界面810。
如图8D所示,电子设备100显示出了图案解锁界面810。其中,该图案解锁界面810包括有多个触点区(例如触点区811A、触点区811B、触点区811C、触点区811D、触点区811E、触点区811F、触点区811G、触点区811H、触点区811I、),紧急呼叫按钮812、退出按钮813。其中,每个触点区都可以对应有一个标识,例如,触点区811A可以对应“1”、触点区811B可以对应“2”、触点区811C可以对应“3”、触点区811D可以对应“4”、触点区811E可以对应“5”、触点区811F可以对应“6”、触点区811G可以对应“7”、触点区811H可以对应“8”、触点区811I可以对应“9”。
电子设备100可以将用户的手指滑动轨迹依次划过的多个触点区对应的标识,按照划过的顺序拼接成文本密码,然后,在将该文本密码与已存储的文本密码匹配,在匹配成功后, 电子设备100可以解锁。
如图8E,当用户依次滑动的轨迹依次划过触点区811A、触点区811B、触点区811C、触点区811E、触点区811G、触点区811H、触点区811I时,电子设备100可以检测到用户输入的密码文本为“1235789”。若已存储的文本密码也为“1235789”,则密码认证成功,电子设备100可以解锁。
可以理解的,当密码认证失败时,电子设备100可以输入认证失败提示,用于提示用户重新输入密码。电子设备100可以重新对用户进行密码认证。
在本申请实施例中,当电子设备100运行语音识别应用时,该语音识别应用可以在后台检测语音指令,在检测到语音指令且解锁后,电子设备100可以执行该语音指令对应的操作。若在一段时间(例如5秒)内未检测到语音指令时,电子设备100可以后台关闭该语音识别应用,使得用户察觉不到语音识别应用的开启和关闭。
在一些应用场景中,在电子设备100处于锁屏的状态下,电子设备100可以检测用户的唤醒语音,该唤醒语音中包括有唤醒词(例如,“小艺小艺”)用于请求电子设备100触发语音识别应用检测语音指令,例如,电子设备打开语音识别应用,或电子设备已在后台运行语音识别应用,触发该语音识别应用对语音指令的检测功能。当电子设备100检测到该唤醒语音时,电子100可以触发语音识别应用检测语音指令,同时,触发对用户进行鉴权(例如人脸认证、指纹认证、密码认证等)。在电子设备100通过语音识别应用检测出语音指令且鉴权成功后,电子设备100可以解锁执行该语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,只需检测到唤醒语音,就可以触发语音识别应用检测接下来用户输入的语音指令,同时,触发对用户的鉴权(例如人脸认证、指纹认证、密码认证等)。鉴权成功且检测到语音指令后,电子设备100可以执行该语音指令对应的操作。简化了用户通过语音控制电子设备上功能或应用时的操作步骤,节省了用户操作时间。
下面示例性的以人脸认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以在接收到用户利用唤醒语音,触发语音识别应用检测接下来用户输入的语音指令时,一并触发人脸认证。在语音识别应用检测出语音指令且人脸认证成功后,电子设备100可以解锁并执行该语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,通过唤醒语音触发电子设备识别接下来用户输入的语音指令,同时,触发人脸认证解锁,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
示例性的,如图9A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以通过麦克风采集用户的唤醒语音。当电子设备100采集到用户的唤醒语音后,电子设备100可以判断唤醒语音中是否有唤醒词(例如,“小艺小艺”),若是,则电子设备100可以触发语音识别应用检测接下来用户输入的语音指令,同时,触发电子设备100采集用户的人脸信息。其中,电子设备100可以通过摄像头采集用户的人脸信息。
如图9B所示,电子设备100可以在检测到唤醒语音时,通过麦克风继续采集用户的语音信号,并触发语音识别应用检测用户的语音信号中的语音指令,同时,触发电子设备100 采集人脸信息。其中,电子设备100可以通过摄像头采集人脸信息,在采集人脸信息时电子设备100可以亮屏显示锁屏界面910。
在一种可能的实现方式中,当电子设备100采集人脸信息时,电子设备100可以输出人脸识别提示911,用于提示用户正在进行人脸识别。具体实现中,电子设备100也可以不显示人脸识别提示911。
其中,在电子设备100被触发识别语音指令时,电子设备100可以输出开启提示,用于提示用户输入语音指令。该开启提示可以是文字提示、语音提示、机械振动提示中的一种或多种。例如,该开启提示可以是如图9B中的文字提示912(例如,“嗨,我正在听…”),同时语音播报该文字提示912中的文字内容。
电子设备100在采集到人脸信息后,可以将采集到的人脸信息与已存储的人脸信息模板进行匹配。电子设备100在采集到用户的语音信号(例如包含有文本信息“打开微信付款界面”的语音信号)后,可以通过语音识别助手检测用户语音信号中的语音指令(例如,显示微信付款界面)。
在一种可能的实现方式中,电子设备100可以先通过语音识别应用检测出用户语音信号中的语音指令,后判定出处理后的人脸信息与已存储的人脸信息模板相匹配。在该种情况下,电子设备100可以解锁并直接执行该语音指令对应的操作。
示例性的,如图9C所示,电子设备100先识别出用户语音信号中的语音指令,后判定出采集到的人脸信息与已存储的人脸信息模板相匹配。在通过语音识别应用检测出语音指令后,电子设备100可以输出指令提示914(例如,文字提示“识别到指令‘显示微信付款界面’”)。在判定出处理后的人脸信息与人脸信息模板相匹配之后,电子设备100可以输出人脸识别成功提示913。
如图9D所示,在电子设备100输出人脸识别成功提示913一段时间(例如0.5秒)后,电子设备可以执行用户语音信号中的语音指令对应的操作,例如,显示微信付款界面920。
具体实现中,在识别出语音指令后,电子设备100也可以不需要输出指令提示914。在判定出处理后的人脸信息与已存储的人脸信息模板相匹配后,电子设备100也可以不需要输出图9C所示的人脸识别成功提示,而直接解锁屏幕执行语音指令。例如,直接解锁并显示如图9D所示的微信付款界面920。
