CN112118348A - Control method and control system for electronic equipment, electronic equipment and storage device - Google Patents

Control method and control system for electronic equipment, electronic equipment and storage device Download PDF

Info

Publication number
CN112118348A
CN112118348A CN201910539275.5A CN201910539275A CN112118348A CN 112118348 A CN112118348 A CN 112118348A CN 201910539275 A CN201910539275 A CN 201910539275A CN 112118348 A CN112118348 A CN 112118348A
Authority
CN
China
Prior art keywords
user
electronic device
control instruction
information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910539275.5A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201910539275.5A priority Critical patent/CN112118348A/en
Publication of CN112118348A publication Critical patent/CN112118348A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Acoustics & Sound (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a control method and a control system of electronic equipment, the electronic equipment and a storage device, wherein the control method of the electronic equipment comprises the following steps: the electronic equipment receives a control instruction of a user, wherein the control instruction comprises identification information of the user; judging whether the identification information of the user is consistent with preset identification information or not; and if so, executing the operation corresponding to the control instruction. By the method, the electronic equipment can be operated when a user inconveniently touches the electronic equipment with hands.

Description

Control method and control system for electronic equipment, electronic equipment and storage device
Technical Field
The present invention relates to the field of electronic device control technologies, and in particular, to a control method and a control system for an electronic device, and a storage device.
Background
With the progress of science and technology, the development of electronic devices brings convenience to human life, and therefore, it is an important task to make the operation and control of electronic devices more humanized and convenient.
Taking a mobile phone as an example, when the mobile phone needs to be used, a situation that a user is inconvenient to use fingers may exist, for example, when the user washes dishes and hands, the user cannot use fingerprints to unlock or input passwords to unlock, and further cannot make or receive calls or use other operations using the mobile phone, and at this time, the user needs to unlock or use the mobile phone in other ways.
Disclosure of Invention
The invention mainly solves the technical problem of how to control the electronic equipment so that a user can operate the electronic equipment when the user is inconvenient to touch the electronic equipment with hands.
In order to solve the above technical problem, one technical solution adopted by the present invention is to provide a method for controlling an electronic device, where the method includes: the electronic equipment receives a control instruction of a user, wherein the control instruction comprises identification information of the user; judging whether the identification information of the user is consistent with preset identification information or not; and if so, executing the operation corresponding to the control instruction.
The control instruction comprises an unlocking instruction, and the identification information comprises key content information; the judging whether the identification information of the user conforms to the preset identification information includes: and judging whether the key content information conforms to preset key content information.
The key content information comprises voice information and/or image information, and the voice information is voice recognition content of the control instruction.
The identity identification information further comprises user biological information, and the electronic equipment is provided with a normal use mode and a temporary use mode; after the performing an operation corresponding to the control instruction, the method further includes: judging whether the user biological information of the user is consistent with preset user biological information or not; if the data are consistent with the preset data, entering the normal use mode; and if not, entering the temporary use mode.
Wherein the user biometric information comprises an audio feature of the control instruction.
The control instruction comprises a voice communication instruction, wherein the voice communication instruction comprises a voice call and/or a voice call; and/or the user's control instructions are sent by the wearable device.
In order to solve the technical problem, another technical solution adopted by the present invention is to provide a control system of an electronic device, including the electronic device and a wearable device connected with each other; the wearable device is to: receiving a control instruction input by a user and forwarding the control instruction to the electronic equipment, wherein the control instruction comprises identification information of the user; the electronic device is configured to: receiving the control instruction forwarded by the wearable device, and judging whether the identity identification information conforms to preset identity identification information; and if so, executing the operation corresponding to the control instruction.
In order to solve the technical problem, another technical solution adopted by the present invention is to provide a control system of an electronic device, including the electronic device and a wearable device connected with each other; the wearable device is to: receiving a connection instruction input by a user, and forwarding the connection instruction to the electronic equipment to form connection with the electronic equipment, wherein the connection instruction comprises identification information of the user; after the electronic equipment is connected, receiving a control instruction input by a user and forwarding the control instruction to the electronic equipment; the electronic device is configured to: receiving the connection instruction forwarded by the wearable device, and judging whether the identity identification information conforms to preset identity identification information; if the data match, connecting the wearable device; and after the wearable device is connected, receiving the control instruction forwarded by the wearable device, and executing an operation corresponding to the control instruction.
