[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2018120241A1 - 识别通话对象身份的方法和终端设备 - Google Patents

识别通话对象身份的方法和终端设备 Download PDF

Info

Publication number
WO2018120241A1
WO2018120241A1 PCT/CN2016/113990 CN2016113990W WO2018120241A1 WO 2018120241 A1 WO2018120241 A1 WO 2018120241A1 CN 2016113990 W CN2016113990 W CN 2016113990W WO 2018120241 A1 WO2018120241 A1 WO 2018120241A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
feature data
voice feature
call object
address book
Prior art date
Application number
PCT/CN2016/113990
Other languages
English (en)
French (fr)
Inventor
杨俊�
梅光辉
滕志辉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2016/113990 priority Critical patent/WO2018120241A1/zh
Priority to CN201680091953.0A priority patent/CN110121879B/zh
Publication of WO2018120241A1 publication Critical patent/WO2018120241A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set

Definitions

  • the embodiments of the present invention relate to the field of communications, and in particular, to a terminal device having a voice call function.
  • the embodiment of the present invention provides a method for identifying an identity of a call object, including: the terminal device collects first voice feature data of the call object during the call, and the first voice feature data and the preset second voice feature. The data is matched to determine the identity of the call object.
  • the call object uses any number to make a call with the user, and the terminal device can quickly and effectively determine the identity of the call object.
  • the second voice feature data may be associated with an address book of the terminal device.
  • the second voice feature data is stored in the form of an address book, which is convenient for the user to use.
  • the second voice feature data may be synchronized with the cloud.
  • the data in the cloud is not easily lost, and more information can be provided to the user.
  • the second voice data is stored in the terminal device in a recorded manner.
  • the recording can be played back by the user and is familiar with the voice of the call object.
  • the second voice data is stored in the terminal device in a manner of voiceprint feature values.
  • the voiceprint feature value matching is more accurate.
  • the call may be a calling or a called party, or may be a call of more than three parties to enrich the usage scenario of the terminal device.
  • the method further includes: the terminal device displaying the matching result on the display screen to let the user know the identity of the call object.
  • the terminal device when the number of the call object is not stored in the address book, and the first voice feature data matches the second voice feature data, the terminal device associates the second voice feature data with the association.
  • the person information is displayed on the display.
  • the terminal device prompts the user to save the number of the call object into the contact information associated with the second voice feature data.
  • the terminal device when the number of the call object is not saved in the address book, and the first voice feature data does not match the second voice feature data, the terminal device prompts the user to save the first voice feature data. Go to the address book.
  • the terminal device when the number of the call object is stored in the address book, and the first voice feature data matches the second voice feature data, the terminal device prompts the user to contact the current call object with the address book. People are consistent.
  • the terminal device covers the first voice feature data with the second voice feature data to improve the accuracy of the terminal device identifying the identity of the call object.
  • the terminal device when the number of the call object is stored in the address book and the first voice feature data does not match the second voice feature data, the terminal device prompts the user to the current call object and the address book. Inconsistent contacts.
  • the terminal device when the number of the call object is associated with the contact of the second voice feature data in the address book, and the first voice feature data matches the preset third voice feature data, the terminal device The contact information of the second voice feature data in the user address book may be incorrect.
  • the terminal device saves the number of the call object to the contact information associated with the third voice feature data in the address book.
  • the terminal device may match the first voice feature data with the preset fourth voice feature data, and if matched, the terminal device prompts the user that the current call object is in the blacklist. The terminal device can then prompt the user to hang up the call or automatically hang up the call.
  • the terminal device performs voice verification before the call is connected, matches the first voice feature data, and notifies the user of the matching result. Further, the first voice feature data may be matched with the second voice feature data, the third voice feature data, and/or the fourth voice feature data.
  • the terminal device automatically hangs up the call.
  • the method further includes: the terminal device associates the first voice feature data with the number of the call object, and when receiving the operation of creating a new contact for the number of the call object by the user, the terminal device The first voice feature data is associated to the contact.