在一种可能的实现方式中,若电子设备100先判定出处理后的人脸信息与已存储的人脸信息模板匹配,后通过语音识别应用检测出用户的语音信号中的语音指令。在该种情况下,电子设备100可以在电子设备100在判定出处理后的人脸信息与已存储的人脸信息模板匹配时,先解锁(例如,解锁显示主界面)。等电子设备100识别出语音指令后,电子设备100可以执行该语音指令对应的操作。
下面示例性的以指纹认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以在接收到用户利用唤醒语音,触发语音识别应用检测接下来用户输入的语音指令时,一并触发指纹认证。在语音识别应用检测出语音指令且指纹认证成功后,电子设备100可以解锁并执行该语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,通过唤醒语音触发语音识别应用检测接下来用户输入的语音指令,同时,触发指纹认证解锁,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
示例性的,如图10A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以通过麦克风采集用户的唤醒语音。当电子设备100采集到用户的唤醒语音后,电子设备100可以判断唤醒语音中是否有唤醒词(例如,“小艺小艺”),若是,则电子设备100可以触发语音识别应用检测接下来用户输入的语音指令,同时,触发电子设备100采集用户的指纹信息。其中,电子设备100可以通过屏下的指纹采集模块采集用户的指纹信息。
如图10B所示,电子设备100可以在检测到唤醒语音时,通过麦克风继续采集用户的语音信号,并触发语音识别应用检测识别用户的语音信号中的语音指令,同时,触发电子设备100采集用户的指纹信息。其中,当指纹采集模块设置在触控屏下方与触控屏耦合时,电子设备100在开启指纹采集模块采集用户的指纹信息时,可以在显示屏上显示指纹识别图标1012,用于提示用户输入指纹信息。
在本申请实施例中,指纹采集模块也可以外置在电子设备100上,在电子设备100在判定出用户的语音信号中包括有唤醒词时,电子设备100可以通过外置的指纹识别模块采集用户的指纹信息,此时,可以不用显示上述指纹图标1012。
其中,在电子设备100开启语音识别应用后,电子设备100可以输出开启提示,用于提示用户输入语音指令。该开启提示可以是文字提示、语音提示、机械振动提示中的一种或多种。例如,该开启提示可以是如图10B中的文字提示1012(例如,“嗨,我正在听…”),同时语音播报该文字提示1011中的文字内容。
在一种可能的实现方式中,若电子设备先通过语音识别应用检测出用户语音信号中的语音指令,后判定出采集到的指纹信息与已存储的指纹信息模板相匹配。该种情况下,电子设备100可以解锁并直接执行该语音指令对应的操作。
示例性的,如图10C所示,电子设备100先通过语音识别应用检测出用户语音信号中的语音指令,后判定出采集到的指纹信息与已存储的人脸信息模板相匹配。在检测出语音指令后,电子设备100可以输出指令提示1013(例如,文字提示“识别到指令‘显示微信付款界面’”)。在判定出处理后的指纹信息与已存储的指纹信息模板相匹配时,电子设备100可以解锁,并执行该语音指令对应的操作。
如图10D所示,在电子设备100判定采集的指纹信息与已存储的指纹信息模板相匹配后,电子设备100解锁并显示微信付款界面1020。
其中,在识别出语音指令后,电子设备100也可以不需要输出指令提示1013。
在一种可能的实现方式中,若电子设备100先采集到用户的指纹信息并判定采集的指纹信息与已存储的指纹信息模板相匹配,之后才通过语音识别应用从用户的语音信号中检测出语音指令。在该种情况下,电子设备100可以在判定采集的指纹信息与已存储的指纹信息模板相匹配时,解锁(例如解锁显示主界面),等电子设备100通过语音识别应用从用户的语音信号中检测出语音指令后,再执行该语音指令对应的操作。
下面示例性的以密码认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以在接收到用户利用唤醒语音,触发语音识别应用检测接下来用户输入的语音指令时,一并触发密码认证。在语音识别应用检测出语音指令且密码认证成功后,电子设备100可以解锁并执行该语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,通过唤醒语音触发语音识 别应用检测接下来用户输入的语音指令,同时,触发密码认证解锁,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
示例性的,如图11A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以通过麦克风采集用户的唤醒语音。当电子设备100采集到用户的唤醒语音后,电子设备100可以判断该唤醒语音中是否有唤醒词(例如,“小艺小艺”),若是,则电子设备100可以触发语音识别应用检测接下来用户输入的语音指令,同时,触发电子设备100显示密码解锁界面1110。
如图11B所示,该密码解锁界面1110可以包括有虚拟数字键盘1111、密码输入框1112、紧急呼叫按钮1113和删除按钮1114。虚拟数字键盘1111用于接收用户的输入,在密码输入框1112中填入密码。密码输入框1112用于提示用户输入指定位数(例如6位数)的密码,其中,当用户每输入一个数时,密码输入框722都会提示用户已输入一个数,当用户输入完指定位数的密码后,电子设备100可以判断用户输入的指定位数的密码是否与已存储的密码模板匹配,当匹配成功,则电子设备100解锁成功。
电子设备100可以在检测到唤醒语音时,通过麦克风继续采集用户的语音信号,并触发语音识别应用检测用户的语音信号中的语音指令。
其中,在电子设备100开启语音识别应用后,电子设备100可以输出开启提示,用于提示用户输入语音指令。该开启提示可以是文字提示、语音提示、机械振动提示中的一种或多种。例如,该开启提示可以是如图11B中的文字提示1115(例如,“嗨,我正在听…”),同时语音播报该文字提示1115中的文字内容。
在一种可能的实现方式中,电子设备100可以先通过语音识别应用从用户的语音信号中检测出语音指令,后判定用户输入的密码与已存储的密码模板相匹配。在该种情况下,电子设备100可以解锁并执行该语音指令对应的操作。
示例性的,如图11B所示,电子设备100显示密码解锁界面1110时,可以通过麦克风采集到用户的语音信号,例如,包括有文本信息“打开微信付款界面”的语音信号。电子设备100在采集到用户的语音信号时,可以通过语音识别应用检测用户的语音信号中的语音指令。