In order to solve the above technical problem, another technical solution adopted by the present invention is to provide an electronic device, including a communication circuit, a memory and a processor coupled to each other; the communication circuit is used for receiving a control instruction of a user; the memory is used for storing program data; the processor executing the program data for implementing the method as described above; or, the electronic device is an electronic device in the control system.
In order to solve the above technical problem, another technical solution adopted by the present invention is to provide a storage device, which stores program data that can be executed to implement the method according to any one of the above.
The invention has the beneficial effects that: different from the prior art, the control instruction of the user is received through the electronic equipment, because the control instruction comprises the identification information of the user, the electronic equipment judges whether the identification information of the user in the control instruction conforms to the preset identification information, and after the electronic equipment judges that the identification information of the user in the control instruction conforms to the preset identification information, the electronic equipment can execute the operation corresponding to the control instruction, so that the control on the electronic equipment can be realized, and the operation such as unlocking or using and the like can be performed on the electronic equipment when the user inconveniently contacts the electronic equipment with a hand.
Drawings
Fig. 1 is a schematic flowchart of a control method of an electronic device according to a first embodiment of the present invention;
fig. 2 is a schematic flowchart of a control method of an electronic device according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of a control method of an electronic device according to a third embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of a control system of an electronic device according to the present invention;
FIG. 5 is a schematic structural diagram of an embodiment of an electronic device provided in the present invention;
fig. 6 is a schematic structural diagram of an embodiment of a memory device provided in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a control method of an electronic device according to a first embodiment of the present invention. The control method of the electronic device in the embodiment includes:
step S101: the electronic equipment receives a control instruction of a user, wherein the control instruction comprises identification information of the user.
The electronic device of the application can be an electronic device capable of performing voice or video communication, for example, an intelligent terminal such as a desktop computer, a smart phone, a tablet computer, a notebook computer, a mobile internet device or a wearable device. It can be understood that, when the electronic device is used in daily life, the user may be inconvenient to directly contact the electronic device, and at this time, most of the control instructions cannot be sent to the electronic device, so that the electronic device is inconvenient to use; taking an electronic device as an example of a smart phone, when a user is washing vegetables or hands, a voice communication request is just sent, and since the hands of the user are occupied or wet, the user cannot directly contact the smart phone, the user is difficult to operate the smart phone to connect the voice communication. Therefore, the control instruction of the user received by the electronic device of the present application is sent by the user without directly contacting the electronic device, for example, the user sends a section of voice control instruction, and the electronic device can receive the voice control instruction through the sound collection device provided therein. In addition, in order to ensure the safety of the electronic device, the electronic device should be prevented from being operated or used after being acquired by another person, the control command of the user should include the identification information of the user, and the electronic device needs to determine whether the user has the control authority to control the electronic device after receiving the control command of the user, that is, the method of the following step S102 is executed.
Step S102: and judging whether the identification information of the user is consistent with the preset identification information. If yes, go to step S103, otherwise, indicate that the user cannot control the electronic device, and the process ends.
It can be understood that, the user prestores the identification information corresponding to the user having the control authority of the electronic device in the electronic device, that is, the electronic device stores preset identification information, after the electronic device receives the control instruction of the user, the identification information of the user in the control instruction can be compared with the preset identification information, and then whether the received identification information of the user is consistent with the preset identification information is judged.
Step S103: and if so, executing the operation corresponding to the control instruction.
In the application, after the electronic device determines that the identification information of the user in the received control instruction conforms to the preset identification information, it indicates that the current user has the control authority of the electronic device, and the electronic device can be controlled, and at this time, the electronic device can execute the operation corresponding to the control instruction.
In this embodiment, the control instruction of the user is received through the electronic device, and because the control instruction includes the identification information of the user, the electronic device determines whether the identification information of the user in the control instruction matches the preset identification information, and when the electronic device determines that the identification information of the user in the control instruction matches the preset identification information, the electronic device can execute the operation corresponding to the control instruction, and further can realize the control of the electronic device, so that the electronic device can be unlocked or used when the user inconveniently touches the electronic device with a hand.
Referring to fig. 2, fig. 2 is a flowchart illustrating a control method of an electronic device according to a second embodiment of the present invention. The control instruction of the present application includes an unlocking instruction, and the control method of the electronic device in the present embodiment includes:
step S201: the electronic equipment receives a control instruction of a user, wherein the control instruction comprises identification information of the user, and the identification information comprises key content information.
