A locking method and device for a mobile terminal
A mobile terminal and custom technology, applied in the field of locking methods and devices for mobile terminals, can solve the problems of low security, easy duplication and leakage, user security risks, etc., and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] figure 1 It is a flow chart of an embodiment of the method for determining the user's speech habit characteristics in different subject scenarios according to the present invention, as shown in figure 1 As shown, the following specific implementation methods are included.
[0050] In step 11, collect voice call data as a sample, and determine different theme scenes that appear during the call process and voice habit characteristics under each theme scene by performing statistical analysis on the collected voice call data.
[0051] When each voice call of the user ends, the mobile terminal can save the data of this voice call as a sample, and by performing semantic analysis on the collected voice call data as a sample, etc., the information of each voice call of the user can be obtained. The thematic scenes involved, such as: "Appoint a meal", "Ask for help", "Watch a movie", "Greet greetings", "Work matters", "Farewell" and so on.
[0052] In addition, voice habit cha...
Embodiment 2
[0066] In this embodiment, the reliability of the user identity can be judged by the "suspicious degree", and when the suspicious degree is high enough, the mobile terminal is locked.
[0067] figure 2 It is a flow chart of an embodiment of the locking method of the mobile terminal according to the present invention, such as figure 2 As shown, the following specific implementation methods are included.
[0068] In 21, when the voice call based on the mobile terminal ends, the subject scene and voice habit features of the call are determined.
[0069] After each voice call of the user ends, the subject scene of the call and the voice habit characteristics of the call can be determined by performing semantic analysis and speech recognition on the voice call data of the call.
[0070] In step 22, if the speech habit features corresponding to the subject scene of the current call are saved, the degree of matching between the saved speech habit features and the speech habit fea...
Embodiment 3
[0103] image 3 It is a schematic diagram of the composition and structure of the embodiment of the locking device of the mobile terminal according to the present invention, such as image 3 As shown, it includes: a security authentication module 31 and a locking module 32 .
[0104] The security authentication module 31 is used to determine the theme scene and the voice habit feature of this call when the voice call based on the mobile terminal ends; if the voice habit feature corresponding to the theme scene of this call is saved, then calculate the preserved The matching degree of the speech habit feature and the determined speech habit feature; if the matching degree is less than the first threshold, then determine the suspiciousness accumulation value corresponding to the matching degree, and calculate the sum of the original suspiciousness and the suspiciousness accumulation value, The updated suspiciousness is obtained; if the updated suspiciousness is greater than the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