如图11C所示,在电子设备100通过语音识别应用从用户的语音信号检测出语音指令时,电子设备100可以输出指令提示1116,例如,文字提示“识别到指令‘显示微信付款界面’”。电子设备100可以先从用户的语音信号识别出语音指令,后接收用户输入完指定位数的密码。电子设备100可以判断用户输入的指定位数的密码是否与已存储的密码模板匹配,若匹配,则电子设备100可以解锁并执行该语音指令对应的操作(例如,显示微信付款界面)。
如图11D所示,在电子设备100从用户的语音信号中识别到语音指令为“显示微信付款界面”,且判定用户输入的指定位数的密码与已存储的密码模板相匹配后,电子设备100可以解锁并显示微信付款界面1120。
在一种可能的实现方式中,若电子设备100先接收到用户输入完的指定位数的密码并判定出用户输入的指定位数的密码与已存储的密码模板相匹配,之后,才通过语音识别应用从用户的语音信号中检测出语音指令(例如,“显示微信付款界面”)。在该种情况下,电子设备100可以在判定出用户输入的指定位数的密码与已存储的密码模板相匹配时,解锁(例如解锁显示主界面),等电子设备100通过语音识别应用从用户的语音信号中检测出语音指令后,再执行该语音指令对应的操作(例如,“显示微信付款界面”)。
其中,密码认证解锁可以包括文字密码解锁和图案密码解锁。关于图案密码解锁的内容 可以参考前述实施例,在此不再赘述。
在本申请的实施例中,电子设备100可以通过用户输入的唤醒语音,触发语音识别应用检测语音指令的同时,触发多种身份认证,例如,可以同时触发人脸认证和指纹认证。不限于此,电子设备100在通过用户输入的唤醒词,唤醒语音助手时,还可以同时触发人脸认证和密码认证,或者,同时触发指纹认证和密码认证,或者,同时触发人脸认证、指纹解锁和密码认证。当触发多种身份认证时,任一种身份认证成功,电子设备100即可解锁执行从用户的语音信号中识别出的语音指令对应的操作。
其中,当电子设备100被设置有多种解锁方式(例如人脸认证解锁、指纹认证解锁、密码认证解锁)时,电子设备100可以优先触发人脸认证解锁和指纹认证解锁,当认证失败时,再触发密码认证解锁(例如,文字密码认证解锁或者图案密码解锁)。
在一些应用场景中,在电子设备100处于锁屏的状态下,电子设备100可以检测用户的语音信号,其中,该用户的语音信号中可以包括有唤醒词,用于电子设备100触发语音识别应用检测语音指令,同时,该唤醒词对应有语音指令。当电子设备100从该语音信号中检测到唤醒词时,触发语音识别应用检测该语音信号中的语音指令,同时,触发对用户的鉴权(例如人脸认证、指纹认证、密码认证等)。在电子设备100检测出语音指令且鉴权成功时,电子设备100可以执行该语音指令对应的操作(例如,显示微信付款界面)。这样,电子设备100可以在锁屏状态下,可以接收到包括有唤醒词同时也是语音指令的语音信号时,通过该语音信号中的唤醒词,触发语音识别应用识别出该语音指令,同时,触发对用户的鉴权,并在鉴权成功后执行该语音指令。简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
下面示例性的以人脸认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以接收到用户的语音信号,其中,用户的语音信号中包括有预设的唤醒词,该预设的唤醒词也对应有语音指令。在电子设备100接收到用户的语音信号时,电子设备100可以判断用户的语音信号中是否包括有预设的唤醒词,若是,则电子设备100可以触发语音识别应用检测该语音信号中的语音指令,同时,触发人脸解锁。在人脸解锁成功后,电子设备100可以执行该语音指令。
示例性的,如图12A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以通过麦克风采集用户的语音信号(例如,该语音信号中包括有文本信息“打开微信付款界面”)。电子设备100在采集到用户的语音信号后,电子设备100可以判断用户的语音信号中是否有预设的唤醒词(例如,“微信付款”),若有,则电子设备100可以触发语音识别应用检测该语音信号中的语音指令,同时,触发电子设备100可以采集用户的人脸信息。
如图12B所示,电子设备100在判定出用户的语音信号中包括有预设的唤醒词时,电子设备100触发语音识别应用检测该用户的语音信号中的语音指令。同时,电子设备100可以亮屏显示锁屏界面1210,并采集人脸信息。
在一种可能的实现方式中,当电子设备100采集人脸信息时,电子设备100可以输出人脸识别提示1211,用于提示用户正在进行人脸识别。电子设备100在采集到人脸信息后,可 以将人脸信息与已存储的人脸信息模板进行匹配。具体实现中,电子设备100可以在开启人脸识别模块后,不输出上述人脸识别提示1211。
其中,在识别出语音指令后,电子设备100可以输出指令提示1212(例如,文字提示“识别到指令‘显示微信付款界面’”)。具体实现中,电子设备100也可以不显示该指令提示1212。
在一种可能的实现方式中,电子设备100可以先识别出用户语音信号中的语音指令,后判定出处理后的人脸信息与已存储的人脸信息模板相匹配。在该种情况下,电子设备100可以解锁并直接执行该语音指令对应的操作。
示例性的,如图12C所示,在判定出处理后的人脸信息与人脸信息模板相匹配之后,电子设备100可以输出人脸识别成功提示1213。
如图12D所示,在电子设备100输出人脸识别成功提示1213一段时间(例如0.5秒)后,电子设备可以执行用户语音信号中的语音指令,例如,显示微信付款界面1230。
具体实现中,在识别出语音指令后,电子设备100可以不输出指令提示1212,等人脸识别成功后,直接解锁执行语音指令对应的操作。在判定出处理后的人脸信息与已存储的人脸信息模板相匹配后,电子设备100可以不输出图12C所示的人脸识别成功提示1213,而直接解锁执行语音指令对应的操作。例如,直接解锁屏幕显示如图12D所示的微信付款界面1220。
下面示例性的以指纹认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在一些实施例中,在电子设备100处于锁屏的状态下,电子设备100可以接收到用户的语音信号,其中,用户的语音信号中包括有预设的唤醒词,该预设的唤醒词也对应有语音指令。在电子设备100接收到用户的语音信号时,电子设备100可以判断用户的语音信号中是否包括有预设的唤醒词,若是,则电子设备100可以触发语音识别应用检测该语音信号中的语音指令,同时,触发指纹解锁。在指纹解锁成功后,电子设备100可以执行该语音指令。