The control instruction comprises an unlocking instruction, the electronic device can execute unlocking operation after obtaining the unlocking instruction, the key content information can represent that the control instruction is identification content of the unlocking instruction, namely, only the operation instruction comprising the key content information is the unlocking instruction, and correspondingly, the electronic device can execute the unlocking operation only when receiving the control instruction comprising the key content information.
Step S202: and judging whether the key content information conforms to the preset key content information.
It can be understood that, the user stores in advance the key content information capable of indicating that the control instruction is the unlocking instruction in the electronic device, that is, the preset key content information is stored in the electronic device, and after the electronic device receives the control instruction of the user, the key content information in the user identification information of the control instruction may be compared with the preset key content information, so as to determine whether the key content information in the received user identification information matches with the preset key content information.
Step S203: and if so, executing the operation corresponding to the control instruction.
It can be understood that, when the electronic device determines that the key content information in the user identification information of the received control instruction matches the preset key content information, it indicates that the control instruction input by the user is an unlocking instruction, and the electronic device may be unlocked.
In this embodiment, when the electronic device has the key content information in the user identification information included in the received control instruction, the electronic device may unlock the electronic device even when the user is not convenient to touch the electronic device with a hand by determining whether the key content information matches the preset key content information and unlocking the electronic device after the key content information matches the preset key content information.
In an embodiment, the key content information of the present application includes voice information, and the voice information is voice recognition content of the control instruction. It is understood that the user may set the unlocking condition of the electronic device in advance, for example, to set: when a piece of voice information including special content is received, the electronic device may unlock. In a specific application scenario, the special content may be a string of numbers, a segment of chinese or english, or a combination of numbers, chinese and english; when the control instruction received by the electronic device includes the user identification information including the key content information, and the electronic device recognizes that the key content information includes a section of voice information, the section of voice information is the voice recognition content of the control instruction, so that the electronic device further judges whether the section of voice information recognized is the preset special content, if so, the electronic device receives a correct unlocking instruction, namely, the unlocking condition of receiving a section of voice information including the special content is met, the electronic device can unlock, and if not, the electronic device receives no unlocking instruction or an incorrect unlocking instruction, and the electronic device cannot unlock at this time.
In another embodiment, the key content information of the present application includes image information, which is image identification content of the control instruction. It can be understood that, the control instruction of the user received by the electronic device may also be a section of image control instruction sent by the user, and the electronic device may receive the image control instruction through an image acquisition device provided therein; at this time, the unlocking condition of the electronic device may also be set as: when an image message including special content is received, the electronic device can be unlocked. In a specific application scenario, the special content may be a specific gesture or expression; when the control instruction received by the electronic device includes the user identification information including the key content information, and the electronic device recognizes that the key content information includes an image information, the image information is the image identification content of the control instruction, so that the electronic device further determines whether the recognized image information is the preset special content, if so, the electronic device receives a correct unlocking instruction, namely, the electronic device meets the unlocking condition of receiving the image information including the special content, the electronic device can unlock, and if not, the electronic device receives no unlocking instruction or an incorrect unlocking instruction, and the electronic device cannot unlock at this time. It is understood that the image information as the image recognition content of the control instruction may also be a plurality of continuous or discontinuous pieces of image information, for example, image information of a temporarily generated expression or a combination sequence of other actions/objects such as a combined gesture, so as to prevent the electronic device from acquiring an incorrect control instruction due to an unintended action of the user, prevent the electronic device from being operated by mistake, or avoid the electronic device from being privately controlled after being copied by another person. In addition, in other embodiments, the key content information may also be included in other control instructions, for example, when the control instruction is to open or use some applications, such as payment-type applications or image-type applications, security/privacy issues may be involved, and careful opening is required, so that key content information with different security levels may be set for operations of opening or using different applications, and the key content information corresponding to the applications with higher security levels is more complex, for example, the opening expression or action complexity is higher.
In addition, in order to further prevent the electronic device from misoperation, after the electronic device receives a control instruction of a user, the electronic device may request the user to confirm whether the electronic device needs to perform a corresponding operation in a voice reminding manner, and after receiving confirmation information sent by the user, the electronic device performs the corresponding operation, where the confirmation information may be voice, expression, or gesture confirmation information of the user.
Referring to fig. 3, fig. 3 is a flowchart illustrating a control method of an electronic device according to a third embodiment of the present invention. The electronic equipment is provided with a normal use mode and a temporary use mode, and it can be understood that in the normal use mode, a user can check all contents in the electronic equipment, including contents preset by the user to be private and important, or control all operations of the electronic equipment, and correspondingly, in the temporary use mode, the user can only check partial contents in the electronic equipment, or control partial operations of the electronic equipment, such as only calling, and can not open information related to personal privacy of the user, such as short messages, pictures and the like. The control method of the electronic device in the embodiment includes:
step S301: the electronic equipment receives a control instruction of a user, wherein the control instruction comprises identification information of the user, and the identification information comprises secret key content information and user biological information.