  • the terminal device prompts the user to match the result by means of UI display, lighting, vocalization, vibration, current, and the like.
  • an embodiment of the present invention provides a terminal device, including: an acquisition module, configured to collect first voice feature data of a call object during a call; and a storage module, configured to store preset second voice feature data; a processing module, configured to: match the first voice feature data with the preset second voice feature data; and display a module, configured to display the matched result to the user.
  • an embodiment of the present invention provides a terminal device, including: a processor and a storage medium.
  • the storage medium stores a program such that the terminal device performs the above method.
  • an embodiment of the present invention provides an address book for a terminal device, including: at least one contact, and the contact is associated with voice feature data. Contacts can also be associated with a name and/or phone number.
  • an embodiment of the present invention provides a terminal device having the foregoing address book.
  • the embodiment of the present invention can automatically restore the data service of the terminal device after the debt recovery, and has a good user experience.
  • FIG. 1 is a schematic diagram of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 2 is a block diagram showing a partial structure of a terminal device provided by a possible embodiment of the present invention.
  • FIG. 3 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 4 is a user interface of a terminal device provided in accordance with a possible implementation of the present invention.
  • FIG. 5 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 6 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 7 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 8 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 9 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 10 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 11 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 12 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 13 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 14 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 15 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 16 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 17 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 18 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • FIG. 19 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 20 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 21 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 22 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 23 is a user interface of a terminal device according to a possible implementation of the present invention.
  • FIG. 24 is a flowchart of a method for identifying a call object identity according to a possible implementation of the present invention.
  • Figure 25 is a block diagram of a system provided in accordance with one possible embodiment of the present invention.
  • 26 is a block diagram of a terminal device provided in accordance with a possible embodiment of the present invention.
  • FIG. 1 is a schematic diagram of a terminal device provided according to a possible embodiment of the present invention.
  • the terminal device 100 may include a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, a TV, a wearable device, an AR, and a VR device. Wait.
  • a PDA Personal Digital Assistant
  • POS Point of Sales
  • FIG. 2 is a block diagram showing a part of the structure of the mobile phone 100 related to the embodiment of the present invention.
  • the mobile phone 100 includes an RF (Radio Frequency) circuit 110, a memory 120, other input devices 130, a display screen 140, a sensor 150, an audio circuit 160, an I/O subsystem 170, a processor 180, and a power supply. 190 and other components.
  • RF Radio Frequency
  • the structure of the mobile phone shown in FIG. 2 does not constitute a limitation to the mobile phone, and may include more or less components than those illustrated, or combine some components, or split some components, or Different parts are arranged.
  • display 140 is a User Interface (UI) and that handset 100 may include a user interface that is smaller than shown or less.
  • UI User Interface
  • the components of the mobile phone 100 will be specifically described below with reference to FIG. 2:
  • the RF circuit 110 can be used for transmitting and receiving information or during a call, and receiving and transmitting the signal. Specifically, after receiving the downlink information of the base station, the processor 180 processes the data. In addition, the uplink data is designed to be sent to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like.
  • RF circuitry 110 can also communicate with the network and other devices via wireless communication.
  • the wireless communication can use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication) Mobile communication system), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term) Evolution, Long Term Evolution, Email, SMS (Short Messaging Service), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • Long Term Evolution Long Term Evolution
  • Email Short Messaging Service
  • the memory 120 can be used to store software programs and modules, and the processor 180 executes various functional applications and data processing of the mobile phone 100 by running software programs and modules stored in the memory 120.
  • the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored. Data created according to the use of the mobile phone 100 (such as audio data, phone book, etc.).
  • memory 120 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • Other input devices 130 can be used to receive input numeric or character information, as well as generate key signal inputs related to user settings and function controls of the handset 100.
  • other input devices 130 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and light mice (the light mouse is not sensitive to display visual output).
  • function keys such as volume control buttons, switch buttons, etc.