示例性的,如图13A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以通过麦克风采集用户的语音信号(例如,该语音信号中包括有文本信息“打开微信付款界面”)。电子设备100在采集到用户的语音信号后,电子设备100可以判断用户的语音信号中是否有预设的唤醒词(例如,“微信付款”),若有,则电子设备100可以触发语音识别应用检测该用户的语音信号中的语音指令,同时,触发电子设备100可以采集用户的指纹信息。
示例性的,如图13B所示,电子设备100在判定出用户的语音信号中包括有唤醒词时,触发语音识别应用检测该用户的语音信号中的语音指令。同时,电子设备100可以亮屏显示锁屏界面1310,并采集用户的指纹信息。若指纹采集模块设置在触控屏下方与触控屏耦合时,在开启指纹采集模块后,电子设备100可以输出指纹识别图标1311,用于提示用户输入指纹信息。电子设备100在采集到指纹信息后,可以将采集到的指纹信息与已存储的指纹信息模板进行匹配。
在本申请实施例中,指纹采集模块也可以外置在电子设备100上,在电子设备100在判定出用户的语音信号中包括有唤醒词时,电子设备100可以通过外置的指纹采集模块采集用户的指纹信息,此时,可以不用显示上述指纹识别图标1311。
在一种可能的实现方式中,电子设备100可以先检测出用户语音信号中的语音指令,后判定出处理后的指纹信息与已存储的指纹信息模板相匹配。在该种情况下,电子设备100可以直接解锁并执行该语音指令对应的操作(例如显示微信付款界面)。
示例性的,如图13B所示,电子设备100在通过语音识别应用检测出语音指令后,电子设备100可以输出指令提示1312(例如,文字提示“识别到指令‘显示微信付款界面’”)。在语音识别应用检测出语音指令后,电子设备100可以采集到用户的指纹信息。具体实现中,在语音识别应用检测出语音指令后,电子设备100可以不输出指令提示1312,等指纹识别成功后,直接解锁屏幕执行语音指令。
如图13C所示,在判定出采集到的指纹信息与已存储的指纹信息模板匹配后,电子设备100可以解锁并执行用户语音信号中的语音指令对应的操作,例如,显示微信付款界面1320。
下面示例性的以人脸认证的鉴权方式,具体介绍本应用场景下的一种语音控制方法。
在电子设备100处于锁屏的状态下,电子设备100可以接收到用户的语音信号,其中,用户的语音信号中即包括有预设的唤醒词,该预设的唤醒词也对应有语音指令。在电子设备100接收到用户的语音信号时,电子设备100可以判断用户的语音信号中是否包括有预设的唤醒词,若是,则电子设备100可以触发语音识别应用检测该用户的语音信号中的语音指令,同时,触发显示密码解锁界面。在用户输入密码,解锁成功后,电子设备100可以执行该语音指令。
示例性的,示例性的,如图14A所示,电子设备100处于灭屏且锁屏状态。
在电子设备100处于灭屏且锁屏状态下,电子设备100可以通过麦克风采集用户的语音信号(例如,该语音信号中包括有文本信息“打开微信付款界面”)。电子设备100在采集到用户的语音信号后,电子设备100可以判断用户的语音信号中是否有预设的唤醒词(例如,“微信付款”),若有,则电子设备100可以触发语音识别应用检测语音信号中的语音指令,同时,触发电子设备100可以显示密码解锁界面。
如图14B所示,电子设备100在判定出用户的语音信号中包括有预设的唤醒词时,电子设备100可以触发语音识别应用检测用户的语音信号中的语音指令。同时,电子设备100可以亮屏显示解锁界面1410。其中,该密码解锁界面1410可以包括有虚拟数字键盘1411、密码输入框1412、紧急呼叫按钮1413和删除按钮1414。虚拟数字键盘1411用于接收用户的输入,在密码输入框1412中填入密码。密码输入框1412用于提示用户输入指定位数(例如6位数)的密码,其中,当用户每输入一个数时,密码输入框1412都会提示用户已输入一个数,当用户输入完指定位数的密码后,电子设备100可以判断用户输入的指定位数的密码是否与已存储的密码模板匹配,当匹配成功,则电子设备100解锁成功。
若电子设备100通过语音识别应用检测出用户语音信号中的语音指令后,电子设备100才判定出处理后的人脸信息与已存储的人脸信息模板匹配成功,则电子设备100可以解锁并执行该语音指令对应的操作。
其中,在一种可能的实现方式中,在语音识别应用检测出语音指令后,电子设备100可以输出指令提示1415(例如,文字提示“识别到指令‘显示微信付款界面’”)。
如图14C所示,在电子设备100检测出语音指令(例如显示微信付款界面)后,电子设备100才接收到用户输入完指定位数的密码。电子设备100可以判断用户输入的指定位数的密码是否与已存储的密码模板匹配,若匹配,则电子设备100可以解锁屏幕并执行该语音指令对应的操作。
如图14D所示,在电子设备100检测出语音指令为“显示微信付款界面”,且判定用户输入的指定位数的密码与已存储的密码模板相匹配后,电子设备100可以解锁并显示微信付款 界面1420。
具体实现中,在检测出语音指令后,电子设备100可以不输出指令提示1415,等密码匹配成功后,直接解锁屏幕执行语音指令。
其中,密码认证解锁可以包括文字密码解锁和图案密码解锁。关于图案密码解锁的内容可以参考前述实施例,在此不再赘述。
在本申请的实施例中,电子设备100可以通过用户输入的既包括唤醒词又包括语音指令的语音信号,触发多种身份认证解锁,例如,可以同时触发人脸认证解锁和指纹认证解锁。不限于此,电子设备100在通过用户输入的唤醒词,唤醒语音助手时,还可以同时触发人脸认证解锁和密码认证解锁,或者,同时触发指纹认证解锁和密码认证解锁,或者,同时触发人脸认证解锁、指纹解锁和密码认证解锁。当触发多种身份认证解锁时,任一种身份认证解锁成功,电子设备100即可执行该语音指令对应的操作。
其中,当电子设备100被设置有多种解锁方式(例如人脸认证解锁、指纹认证解锁、密码认证解锁)时,电子设备100可以优先触发人脸认证解锁和指纹认证解锁,当认证失败时,再触发密码认证解锁(例如,文字密码认证解锁或者图案密码解锁)。
请参见图15,图15为本申请实施例提供的一种语音控制方法。该方法包括如下步骤:
S1501、电子设备处于锁屏状态,检测到第一操作。
S1502、响应于第一操作,触发对用户的鉴权,并触发语音识别应用检测语音指令。
其中,电子设备可以响应于该第一操作,触发对用户的鉴权,同时,响应于该第一操作,触发语音识别应用检测语音指令。例如,电子设备检测到用户的抬起操作时,触发对用户的人脸认证,同时,电子设备在检测到该抬起操作时,触发语音识别应用检测用户输入的语音指令。例如,第一操作可以上述图3B所示实施例中的抬起操作,等等。具体内容可以参考其他实施例,在此不再赘述。