Step S302: and judging whether the key content information conforms to the preset key content information.
Step S303: and if so, executing the operation corresponding to the control instruction.
In this implementation scenario, steps S301 to S303 provided in this embodiment are substantially similar to steps S201 to S203 in the second embodiment of the control method for an electronic device provided in this application, and are not described herein again.
Step S304: and judging whether the user biological information of the user is consistent with the preset user biological information. If the user biometric information of the user matches the preset user biometric information, step S305 is performed, and if the user biometric information of the user does not match the preset user biometric information, step S306 is performed.
It can be understood that, the user prestores the user biological information corresponding to the user who can normally use the electronic device in the electronic device, that is, the electronic device stores preset user biological information, and after the electronic device receives the control instruction of the user, the user biological information in the user identification information of the control instruction can be compared with the preset user biological information, so as to determine whether the user biological information in the received user identification information conforms to the preset user biological information.
Step S305: a normal use mode is entered.
Step S306: a temporary use mode is entered.
In a specific implementation scenario, the electronic device is a mobile phone, and when a user uses functions of a short message, a phonebook, a memo, an album, and the like in the mobile phone, the user may generate or store some important or private pieces of private information, and to avoid the private information being leaked, the user generally protects the private information appropriately, for example, the private information is hidden, and the private information can be displayed only when the mobile phone is in a normal use mode. Therefore, when the electronic equipment receives a control instruction of a user and judges that the key content information in the identification information of the user of the control instruction is consistent with the preset key content information, the electronic equipment is successfully unlocked; then, comparing the user biological information in the user identification information of the control instruction with preset user biological information, and when the user biological information of the current user is judged to be consistent with the preset user biological information, indicating that the current user is a user capable of normally using the electronic equipment, and then entering a normal use mode by the electronic equipment; and when the user biological information of the current user is judged to be inconsistent with the preset user biological information, the electronic equipment enters a temporary use mode if the current user does not belong to the user capable of normally using the electronic equipment. Therefore, when someone else wants to borrow the mobile phone of the user, even if the user notifies the key content information capable of indicating that the control instruction is the unlocking instruction, the someone else can only input the control instruction including the identification information of the user himself, and since the correct key content information and the wrong biometric information of the user are included in the identification information of the user himself, the someone else can only use the electronic device in the temporary use mode, and the someone else can be prevented from entering the normal use mode to acquire the personal information of the user himself when using the electronic device.
In this embodiment, the electronic device is provided with a normal use mode and a temporary use mode, and whether the user biological information of the user matches the preset user biological information is judged through the electronic device, the electronic device enters the normal use mode when the user biological information of the user matches the preset user biological information, and the electronic device enters the temporary use mode when the user biological information of the user does not match the preset user biological information, so that the user borrowing the electronic device can be prevented from entering the normal use mode and using the electronic device, the user who temporarily uses the electronic device can be prevented from acquiring the privacy information in the electronic device, and the information security of the electronic device is improved.
It can be understood that the electronic device needs to verify the identity of the user, and generally, the user biological information of the user can relatively accurately prove the identity of the user, so that the electronic device can acquire the user biological information of the user, and relatively accurately judge the identity of the user by judging whether the user biological information of the user is the preset biological information. In an embodiment, the user biometric information may include audio features of the control instructions. The audio characteristics of the control instructions include at least one of loudness, frequency, and pitch of the sound; when the electronic equipment receives that the control instruction of the user is a voice control instruction, the electronic equipment firstly analyzes the voice content of the control instruction to obtain the audio characteristics in the control instruction of the user; then, comparing the audio features obtained by analysis with audio features in preset user biological information, and judging whether the similarity between the audio features in the control instruction of the user and the audio features in the preset user biological information meets a preset threshold value, for example, the similarity is greater than 90% or not; when the similarity satisfies the preset threshold, it indicates that the user of the control instruction received by the electronic device is a user who can normally use the electronic device, that is, the user can use the electronic device in the normal use mode of the electronic device. In other embodiments, the user biometric information may also include avatar information of the control instruction, such as facial features or iris features. The electronic equipment scans and detects the facial features or iris features of a user by using the image acquisition device of the electronic equipment, and can be unlocked after the preset features are met.