  • trackballs mice, joysticks, and light mice (the light mouse is not sensitive to display visual output).
  • Other input devices 130 are coupled to other input device controllers 171 of I/O subsystem 170 for signal interaction with processor 180 under the control of other device input controllers 171.
  • the display screen 140 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone 100, and can also accept user input.
  • the specific display screen 140 may include a display panel 141 and a touch panel 142.
  • the display panel 141 can be configured by using an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
  • the touch panel 142 also referred to as a touch screen, a touch sensitive screen, etc., can collect contact or non-contact operations on or near the user (eg, the user uses any suitable object or accessory such as a finger, a stylus, etc. on the touch panel 142.
  • the operation near the touch panel 142 may also include a somatosensory operation; the operation It includes operation types such as single-point control operation and multi-point control operation. ), and drive the corresponding connection device according to a preset program.
  • the touch panel 142 may include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation and posture of the user, and detects a signal brought by the touch operation, and transmits a signal to the touch controller; the touch controller receives the touch information from the touch detection device, and converts the signal into a processor. The processed information is sent to the processor 180 and can receive commands from the processor 180 and execute them.
  • the touch panel 142 can be implemented by using various types such as resistive, capacitive, infrared, and surface acoustic waves, and the touch panel 142 can be implemented by any technology developed in the future.
  • the touch panel 142 can cover the display panel 141, and the user can display the content according to the display panel 141 (the display content includes, but is not limited to, a soft keyboard, a virtual mouse, a virtual button, an icon, etc.) on the display panel 141. Covered when operating on or near the touch panel 142, the touch panel 142 detects a touch operation thereon or nearby, and transmits it to the processor 180 through the I/O subsystem 170 to determine the type of touch event to determine the user.
  • processor 180 provides a corresponding visual output on display panel 141 via I/O subsystem 170 in accordance with user input in accordance with the type of touch event.
  • the touch panel 142 and the display panel 141 are two separate components to implement the input and input functions of the mobile phone 100, in some embodiments, the touch panel 142 may be integrated with the display panel 141. The input and output functions of the mobile phone 100 are implemented.
  • the handset 100 can also include at least one type of sensor 150, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 when the mobile phone 100 moves to the ear. / or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.
  • the mobile phone 100 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here Let me repeat.
  • the audio circuit 160, the speaker 161, and the microphone 162 can provide an audio interface between the user and the handset 100.
  • the audio circuit 160 can transmit the converted audio data to the speaker 161 for conversion to the sound signal output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into a signal, which is received by the audio circuit 160.
  • the audio data is converted to audio data, which is then output to the RF circuit 108 for transmission to, for example, another mobile phone, or the audio data is output to the memory 120 for further processing.
  • the I/O subsystem 170 is used to control external devices for input and output, and may include other device input controllers 171, sensor controllers 172, and display controllers 173.
  • one or more other input control device controllers 171 receive signals from other input devices 130 and/or send signals to other input devices 130.
  • Other input devices 130 may include physical buttons (press buttons, rocker buttons, etc.) , dial, slide switch, joystick, click wheel, light mouse (light mouse is a touch-sensitive surface that does not display visual output, or an extension of a touch-sensitive surface formed by a touch screen). It is worth noting that other input control device controllers 171 can be connected to any one or more of the above devices.
  • Display controller 173 in I/O subsystem 170 receives signals from display 140 and/or transmits signals to display 140. After the display 140 detects the user input, the display controller 173 converts the detected user input into an interaction with the user interface object displayed on the display screen 140, ie, implements human-computer interaction. Sensor controller 172 can receive signals from one or more sensors 150 and/or send signals to one or more sensors 150.
  • the processor 180 is the control center of the handset 100, connecting various portions of the entire handset with various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120, The various functions and processing data of the mobile phone 100 are executed to perform overall monitoring of the mobile phone.
  • the processor 180 may include one or more processing units; preferably, the processor 180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 180.
  • the handset 100 also includes a power source 190 (such as a battery) that supplies power to the various components.