其中,电子设备可以响应于该第一操作,触发对用户的鉴权。在电子设备检测到开始对用户的鉴权时,电子设备可以触发语音识别应用检测语音指令。例如,电子设备检测到用户的抬起操作时,触发对用户的人脸认证。在电子设备检测到开启人脸识别后,电子设备可以触发语音识别应用检测用户输入的语音指令。例如,第一操作可以是上述图5A所示实施例中针对电源键501的单击操作,等等。具体内容可以参考其他实施例,在此不再赘述。
其中,电子设备可以响应于该第一操作,触发对用户的鉴权,在电子设备对用户鉴权成功时,解锁并触发语音识别应用检测用户输入的语音指令。例如,电子设备检测到用户的抬起操作时,触发对用户的人脸认证。在电子设备对用户的人脸认证成功后,电子设备可以触发语音识别应用检测用户输入的语音指令。例如,第一操作可以是上述图7B所示实施例中针对解锁触发区域711的滑动操作,等等。
S1503、当电子设备的语音识别应用检测到语音指令且鉴权成功时,解锁并执行语音指令对应的操作。
在一种可能的实现方式中,当电子设备触发语音识别应用检测语音指令后指定时间(例如5秒)内未检测语音指令,则电子设备可以关闭该语音识别应用。其中,电子设备运行和关闭语音识别应用都可以在后台运行,让用户无感知。
在一种可能的实现方式中,当电子设备对用户的鉴权失败时,电子设备输出第一提示, 用于提示用户再次触发电子设备对应用户的鉴权。用户可以再次输入鉴权信息,电子设备可以再次验证用户输入的鉴权信息,当电子设备对用户鉴权成功,电子设备可以执行该语音指令对应的操作。这样,在用户输入错误的鉴权信息时,可以提醒用户再次输入,增加了用户输入操作的容错性。
在一些实施例中,第一操作可以包含有预设唤醒词的唤醒语音。电子设备可以响应于检测到预设唤醒词的唤醒语音,触发对用户的鉴权,并触发所述语音识别应用检测语音指令。例如,用户的唤醒词可以是上述图9A或图10A或图11A所示实施例中的“小艺小艺”,等等。其中,鉴权方式包括:人脸认证、指纹认证、密码认证等。不限上述方式,鉴权还可以是声纹认证等。具体内容未详尽的部分,可以参考前述实施例,在此不再赘述。
在一些实施例中,电子设备处于锁屏状态时,可以采集用户的语音信号。其中,语音信号包括唤醒词,该唤醒词对应有语音指令,该语音指令用于请求所述电子设备执行所述语音指令对应操作。当电子设备从该语音信号中检测到唤醒词时,触发开启语音识别应用,并且触发对用户的鉴权。在用户的鉴权成功后,电子设备的语音识别应用执行语音指令对应的操作。例如,该对应有语音指令的唤醒词可以是上述图12A或图13A或图14A所示实施例中的“打开微信付款界面”,等等。这样,电子设备可以只需在用户说出对应有语音指令的唤醒词时,就可以触发解锁,并在解锁完成之后,执行该语音指令。简化了用户语音控制的操作,实现一呼服务直达。具体内容未详尽的部分,可以参考前述实施例,在此不再赘述。
通过本申请实施例提供的一种语音控制方法,可以在电子设备处于锁屏状态下,响应于接收到的用户操作,对用户进行身份认证,同时,触发语音识别应用检测用户输入的语音指令。在电子设备解锁且语音识别应用检测到语音指令后,可以安全地执行检测出的语音指令。这样,电子设备可以在锁屏状态下,通过一个操作,触发鉴权认证解锁和语音识别应用检测语音指令,并在解锁成功且检测到语音指令后执行该语音指令对应的操作,简化了用户通过语音控制电子设备时的操作步骤,节省了用户操作时间。
请参见图16,图16为本申请提供的一种电子设备的架构示意图。如图16所示,电子设备1600包括:解锁操作检测模块1601、解锁模块1602、语音指令识别模块1603、语音指令执行模块1604。
解锁操作检测模块1601,可用于检测用户触发鉴权解锁(例如人脸认证解锁、指纹认证解锁、密码认证解锁)的操作。例如,触发鉴权解锁的操作可以上述图3B所示实施例中的抬起操作,或者上述图5A所示实施例中针对电源键501的单击操作,或者,上述图7B所示实施例中针对解锁触发区域711的滑动操作,等等。解锁模块1602,可用于响应于用户触发鉴权解锁的操作,对用户进行鉴权解锁。例如,鉴权解锁,包括上述人脸认证解锁、指纹认证解锁、密码认证解锁,等等。语音指令识别模块1603,可用于响应于用户触发鉴权解锁的操作,检测用户输入的语音指令。语音指令执行模块1604,可用于在解锁成功且检测到语音指令时,执行语音指令对应的操作。例如,该语音指令对应的操作可以是显示上述图3D或图4C或图5D或图6C或图7E或图8C所示实施例中的微信付款界面,等等。
本申请实施中未详述的部分,可以参考其他实施例,在此不再赘述。
请参见图17,图17为本申请提供的一种电子设备的架构示意图。如图17所示,电子设备1700包括:唤醒词检测模块1701、解锁模块1702、语音指令识别模块1703、语音指令执行模块1704。
唤醒词检测模块1701,可用于检测用户输入的唤醒词。例如,用户的唤醒词可以是上述图9A或图10A或图11A所示实施例中的“小艺小艺”,等等。解锁模块1702,可用于在唤醒词检测模块1701检测到用户输入的唤醒词时,对用户进行鉴权解锁。例如,鉴权解锁,包括上述人脸认证解锁、指纹认证解锁、密码认证解锁,等等。语音指令识别模块1703,可用于在唤醒词检测模块1701检测到用户输入的唤醒词时,检测用户输入的语音指令。语音指令执行模块1704,可用于在解锁成功且检测到语音指令时,执行语音指令对应的操作。例如,该语音指令对应的操作可以是显示上述图9D或图10D或图11D所示实施例中的微信付款界面,等等。
本申请实施中未详述的部分,可以参考其他实施例,在此不再赘述。
请参见图18,图18为本申请提供的一种电子设备的架构示意图。如图18所示,电子设备1800包括:语音热词检测模块1801、解锁模块1802、热词指令执行模块1803。
语音热词检测模块1801,可用于检测用户输入的语音热词(也即唤醒词),该语音热词对应有语音指令。其中,语音热词可以是上述图12A或图13A或图14A所示实施例中的“打开微信付款界面”,等等。解锁模块1802可用于在语音热词检测模块1801检测到用户输入的语音热词时,对用户进行鉴权解锁。例如,鉴权解锁,包括上述人脸认证解锁、指纹认证解锁、密码认证解锁,等等。热词指令执行模块1803用于在解锁成功时,执行该语音热词对应的语音指令。例如,该语音指令对应的操作可以是显示上述图12D或图13C或图14D所示的微信付款界面,等等。
本申请实施中未详述的部分,可以参考其他实施例,在此不再赘述。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。
Claims (17)