In an embodiment, the control instruction of the present application may further include a voice communication instruction, where the voice communication instruction includes a voice call and/or a voice call. In a specific application scenario, the electronic device receives a control command from a user, for example, a sound collection device of the electronic device receives a command including "call: king a certain 'or' please dial: 139 … … ", and the voice includes identification information of the user, such as an audio feature of the control command, so that after the electronic device determines that the similarity between the audio feature of the control command and a preset audio feature satisfies a preset threshold, the electronic device can execute an operation corresponding to the control command, i.e. call a certain number in the king or dial a number" 139 … … ", thereby enabling the user to make a call by voice even when the user is inconvenient to touch the electronic device with a hand. In another specific application scenario, the electronic device has a voice communication request, at this time, the user sends a control instruction to the electronic device, the sound collection device of the electronic device receives a section of voice including "ABC please answer," where "ABC" included in the section of voice is the identification information of the user, and then after the electronic device determines that "ABC" matches the preset identification information, the electronic device can execute an operation corresponding to the control instruction, i.e., can put through the voice communication request, thereby realizing that the user can answer the call by voice also when the user is inconvenient to touch the electronic device with a hand.
In an embodiment, the control instruction of the user received by the electronic device may be transmitted through the wearable device. It can be understood that when the electronic device is far away from the user, the electronic device may not receive the control instruction sent by the user, for example, the received voice signal is too weak because of the far distance, or the electronic device may not collect the image information of the user due to the obstruction of the obstacle, so the electronic device may be controlled even if the user is far away from the electronic device by connecting the electronic device with the wearable device, then obtaining and collecting the control instruction sent by the user and including the voice information or the image information through the wearable device worn by the user, and then sending the control instruction to the electronic device by the wearable device. In a specific application scenario, when the key content information is the image content of the specific mouth of the user, if the electronic device directly receives the control instruction, the situation may occur that the user is far away from the electronic device, and the user actually speaks, but the electronic device only acquires the image information of the user, and at this time, if the control instruction is acquired through the wearable device close to the user, the wearable device may also acquire the voice information other than the image information, so that the control instruction of the user may be accurately acquired, thereby preventing the electronic device from being too far away from the user and causing information missing included in the control instruction received by the electronic device, and thus avoiding misoperation of the electronic device.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an embodiment of a control system of an electronic device according to the present invention. The control system of the electronic device of the present application includes an electronic device 40 and a wearable device 42 connected. In this embodiment, wearable device 42 is configured to: and receiving a control command input by the user and forwarding the control command to the electronic equipment 40, wherein the control command includes identification information of the user. The electronic device 40 is configured to: receiving a control instruction forwarded by wearable device 42, and determining whether the identification information matches preset identification information; and if so, executing the operation corresponding to the control instruction. For example, the electronic device 40 and the wearable device 42 are connected in advance through bluetooth, when a user needs to input a control instruction through voice to unlock or perform other operations on the electronic device 40, because the electronic device 40 is not around the user, at this time, the user can send the control instruction, the wearable device 42 worn by the user receives the control instruction, and then the wearable device 42 forwards the received control instruction to the electronic device 40, because the control instruction includes the identification information of the user, after the electronic device 40 determines that the identification information of the user in the control instruction matches the preset identification information, the electronic device 40 can execute an operation corresponding to the control instruction, thereby preventing the electronic device 40 from receiving the control instruction sent by the user due to too far distance, and avoiding that unlocking the electronic device 40 when the user inconveniently touches the electronic device 40 with a hand cannot be performed, and preventing the user from unlocking the electronic device 40 Or use.
As an implementable manner, the control instruction sent by the user may be caused by too far distance between the electronic device 40 and the user, and cannot be directly forwarded to the electronic device 40 after being received by the wearable device 42 worn by the user, and therefore, the control system of the electronic device of the present application may further include a relay device, such as a router. When a user needs to input a control instruction through voice to unlock or perform other operations on the electronic device 40, the user may send the control instruction, and the wearable device 42 worn by the user receives the control instruction, and then the wearable device 42 forwards the received control instruction to the electronic device 40; if the electronic device 40 receives the control instruction, it sends a control instruction confirmation message to the wearable device 42, and when the wearable device 42 receives the control instruction confirmation message, it indicates that the wearable device 42 successfully forwards the received control instruction to the electronic device 40; if the wearable device 42 does not receive the control instruction confirmation message after forwarding the received control instruction for more than the preset time, for example, more than 2 seconds, 3 seconds, or other preset time length, it indicates that the electronic device 40 does not receive the control instruction, which indicates that the wearable device 42 does not successfully forward the received control instruction to the electronic device 40, at this time, the wearable device 42 may forward the control instruction to the relay device, and then the relay device finally forwards the control instruction to the electronic device 40, and the electronic device 40 also sends the control instruction confirmation message to the wearable device 42 after receiving the control instruction forwarded by the relay device. It is understood that there may be multiple relay devices, with multiple relay devices receiving and forwarding, thereby enabling connection and communication between wearable device 42 and electronic device 40.