  • a power source 190 such as a battery
  • the power source can be logically coupled to the processor 180 via a power management system to manage functions such as charging, discharging, and power consumption through the power management system.
  • the mobile phone 100 may further include a camera, a Bluetooth module, and the like, and details are not described herein.
  • FIG. 3 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • the terminal device 100 is currently in a call with an unfamiliar number 170XXXXXX and collects voice feature data of the call object during the call.
  • the call object is actually a scammer, but claims to be the acquaintance of the user, causing the user to be unstoppable, or the user cannot determine the identity of the call object even if there is suspicion.
  • the terminal device 100 collects voice feature data of the call object during the call, and matches the preset voice feature data to determine the identity of the call object, so that the user can be unfamiliar with the user.
  • the identity can also be recognized; further, in the case where the scammer steals an acquaintance's telephone call, it can also identify that the caller is not himself. Therefore, the convenience and security of the call are improved.
  • the call can be an incoming call or an outgoing call, that is, calling or called.
  • the terminal device 100 can save the voice of the call object in the local or the cloud by means of recording, so that the user can play back later to familiarize with the sound.
  • the terminal device 100 can save the security feature and the speed of the matching calculation by extracting the voice feature data in the voice of the call object to be saved locally or in the cloud. That is, the voice feature data may be saved in the form of a recording, or may be saved in the form of extracting voiceprint features by calculation.
  • the terminal device 100 may prompt the callee to speak a specific voice at the beginning of the call to facilitate comparison with the saved voice feature data.
  • the terminal device 100 can also use a specific common expression, such as "hello”, "Hello” and other voice data to perform matching.
  • the terminal device 100 prompts the user whether to save the voice feature of the collected call object. If the person talking to the user is an acquaintance, or the user intends If you continue to contact, you can choose to confirm. When talking to the caller again, the terminal device 100 can inform the user of the time and duration of the call that has occurred before.
  • the terminal device 100 may not prompt the user, but save the voice feature data directly at the local or server. Further, the saved voice feature data may have a preset number. This avoids the situation where the user has no time to save or mishandle and lose the voice feature data.
  • FIG. 5 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • the terminal device 100 can ask the user whether to add the contact to the address book. If the user selects OK, the terminal device 100 can directly associate the saved corresponding voice feature data to the contact.
  • the operation is simple and natural, and has a good user experience.
  • the user can also create a new contact at any time, and the terminal device 100 can directly associate the saved corresponding voice feature data to the contact.
  • a rich usage scenario can be provided to the user.
  • the terminal device 100 does not prompt the user whether to save the voice feature data, but automatically saves.
  • the terminal device 100 may save the saved corresponding voice feature data. Link directly to contacts.
  • FIG. 6 is a user interface of a terminal device according to a possible implementation of the present invention. As shown, in the address book, the terminal device 100 shows three contacts, Bush and Trump have saved voice feature data, and Obama has not saved voice feature data.
  • FIG. 7 is a user interface of a terminal device provided according to a possible embodiment of the present invention. As shown in the figure, when the user clicks the play button of the voice feature data of the contact Bush, the terminal device 100 plays the saved voice of the Bush so that the user can be familiar with the voice of the Bush.
  • the voice of the saved contact may be a recording of the entire call.
  • the terminal device 100 may also separately store voice feature data.
  • the terminal device 100 may optimize the voice feature data according to the voice collected in each call of the same call object to improve the recognition rate.
  • FIG. 8 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 can also receive the user's operation to delete the corresponding voice feature data of the contact Bush. For example, if the saved voice feature data of Bush is from Bush's daughter, the voice feature data is incorrect and should be deleted.
  • the terminal device 100 may also automatically delete the voice feature data that may be mismatched according to the voice feature data that is dominant in the multiple calls of the same phone number.
  • FIG. 9 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 can receive the user's operation to collect voice features from the file for the contact Obama.
  • the terminal device 100 can store a recording or video file containing the Obama voice, and the terminal device 100 can directly obtain the voice feature data of the Obama from the file without calling.