- 一种语音控制方法,其特征在于,包括:电子设备处于锁屏状态,检测到第一操作;响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令;当所述电子设备的语音识别应用检测到所述语音指令,并且鉴权成功时,所述电子设备解锁并执行所述语音指令对应的操作。
- 根据权利要求1所述的方法,其特征在于,所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于所述第一操作,所述电子设备触发对用户的鉴权,同时,响应于所述第一操作,触发所述语音识别应用检测所述语音指令。
- 根据权利要求1所述的方法,其特征在于,所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于所述第一操作,所述电子设备触发对用户的鉴权;所述电子设备在检测到触发对用户的鉴权时,触发所述语音识别应用检测所述语音指令。
- 根据权利要求1所述的方法,其特征在于,所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于所述第一操作,所述电子设备触发对用户的鉴权;所述电子设备在鉴权成功时,触发所述语音识别应用检测所述语音指令;所述当所述电子设备的语音识别应用检测到所述语音指令,并且鉴权成功时,所述电子设备解锁并执行语音指令对应的操作,具体包括:当所述鉴权成功时,所述电子设备解锁;在所述电子设备解锁后,所述语音识别应用检测到所述语音指令时,所述电子设备执行所述语音指令对应的操作。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当所述电子设备触发所述语音识别应用检测语音指令后指定时间内未检测到所述语音指令,所述电子设备关闭所述语音识别应用。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当所述电子设备对用户的鉴权失败时,所述电子设备输出第一提示,用于提示用户再次触发所述电子设备对用户的鉴权。
- 根据权利要求1所述的方法,其特征在于,所述第一操作包括抬起操作;所述电子设备触发对用户的鉴权,具体包括:所述电子设备触发对用户的人脸认证;所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于所述抬起操作,所述电子设备触发对用户的人脸认证,并触发所述语音识别应用检测语音指令。
- 根据权利要求1所述的方法,其特征在于,所述第一操作包括触发显示指纹识别图标的操作;所述电子设备触发对用户的鉴权,具体包括:所述电子设备触发对用户的指纹认证;所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发所述语音识别应用检测语音指令,具体包括:响应于所述触发显示指纹识别图标的操作,所述电子设备触发对用户的指纹认证,并触发所述语音识别应用检测语音指令。
- 根据权利要求1所述的方法,其特征在于,所述第一操作包括触发显示密码解锁界面的操作;所述电子设备触发对用户的鉴权,具体包括:所述电子设备触发对用户的密码认证;所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于所述触发显示密码解锁界面的操作,所述电子设备触发对用户的密码认证,并触发所述语音识别应用检测语音指令。
- 根据权利要求1所述的方法,其特征在于,所述第一操作包括含有预设唤醒词的唤醒语音;所述响应于所述第一操作,所述电子设备触发对用户的鉴权,并触发语音识别应用检测语音指令,具体包括:响应于检测到所述预设唤醒词的唤醒语音,所述电子设备触发对用户的鉴权,并触发所述语音识别应用检测语音指令。
- 根据权利要求10所述的方法,其特征在于,所述电子设备触发对用户的鉴权,具体包括:所述电子设备触发对用户的人脸认证;和/或,所述电子设备触发对用户的指纹认证;和/或,所述电子设备触发对用户的密码认证。
- 一种语音控制方法,其特征在于,包括:电子设备处于锁屏状态时,采集用户的语音信号;其中,所述语音信号包括唤醒词,所述唤醒词对应有语音指令,所述语音指令用于请求所述电子设备执行所述语音指令对应操作;当所述电子设备从所述语音信号中检测到唤醒词时,触发开启语音识别应用,并且触发对所述用户的鉴权;在用户的鉴权成功后,所述电子设备的语音识别应用执行所述语音指令对应的操作。
- 根据权利要求12所述的方法,其特征在于,所述方法还包括:当所述电子设备鉴权失败时,所述电子设备输出第一提示,用于提示用户再次触发所述电子设备对用户鉴权。
- 根据权利要求12所述的方法,其特征在于,所述电子设备触发对用户的鉴权,具体包括:所述电子设备触发对用户的人脸认证;和/或,所述电子设备触发对用户的指纹认证;和/或,所述电子设备触发对用户的密码认证。
- 一种电子设备,其特征在于,包括:存储器和至少一个处理器;所述存储器与所述一个或多个处理器耦合,所述存储用于存储计算机程序代码,所述计算机程序代码包括计算机指令,当所述一个或多个处理器执行所述计算机指令时,使得所述电子设备执行权利要求1-14任一项所述的方法。
- 一种计算机存储介质,其特征在于,包括:计算机指令;当所述计算机指令在电子设备上运行时,使得所述电子设备执行权利要求1-14任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在电子设备上运行时,使得所述电子设备执行权利要求1-14任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/623,122 US20220269762A1 (en) | 2019-06-29 | 2020-06-29 | Voice control method and related apparatus |
EP20835325.0A EP3968144A4 (en) | 2019-06-29 | 2020-06-29 | VOICE CONTROL METHOD AND RELATED DEVICE |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910581559.0A CN110362290A (zh) | 2019-06-29 | 2019-06-29 | 一种语音控制方法及相关装置 |
CN201910581559.0 | 2019-06-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021000814A1 true WO2021000814A1 (zh) | 2021-01-07 |