In other embodiments, wearable device 42 is used to: receiving a connection instruction input by a user, and forwarding the connection instruction to the electronic equipment 40 to form connection with the electronic equipment 40, wherein the connection instruction comprises identification information of the user; and receiving a control command input by a user after forming a connection with the electronic device 40, and forwarding the control command to the electronic device 40. The electronic device 40 is configured to: receiving a connection instruction forwarded by wearable device 42, and determining whether the identification information matches preset identification information; if yes, connect with wearable device 42; and after connecting with wearable device 42, receiving the control instruction forwarded by wearable device 42, and performing an operation corresponding to the control instruction. The difference from the previous embodiment is that wearable device 42 and electronic device 40 are not connected in advance in the present embodiment, and the connection between wearable device 42 and electronic device 40 needs to be triggered by the user; for example, a connection instruction is first sent to wearable device 42 by the user, wearable device 42 forwards the connection instruction to electronic device 40 after receiving the connection instruction, and since the connection instruction includes identification information of the user, electronic device 40 may connect with wearable device 42 after determining that the identification information of the user in the connection instruction matches preset identification information in electronic device 40. It can be understood that, in this embodiment, after the electronic device 40 and the wearable device 42 are successfully connected, when the subsequent electronic device 40 receives the control instruction forwarded by the wearable device 42, it is not necessary to determine whether the identification information in the control instruction matches the preset identification information, and the electronic device 40 may directly perform an operation corresponding to the control instruction.
It is understood that the identification information of the user of the present application includes key content information. In one embodiment, the key content information includes image information that identifies content for an image of the control instruction. It is understood that the control command of the user received by the electronic device 40 may also be a control command of an image sent by the user, and the control command of the image is received by the wearable device 42 and forwarded to the electronic device 40; for example, when the control command is an unlocking command, the unlocking condition of the electronic device 40 may also be set as: when an image message including special content is received, the electronic device 40 may unlock. In a specific application scenario, the special content may be a specific gesture or expression; when the electronic device 40 recognizes that the key content information includes an image information, which is the image recognition content of the control instruction, the electronic device 40 further determines whether the recognized image information is the preset special content, if so, the electronic device 40 receives a correct unlocking instruction, that is, an unlocking condition that an image information including the special content is received is met, the electronic device 40 can unlock, and if not, the electronic device 40 receives no unlocking instruction or an incorrect unlocking instruction, and the electronic device cannot unlock. Furthermore, the wearable device 42 forwards the control command, and even if the control command is an image control command, the wearable device 42 can acquire clear image information because the wearable device 42 is close to the user, so that the electronic device 40 can acquire the clear image control command through the wearable device 42 even if the electronic device is far away from the user, and further, the electronic device 40 can be unlocked and controlled through the image control command when the electronic device 40 is far away.
Further, when the key content information is the image content of the specific mouth of the user, if the electronic device 40 directly receives the control instruction, the situation may occur that the user is far away from the electronic device 40, and the user actually speaks, but the electronic device 40 only acquires the image information of the user, and at this time, if the control instruction is acquired through the wearable device 42 close to the user, the wearable device 42 may also acquire the voice information other than the image information, so that the control instruction of the user may be accurately acquired, and therefore, the information included in the control instruction received by the electronic device 40 may be prevented from being lost due to the electronic device 40 being far away from the user, and thus, the misoperation of the electronic device 40 may be avoided.
The specific processes of the electronic device 40 and the wearable device 42 in the control system embodiment of the electronic device to implement the above functions may refer to the above method embodiment.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. The electronic device 50 in this embodiment is an electronic device in the control method of the electronic device, where the electronic device 50 includes a communication circuit 500, a memory 502, and a processor 504, which are coupled to each other, the communication circuit 500 is configured to receive a control instruction from a user, the memory 502 is configured to store program data, and the processor 504 executes the program data to implement the following method:
the communication circuit 500 receives a control command of a user, wherein the control command includes identification information of the user; the processor 504 determines whether the user identification information matches the predetermined identification information; and if so, executing the operation corresponding to the control instruction.