  • the terminal device 100 may also actively collect voice feature data of the contact by starting a recording APP or the like.
  • FIG. 10 is a user interface of a terminal device provided according to a possible embodiment of the present invention. As shown, during a call with the contact Obama who has saved the number but no voice feature data, the terminal device 100 automatically collects the voice feature data and can then prompt the user to save or automatically save.
  • FIG. 11 is a user interface of a terminal device according to a possible implementation of the present invention. As shown in the figure, the terminal device 100 associates the voice feature data collected during the call to the contact Obama who has saved the number.
  • FIG. 12 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 is currently in a conversation with a strange number 173XXXXXX.
  • the terminal device 100 can collect the voice feature value of the call object that matches the call, and if it matches the saved contact Trump, it is determined that the Tump uses the new number call.
  • FIG. 13 is a user interface of a terminal device according to a possible implementation of the present invention. As shown in the figure, after determining that the Trump uses the new number incoming call, the terminal device 100 may prompt the user whether to add the strange number 173XXXXXX to the contact header of the address book.
  • FIG. 14 is a user interface of a terminal device provided according to a possible embodiment of the present invention. As shown, the strange number 173XXXXXXX is added to the address book's contact Trump, along with the 172XXXXXXX that Trump originally saved.
  • the terminal device 100 may not replace the new number 173XXXXXXX with the saved number 172XXXXXX, but replace or overwrite the 172XXXXXXX.
  • FIG. 15 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the call record of the terminal device 100 there are three records of strange number incoming calls, and there is no matching voice feature data locally.
  • the user may have forgotten the identity of the caller of the corresponding number, or does not know the caller at all, but wants to know his identity.
  • FIG. 16 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 can prompt the user to match the voice record database of the cloud to the call record, and can receive the user's operation to determine the identity of the call object.
  • the terminal device 100 can identify the identity of a strange caller, such as a bank employee, an insurance salesperson, a kindergarten teacher, and the like.
  • the terminal device 100 may also automatically match the voice feature database of the cloud without the intervention of the user, thereby realizing the identity of the strange caller.
  • the terminal device 100 may authorize the call object to access its own voice feature database in the cloud, so as to temporarily or long-term let the specific or unspecified call object know his identity.
  • cloud matching may be performed during a call or after the call ends.
  • FIG. 17 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 recognizes the identity of the three unfamiliar numbers as Bush, Obama, and Trump, respectively.
  • each person's voice feature represents his or her identity, so that in some scenarios, the existence of a phone number can be cancelled.
  • FIG. 18 is a user interface of a terminal device provided according to a possible embodiment of the present invention.
  • the terminal device 100 is talking to the contact Obamaa 171XXXXXX saved in the address book, but the terminal device 100 finds that the voice feature data of the call object does not match the voice feature data of the saved contact Obama. At this time, it is very likely that someone has used Obama's phone, and the terminal device 100 can prompt the user that the current call object is not Obama, to prevent the user from being deceived.
  • FIG. 19 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 is talking to the contact Obama 171XXXXXX saved in the address book, but the terminal device 100 finds that the voice feature data of the call object does not match the voice feature data of the saved contact Obama, but matches the Trump. .
  • the terminal device 100 may remind the user that the current call object is actually Trump, and receive the user's input to update the address book, and correct the record of the contact Obama 171XXXXXX to Trump171XXXXXXX. .
  • FIG. 20 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 may have a blacklist function to cope with the same call object replacement phone number to harass the user.
  • the terminal device 100 matches the voice feature data of the call object to match the Trump in the blacklist, and can prompt the user whether the call is currently harassed and whether to hang up.
  • the blacklist saved by the terminal device 100 at the local or server may also have no name, only voice feature data.
  • the terminal device 100 may also only remind the user that the current call object is in the blacklist without displaying the specific identity.
  • the address book of the terminal device 100 may also save the voice feature data without saving the number.