Family
ID=68217237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/098707 WO2021000814A1 (zh) | 2019-06-29 | 2020-06-29 | 一种语音控制方法及相关装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220269762A1 (zh) |
EP (1) | EP3968144A4 (zh) |
CN (1) | CN110362290A (zh) |
WO (1) | WO2021000814A1 (zh) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110362290A (zh) * | 2019-06-29 | 2019-10-22 | 华为技术有限公司 | 一种语音控制方法及相关装置 |
CN111128149B (zh) * | 2019-11-20 | 2022-11-11 | 北京小米移动软件有限公司 | 语音采集控制装置及方法 |
CN110932949A (zh) * | 2019-12-04 | 2020-03-27 | 北京小米移动软件有限公司 | 语音控制装置和控制方法 |
CN111292742A (zh) * | 2020-01-14 | 2020-06-16 | 京东数字科技控股有限公司 | 数据处理方法、装置、电子设备和计算机存储介质 |
CN111553706A (zh) * | 2020-07-10 | 2020-08-18 | 支付宝(杭州)信息技术有限公司 | 一种刷脸支付方法、装置及设备 |
CN114125143B (zh) * | 2020-08-31 | 2023-04-07 | 华为技术有限公司 | 一种语音交互方法及电子设备 |
CN112164395A (zh) * | 2020-09-18 | 2021-01-01 | 北京百度网讯科技有限公司 | 车载语音启动方法、装置、电子设备和存储介质 |
US11676594B2 (en) * | 2020-12-03 | 2023-06-13 | Google Llc | Decaying automated speech recognition processing results |
US12118790B2 (en) | 2021-04-21 | 2024-10-15 | Meta Platforms, Inc. | Auto-capture of interesting moments by assistant systems |
US11861315B2 (en) | 2021-04-21 | 2024-01-02 | Meta Platforms, Inc. | Continuous learning for natural-language understanding models for assistant systems |
CN113220196B (zh) * | 2021-04-30 | 2022-03-11 | 深圳掌酷软件有限公司 | 一种息屏状态下指定应用的唤醒方法 |
CN113808584B (zh) * | 2021-07-29 | 2024-07-26 | 杭州逗酷软件科技有限公司 | 语音唤醒方法、装置、电子设备及存储介质 |
CN114157522A (zh) * | 2021-10-20 | 2022-03-08 | 深圳市银众信息技术有限公司 | 一种物联网智能设备终端安全控制方法及系统 |
US20230297484A1 (en) * | 2022-03-17 | 2023-09-21 | International Business Machines Corporation | Predicting target applications |
CN115022452B (zh) * | 2022-06-13 | 2024-04-02 | 浙江地芯引力科技有限公司 | 音频设备的通信方法、装置、设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103595869A (zh) * | 2013-11-15 | 2014-02-19 | 华为终端有限公司 | 一种终端语音控制方法、装置及终端 |
CN105224850A (zh) * | 2015-10-24 | 2016-01-06 | 北京进化者机器人科技有限公司 | 组合鉴权方法及智能交互系统 |
CN107644645A (zh) * | 2017-09-29 | 2018-01-30 | 联想(北京)有限公司 | 一种语音控制方法、装置及电子设备 |
CN109325337A (zh) * | 2018-11-05 | 2019-02-12 | 北京小米移动软件有限公司 | 解锁方法及装置 |
CN110362290A (zh) * | 2019-06-29 | 2019-10-22 | 华为技术有限公司 | 一种语音控制方法及相关装置 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103677644B (zh) * | 2013-12-25 | 2016-08-03 | 北京航空航天大学 | 一种智能移动终端的解锁方法及系统 |
KR102208477B1 (ko) * | 2014-06-30 | 2021-01-27 | 삼성전자주식회사 | 마이크 운용 방법 및 이를 지원하는 전자 장치 |
CN105425945A (zh) * | 2015-11-02 | 2016-03-23 | 深圳奥比中光科技有限公司 | 解锁处理方法、系统、解锁控制系统以及显示设备 |
CN106599660A (zh) * | 2016-12-02 | 2017-04-26 | 宇龙计算机通信科技(深圳)有限公司 | 终端安全验证方法及装置 |
US11314898B2 (en) * | 2017-02-28 | 2022-04-26 | Samsung Electronics Co., Ltd. | Operating method of electronic device for function execution based on voice command in locked state and electronic device supporting the same |
