Unlocking method and device and storage medium

An unlocking and sound lock technology, applied in the field of communication, can solve problems such as low unlocking accuracy and success rate, misreading, and low user experience, so as to improve unlocking accuracy and success rate, avoid misreading, and simplify unlocking operations Effect

Inactive Publication Date: 2018-09-14
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the above-mentioned unlocking process using the sound lock, since the voice information of the current user is obtained through the user reading a specific sentence when unlocking, there are specific requirements for the user, and the user experience is low. In addition, when the user speaks a specific sentence Misreading and missing reading may occur, resulting in low unlocking accuracy and success rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method and device and storage medium
  • Unlocking method and device and storage medium
  • Unlocking method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] An embodiment of the present invention provides an unlocking method, image 3It is a schematic diagram of the implementation flow of an unlocking method proposed by the embodiment of the present invention, as shown in image 3 As shown, in the embodiment of the present invention, the unlocking method may include the following steps:

[0068] S301. Acquire voice information of the current user when an unlock request is detected;

[0069] In the embodiment of the present invention, after the terminal and the applications installed on the terminal are locked, on the one hand, the terminal needs to be unlocked to enter the working state; on the other hand, the application needs to be unlocked to complete the user's login.

[0070] Here, when the terminal detects that the unlocking function of the terminal or the application function installed on the terminal is activated, the unlocking request is detected. For example, the user presses on a locked screen, or the user star...

Embodiment 2

[0094] The embodiment of the present invention also provides another unlocking method, Figure 6 It is a schematic diagram of the implementation flow of another unlocking method proposed by the embodiment of the present invention, as shown in Figure 6 As shown, in the embodiment of the present invention, the unlocking method may include the following steps:

[0095] S601. Collect historical voice information through a voice device;

[0096] In the embodiment of the present invention, the voice data on which the preset sound lock model is established is derived from historical voice information automatically recorded by the terminal and generated when the user operates the terminal. The user operation may be, but not limited to, answering / dialing calls, historical voice information generated during text messages, WeChat and QQ voice / video calls. Therefore, the terminal needs to collect historical voice information through a voice device. Here, the voice device can be a micr...

Embodiment 3

[0125] Based on the same inventive concept of embodiment one and embodiment two, Figure 7 A schematic structural diagram of an unlocking device provided by an embodiment of the present invention, such as Figure 7 As shown, the unlocking device includes: a processor 71 , a memory 72 , a receiver 73 and a communication bus 74 .

[0126] In the embodiment of the present invention, the communication bus 74 is used to realize connection communication between the processor 71, the memory 72 and the receiver 73; the processor 71 and the receiver 73 are used for Execute the data sending program stored in the memory 72 to perform the following steps:

[0127] When an unlock request is detected, the voice information of the current user is obtained; according to the voice information, the preset sound lock model and the preset general model, comparison information is obtained; when the comparison information meets the preset comparison threshold, Perform unlock processing.

[0128] I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an unlocking method. The method comprises the following steps: acquiring voice information of a current user when an unlocking request is detected; acquiringcomparison information according to the voice information, a preset sound locking model and a preset universal model; performing unlocking when the comparison information meets a preset comparison threshold. The embodiment of the invention further discloses an unlocking device and a storage medium. According to the unlocking method provided by the embodiment of the invention, the unlocking operation can be simplified, the user experience is improved, and the unlocking accuracy rate and success rate are improved.

Description

technical field [0001] The present invention relates to an unlocking technology in the field of communication technology, in particular to an unlocking method and device, and a storage medium. Background technique [0002] In order to ensure the security of information stored on the terminal, an unlock function is usually set on the terminal, and the terminal can enter the working state only after the unlock is successful; in addition, for the application on the terminal, in order to ensure the security of the user information corresponding to each user in the application function , when the user needs to use the application, he usually enters the application by logging in. However, whether it is the unlocking function on the terminal or the login function of the application on the terminal, it is necessary to perform an unlocking operation on the terminal according to the user's operation information. Currently, voice locks are widely used on terminals. [0003] In the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
Inventor 张忠男
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products