Further, the control instruction comprises an unlocking instruction, and the identification information comprises key content information; the processor 504 performs the above-mentioned determination of whether the user identification information matches the preset identification information, specifically including: the processor 504 determines whether the key content information matches the preset key content information.
Further, the key content information includes voice information and/or image information, and the voice information is voice recognition content of the control instruction.
As an embodiment, the identification information further includes user biological information, and the electronic device 50 is provided with a normal use mode and a temporary use mode; after executing the above operations corresponding to the control instructions, the processor 504 further includes: the processor 504 determines whether the user biometric information of the user matches the preset user biometric information; if the data are consistent, entering a normal use mode; if not, entering a temporary use mode.
Further, the user biometric information includes audio characteristics of the control instructions.
As an implementable manner, the control instruction comprises a voice communication instruction, wherein the voice communication instruction comprises a voice call and/or a voice call; and/or the user's control instructions are sent by the wearable device.
In other embodiments, the electronic device 50 may be the electronic device 40 in the control system described above.
The specific process of implementing the above functions by the processor 504 and other components in the electronic device 50 embodiment of the present application may refer to the above method embodiment.
Referring to fig. 6, fig. 6 is a memory device according to the present invention. The storage device 60 stores therein program data 600, and the program data 600 can be executed to implement the control method of the electronic apparatus as described above. The storage device 60 may be a storage chip in a server, a readable and writable storage tool such as an SD card, or a server.
In the several embodiments provided in this application, it should be understood that the disclosed method, system, apparatus, and device may be implemented in other ways. For example, the above-described device architecture implementations are merely illustrative, and for example, a division of a module or a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method of controlling an electronic device, the method comprising:
the electronic equipment receives a control instruction of a user, wherein the control instruction comprises identification information of the user;
judging whether the identification information of the user is consistent with preset identification information or not;
and if so, executing the operation corresponding to the control instruction.
2. The control method of claim 1, wherein the control instruction comprises an unlock instruction, the identification information comprises key content information;
the judging whether the identification information of the user conforms to the preset identification information includes:
and judging whether the key content information conforms to preset key content information.
3. The control method according to claim 2, wherein the key content information includes voice information and/or image information, the voice information being voice recognition content of the control instruction.
4. The control method according to claim 2, wherein the identification information further includes user biometric information, and the electronic device is provided with a normal use mode and a temporary use mode;
after the performing an operation corresponding to the control instruction, the method further includes:
judging whether the user biological information of the user is consistent with preset user biological information or not;
if the data are consistent with the preset data, entering the normal use mode;
and if not, entering the temporary use mode.
5. The control method of claim 4, wherein the user biometric information includes an audio feature of the control instruction.
6. The control method of claim 1, wherein the control instruction comprises a voice communication instruction, wherein the voice communication instruction comprises a voice call and/or a voice call;
and/or the user's control instructions are sent by the wearable device.
7. A control system of an electronic device is characterized by comprising the electronic device and a wearable device which are connected;
the wearable device is to: receiving a control instruction input by a user and forwarding the control instruction to the electronic equipment, wherein the control instruction comprises identification information of the user;
the electronic device is configured to: receiving the control instruction forwarded by the wearable device, and judging whether the identity identification information conforms to preset identity identification information; and if so, executing the operation corresponding to the control instruction.
8. A control system of an electronic device is characterized by comprising the electronic device and a wearable device which are connected;
the wearable device is to: receiving a connection instruction input by a user, and forwarding the connection instruction to the electronic equipment to form connection with the electronic equipment, wherein the connection instruction comprises identification information of the user; after the electronic equipment is connected, receiving a control instruction input by a user and forwarding the control instruction to the electronic equipment;
the electronic device is configured to: receiving the connection instruction forwarded by the wearable device, and judging whether the identity identification information conforms to preset identity identification information; if the data match, connecting the wearable device; and after the wearable device is connected, receiving the control instruction forwarded by the wearable device, and executing an operation corresponding to the control instruction.
9. An electronic device comprising communication circuitry, a memory, and a processor coupled to one another; the communication circuit is used for receiving a control instruction of a user; the memory is used for storing program data; the processor executing the program data for implementing the method according to any of claims 1-6;
or the like, or, alternatively,
the electronic device is an electronic device in the control system according to claim 7 or 8.