CN107257410A (zh) * | 2017-06-06 | 2017-10-17 | 珠海格力电器股份有限公司 | 一种屏幕解锁方法、装置及电子设备 |
CN108513706A (zh) * | 2018-04-12 | 2018-09-07 | 深圳阜时科技有限公司 | 电子设备及其面部识别方法 |
CN112561537A (zh) * | 2018-06-03 | 2021-03-26 | 苹果公司 | 用于转账账户的用户界面 |
US12026240B2 (en) * | 2019-02-21 | 2024-07-02 | Microsoft Technology Licensing, Llc | Delegated authentication systems and techniques |
-
2019
- 2019-06-29 CN CN201910581559.0A patent/CN110362290A/zh active Pending
-
2020
- 2020-06-29 EP EP20835325.0A patent/EP3968144A4/en active Pending
- 2020-06-29 US US17/623,122 patent/US20220269762A1/en active Pending
- 2020-06-29 WO PCT/CN2020/098707 patent/WO2021000814A1/zh unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103595869A (zh) * | 2013-11-15 | 2014-02-19 | 华为终端有限公司 | 一种终端语音控制方法、装置及终端 |
CN105224850A (zh) * | 2015-10-24 | 2016-01-06 | 北京进化者机器人科技有限公司 | 组合鉴权方法及智能交互系统 |
CN107644645A (zh) * | 2017-09-29 | 2018-01-30 | 联想(北京)有限公司 | 一种语音控制方法、装置及电子设备 |
CN109325337A (zh) * | 2018-11-05 | 2019-02-12 | 北京小米移动软件有限公司 | 解锁方法及装置 |
CN110362290A (zh) * | 2019-06-29 | 2019-10-22 | 华为技术有限公司 | 一种语音控制方法及相关装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3968144A4 |
Also Published As
Publication number | Publication date |
---|---|
US20220269762A1 (en) | 2022-08-25 |
EP3968144A4 (en) | 2022-07-20 |
EP3968144A1 (en) | 2022-03-16 |
CN110362290A (zh) | 2019-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021000814A1 (zh) | 一种语音控制方法及相关装置 | |
US9547760B2 (en) | Method and system for authenticating user of a mobile device via hybrid biometics information | |
WO2020020063A1 (zh) | 对象识别方法及移动终端 | |
CN111699528A (zh) | 电子装置及执行电子装置的功能的方法 | |
WO2021135685A1 (zh) | 身份认证的方法以及装置 | |
WO2021008538A1 (zh) | 语音交互方法及相关装置 | |
EP3855716B1 (en) | Audio control method and electronic device | |
WO2021115424A1 (zh) | 一种语音支付方法和电子设备 | |
CN110602309A (zh) | 设备解锁方法、系统和相关设备 | |
US11281758B2 (en) | Systems for fingerprint sensor triggered voice interaction in an electronic device | |
CN115312068B (zh) | 语音控制方法、设备及存储介质 | |
CN111477225A (zh) | 语音控制方法、装置、电子设备及存储介质 | |
WO2022042274A1 (zh) | 一种语音交互方法及电子设备 | |
WO2022227507A1 (zh) | 唤醒程度识别模型训练方法及语音唤醒程度获取方法 | |
CN115083401A (zh) | 语音控制方法及装置 | |
CN109670836A (zh) | 账户验证方法、设备、装置及计算机可读存储介质 | |
CN114333774B (zh) | 语音识别方法、装置、计算机设备及存储介质 | |
CN111341307A (zh) | 语音识别方法、装置、电子设备及存储介质 | |
CN115116437B (zh) | 语音识别方法、装置、计算机设备、存储介质及产品 | |
WO2022088963A1 (zh) | 一种电子设备解锁方法和装置 | |
CN116956814A (zh) | 标点预测方法、装置、设备及存储介质 | |
CN117153166B (zh) | 语音唤醒方法、设备及存储介质 | |
WO2022233239A1 (zh) | 一种升级方法、装置及电子设备 | |
US20240134947A1 (en) | Access control method and related apparatus | |
CN116312566A (zh) | 一种声纹识别的方法及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20835325 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020835325 Country of ref document: EP Effective date: 20211208 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |