Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting terminal equipment based on speech recognition and terminal equipment thereof

A technology of terminal equipment and voice recognition, which is applied in voice analysis, branch office equipment, telephone communication, etc., and can solve the problems that the privacy of terminal equipment cannot be guaranteed.

Active Publication Date: 2016-01-20
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the password is known by others, the privacy of the terminal equipment cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting terminal equipment based on speech recognition and terminal equipment thereof
  • Method for protecting terminal equipment based on speech recognition and terminal equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings. It should be understood that the following embodiments are only illustrative, and there may be many feasible implementations consistent with the concept of the present invention.

[0021] refer to figure 1 , first, in step S101, a voice template needs to be preset. The voice template here refers to voice data corresponding to the voice features (eg, behavioral features, psychological features, style features, etc.) exhibited by the user's voice of the terminal device. According to an embodiment of the present invention, the adopted speech features may be the rate of speech, the content of the speech, and some specific speech frequencies. Of course, other voice features known to those skilled in the art can be used to set the voice template. Speech features can be characterized by parameters such as average energy, number of zero crossings, linear prediction c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting terminal equipment based on speech recognition and the terminal equipment. The method comprises the steps of presetting a speech template according to speech inputted by a user and storing the preset speech template, collecting user speech and carrying out sampling analysis on the user speech so as to obtain the speech characteristic of the collected user speech, and comparing the speech characteristic of the collected user speech with the stored speech characteristic of the speech template so as to determine whether to lock the terminal equipment or not, wherein the speech template is speech data corresponding to the speech characteristic represented by the speech. According to the method and the terminal equipment, a stranger is prevented from using the terminal equipment, and a safe access problem of the terminal equipment is effectively solved.

Description

technical field [0001] The present application relates to the field of speech recognition, and more specifically, to a method for protecting a terminal device based on speech recognition and a terminal device using the method. Background technique [0002] At present, various terminal devices, especially mobile terminal devices, have an increasingly wider range of applications. As a multifunctional application terminal and platform, a large amount of information and various types of content are usually stored in the terminal device. Such information and content may contain personal privacy information that needs to be protected, such as credit card payment passwords, personal data (photos, address books, etc.), and the like. Therefore, the security issues of terminal equipment are becoming more and more important. However, once the terminal is lost or stolen, the information and content stored in the terminal device are almost transparent to the outside, and it is likely t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G10L17/22H04M1/725
Inventor 龚嵩杰孙国勇
Owner SAMSUNG ELECTRONICS CHINA R&D CENT