10. A storage device storing program data executable to implement a method according to any one of claims 1 to 6.
CN201910539275.5A 2019-06-20 2019-06-20 Control method and control system for electronic equipment, electronic equipment and storage device Withdrawn CN112118348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910539275.5A CN112118348A (en) 2019-06-20 2019-06-20 Control method and control system for electronic equipment, electronic equipment and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910539275.5A CN112118348A (en) 2019-06-20 2019-06-20 Control method and control system for electronic equipment, electronic equipment and storage device

Publications (1)

Publication Number Publication Date
CN112118348A true CN112118348A (en) 2020-12-22

Family

ID=73796122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910539275.5A Withdrawn CN112118348A (en) 2019-06-20 2019-06-20 Control method and control system for electronic equipment, electronic equipment and storage device

Country Status (1)

Country Link
CN (1) CN112118348A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN105096951A (en) * 2015-05-28 2015-11-25 惠州Tcl移动通信有限公司 Voice control realizing method and system based on intelligent wearable equipment
CN105740686A (en) * 2016-01-28 2016-07-06 百度在线网络技术(北京)有限公司 Application control method and device
CN106156583A (en) * 2016-06-03 2016-11-23 深圳市金立通信设备有限公司 A kind of method of speech unlocking and terminal
US20170004294A1 (en) * 2015-06-30 2017-01-05 Motorola Mobility Llc Using speech to unlock an electronic device having a pattern-based unlocking mechanism
CN106485127A (en) * 2016-10-27 2017-03-08 北京小米移动软件有限公司 The control method of electronic equipment, device, electronic equipment and system
CN106653033A (en) * 2016-10-28 2017-05-10 努比亚技术有限公司 Voice unlocking device, terminal and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN105096951A (en) * 2015-05-28 2015-11-25 惠州Tcl移动通信有限公司 Voice control realizing method and system based on intelligent wearable equipment
US20170004294A1 (en) * 2015-06-30 2017-01-05 Motorola Mobility Llc Using speech to unlock an electronic device having a pattern-based unlocking mechanism
CN105740686A (en) * 2016-01-28 2016-07-06 百度在线网络技术(北京)有限公司 Application control method and device
CN106156583A (en) * 2016-06-03 2016-11-23 深圳市金立通信设备有限公司 A kind of method of speech unlocking and terminal
CN106485127A (en) * 2016-10-27 2017-03-08 北京小米移动软件有限公司 The control method of electronic equipment, device, electronic equipment and system
CN106653033A (en) * 2016-10-28 2017-05-10 努比亚技术有限公司 Voice unlocking device, terminal and method

Similar Documents

Publication Publication Date Title
US20210357488A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
US9967100B2 (en) Method of controlling power supply for fingerprint sensor, fingerprint processing device, and electronic device performing the same
EP3331226B1 (en) Method and device for reading messages
CN106462687B (en) Touch device and method, electronic equipment
US20150067829A1 (en) Electronic Device and Method for Unlocking Screen of Electronic Device
US9372981B2 (en) Electronic device and method for unlocking screen of electronic device
CN107450839B (en) Control method and device based on black screen gesture, storage medium and mobile terminal
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
WO2019218886A1 (en) Application pre-loading management method, device, storage medium and smart terminal
WO2019101096A1 (en) Method and device for security verification and mobile terminal
CN108292336B (en) Fingerprint acquisition method and terminal
CN109085975A (en) Screenshotss method, apparatus, storage medium and electronic device
CN110515533B (en) Electronic equipment shortcut operation method and device, electronic equipment and storage medium
WO2018107396A1 (en) Fingerprint recognition method and terminal device
CN107704759A (en) Control method, device, storage medium and the electronic equipment of sensitive operation
WO2019214438A1 (en) Radio frequency card function calling method and device
WO2018223402A1 (en) Function control method and terminal
WO2021121112A1 (en) Fingerprint anti-counterfeiting method and electronic device
CN109508522A (en) A kind of data clearing method, device, storage medium and terminal
KR101196759B1 (en) Portable terminal and method for changing owner mode automatically thereof
CN107145771B (en) Application program unlocking method and device and terminal
EP3757831B1 (en) Fingerprint event processing method, apparatus, and terminal
CN107786349B (en) Security management method and device for user account
CN112118348A (en) Control method and control system for electronic equipment, electronic equipment and storage device
CN109104759B (en) Interaction method of electronic equipment, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201222