  • FIG. 21 is a user interface of a terminal device according to a possible implementation of the present invention. As shown in the figure, when the terminal device 100 confirms that the current object of the strange number 171XXXXXX is a Trump in the blacklist, the terminal device 100 automatically hangs up the current call.
  • the terminal device 100 may perform voice verification before answering the call, and after matching the voice feature data of the call object, determine whether Answer.
  • the terminal device 100 can prompt the user with the matching result, let the user select the operation, or automatically answer or hang up.
  • FIG. 22 is a user interface of a terminal device according to a possible implementation of the present invention.
  • the terminal device 100 determines that the identity is based on the voice feature data, and may not be limited to the call application, but may be applied to various scenarios, such as voice or video applications such as Facetime, WeChat, and Gtalk.
  • voice or video applications such as Facetime, WeChat, and Gtalk.
  • the terminal device 100 uses the Facetime video with the contact whose identity is Obama
  • the terminal device 100 collects the voice feature data in the video, matches the voice feature data stored in the local or the cloud, and finds that the current video object is not the Obama, and then the user Prompt to prevent users from being spoofed by fake video.
  • the terminal device 100 may also prompt the user that the current video object is Obama himself.
  • FIG. 23 is a user interface of a terminal device according to a possible implementation of the present invention. As shown, the terminal device 100 is currently talking to the contact Obama 171XXXXXX recorded in the address book. The terminal device 100 can prompt the user to call Obama himself by matching the saved voice feature data.
  • FIG. 24 is a flowchart of a method for identifying a call object identity according to a possible implementation of the present invention. As shown in the figure, after the terminal device 100 receives the voice call, the user selects to answer the incoming call, and the terminal device 100 starts recording the voice information of the call object, for example, the voice information of the first 5s, 10s, 1min, or the voice information of a certain voice data amount. .
  • the terminal device 100 determines whether it is a contact number incoming call.
  • the terminal device 100 determines that the contact number is an incoming call, then it is determined whether the voice matches the address book to prevent the person from impersonating the familiar number. If the voice matches the address book, the terminal device 100 can compare the voice feature data of the current call object with the voice feature data saved in the address book, and save the data with better quality, that is, the voice feature is more obvious, into the address book and associated with the current Contacts, overwriting previously saved voice feature data. The terminal device 100 can also remind the user that the current call is himself. If the voice feature data of the current call object matches the voice feature data saved in the address book, the terminal device 100 determines whether the voice feature data of the call object is in the blacklist, and the contact is fraudulently used.
  • the number, or change the caller number by changing the number software If it is in the blacklist, the terminal device 100 reminds the user that the current call object has been blacked out, which may be a fraudulent call. If it is not in the blacklist, the familiar number is used for the stranger to call, and the terminal device 100 can remind the user to beware of fraud.
  • the terminal device 100 determines that the contact number is not an incoming call, the voice feature data of the current call object and the voice feature data saved in the address book may be compared. If the voice feature data of the current call object matches the voice feature data saved in the address book, it is determined that the familiar contact uses the new number to call, and the terminal device 100 can display the matched address book contact and the corresponding number to the user, and reminds The user saves or replaces the contact information already in the address book. If there is no match, the terminal device 100 next determines whether the voice feature data of the call object is in the blacklist. If it is in the blacklist, the terminal device 100 can remind the user that the current call object has been blacked out, the current call is an harassing call, or hang up directly.
  • the terminal device 100 may save the voice feature data and the number association of the current call object to the cache.
  • the data entry saved in the cache can be set with an upper limit to save the storage space of the terminal device 100.
  • the terminal device 100 can then prompt the user that this is a stranger's new number call and provide the user with an option to operate, for example, save the contact, pull black, or no action. If the terminal device 100 receives the operation of saving the contact or blackening the user, the voice feature data of the current call object may be saved to a local or cloud address book or other form of storage file.
  • the prompt information may be provided to the user through UI display, lighting, vocalization, vibration, current, and the like.
  • the above described function may also be implemented in the call by the terminal device 100 to make a call.
  • the stranger may also refer to a call object in the address book where the voice feature data is not saved, and the acquaintance may refer to the call object in the address book in which the voice feature data is stored.
  • the matching voice feature data may also be completed in the cloud, and the terminal device only receives the matching result and presents it to the user.
  • Figure 25 is a block diagram of a system provided in accordance with one possible embodiment of the present invention.
  • the terminal device 100 includes a memory 21, a communication unit 22, a processor 23, and a display 24.
  • the memory 21 is configured to store an address book having voice feature data
  • the processor 23 matches the voice feature data of the call object collected during the call with the voice feature data in the address book to determine the identity of the user, and the matching The result is displayed on the display 24.
  • the communication unit 22 is for communicating with the server 25 to synchronize the address book having the voice feature data.
  • the terminal device 100 includes a storage module 31, an acquisition module 32, a processing module 33, and a display module 34.
  • the storage module 31 is configured to save the address book with the voice feature data
  • the collection module 32 is configured to collect the voice feature data of the call object during the call
  • the processing module 33 is configured to use the voice feature data of the call object collected by the collection module 32.
  • the voice feature data in the storage module 31 is matched to determine the identity of the user, and the matching result is displayed on the display module 34.
  • Embodiments of the present invention can be arbitrarily combined to achieve different technical effects.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • computer readable media may comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, disk storage media or other magnetic storage device, or can be used for carrying or storing in the form of an instruction or data structure.
  • Any connection may suitably be a computer readable medium.
  • the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless such as infrared, radio, and microwave
  • coaxial cable, fiber optic cable, twisted pair, DSL or wireless technologies such as infrared, wireless and microwave are included in the fixing of the associated medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

一种识别通话对象的方法,包括:终端设备在通话中采集通话对象的第一语音特征数据,并将第一语音特征数据与预设的第二语音特征数据进行匹配,来判断通话对象的身份。在本发明实施方式中,通话对象使用任何号码与用户进行通话,终端设备都能有效地确定通话对象的身份。

Description

识别通话对象身份的方法和终端设备 技术领域
本发明实施例涉及通信领域,尤其涉及具有语音通话功能的终端设备。
背景技术
随着科技的进步、人类沟通的丰富,手机进入智能时代,各种功能越来越丰富,微信,网络、视频等成为手机基本功能,社交圈也逐步扩大。
但是,手机里面存储的通讯名录也越来越庞大;如何记住每个人的身份及背景成为困扰用户的一大问题;尤其还有很多重名的问题。地址本是否流畅、安全、便捷、人性化,决定着手机用户的联系效率,所以用户对于更加智能、安全、便捷的通讯录需求越来越高。
此外,现在还存在着手机丢失后,犯罪分子以联系人身份进行诈骗的问题。
发明内容
一方面,本发明实施例提供了一种识别通话对象身份的方法,包括:终端设备在通话中采集通话对象的第一语音特征数据,并将第一语音特征数据与预设的第二语音特征数据进行匹配,来判断通话对象的身份。在本实施方式中,通话对象使用任何号码与用户进行通话,终端设备都能快速有效地确定通话对象的身份。
在本发明的一种可能的实施方式中,第二语音特征数据可以关联到终端设备的地址本。在本实施方式中,第二语音特征数据以地址本的形式存储,可以方便用户的使用。
在本发明的一种可能的实施方式中,第二语音特征数据可以与云端同步。在本实施方式中,云端的数据不易丢失,还可以提供给用户自己更多信息。
在本发明的一种可能的实施方式中,第二语音数据以录音的方式存储在终端设备中。在本实施方式中,录音可以供用户回放,熟悉通话对象的声音。
在本发明的另一种可能的实施方式中,第二语音数据以声纹特征值的方式存储在终端设备中。在本实施方式中,声纹特征值匹配更准确。
在本发明的一种可能的实施方式中,通话可以是主叫或被叫,也可以是三方以上的通话,以丰富终端设备的使用场景。
在本发明的一种可能的实施方式中,方法进一步包括:终端设备将匹配的结果显示在显示屏上,以让用户获知通话对象的身份。
在本发明的一种可能的实施方式中,当通话对象的号码没有保存在地址本中,第一语音特征数据匹配于第二语音特征数据时,终端设备将第二语音特征数据相关联的联系人信息显示在显示屏上。
进一步的,在本发明的一种可能的实施方式中,终端设备提示用户将通话对象的号码保存进第二语音特征数据相关联的联系人信息中。
在本发明的一种可能的实施方式中,当通话对象的号码没有保存在地址本中,第一语音特征数据不匹配于第二语音特征数据时,终端设备提示用户将第一语音特征数据保存到地址本。
在本发明的一种可能的实施方式中,当通话对象的号码保存在地址本中,第一语音特征数据匹配于第二语音特征数据时,终端设备提示用户当前通话对象与地址本中的联系人一致。
进一步的,在本发明的一种可能的实施方式中,终端设备将第一语音特征数据覆盖第二语音特征数据,以提高终端设备识别通话对象的身份的准确度。
在本发明的一种可能的实施方式中,当通话对象的号码保存在地址本中,第一语音特征数据不匹配于第二语音特征数据时,终端设备提示用户当前通话对象与地址本中的联系人不一致。
在本发明的一种可能的实施方式中,当通话对象的号码与地址本中第二语音特征数据的联系人关联,第一语音特征数据匹配于预设的第三语音特征数据时,终端设备提示用户地址本中第二语音特征数据的联系人信息可能有误。
进一步的,在本发明的一种可能的实施方式中,终端设备将通话对象的号码保存到地址本中第三语音特征数据相关联的联系人信息中。
在本发明的一种可能的实施方式中,终端设备可以将第一语音特征数据与预设的第四语音特征数据进行匹配,如果匹配,终端设备提示用户当前通话对象在黑名单中。终端设备接下来可以提示用户挂断通话或者自动挂断通话。
在本发明的一种可能的实施方式中,终端设备在接通通话之前,进行语音验证,对第一语音特征数据进行匹配,并将匹配的结果告知用户。进一步的,第一语音特征数据可以与第二语音特征数据,第三语音特征数据,和/或第四语音特征数据进行匹配。
进一步的,在本发明的一种可能的实施方式中,如果当前通话对象在黑名单中,终端设备自动挂断通话。
在本发明的一种可能的实施方式中,方法进一步包括:终端设备将第一语音特征数据和通话对象的号码关联保存,在接收到用户对通话对象的号码新建联系人的操作时,终端设备将第一语音特征数据关联到联系人。
在本发明的一种可能的实施方式中,终端设备通过UI显示、灯光、发声、振动、电流等方式提示用户匹配的结果。
另一方面,本发明实施例提供了一种终端设备,包括:采集模块,用于在通话中采集通话对象的第一语音特征数据;存储模块,用于存储预设的第二语音特征数据;处理模块,用于将第一语音特征数据与预设的第二语音特征数据进行匹配;及显示模块,用于将匹配的结果显示给用户。
又一方面,本发明实施例提供了一种终端设备,包括:处理器和存储介质。存储介质存储有程序,使得终端设备执行以上的方法。
又一方面,本发明实施例提供了一种用于终端设备的地址本,包括:至少一个联系人,联系人关联于语音特征数据。联系人还可以关联于名字和/或电话号码。
又一方面,本发明实施例提供了具有上述地址本的终端设备。
值得一提的是,本发明的实施例可以任意组合来达成不同的技术效果。
通过上述方案,本发明的实施例能够在欠费复机后,自动恢复终端设备的数据业务,具有良好的用户体验。
附图说明
图1为根据本发明一种可能的实施方式提供的终端设备的示意图。
图2示出的是本发明一种可能的实施方式提供的终端设备的部分结构的框图。
图3为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图4为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图5为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图6为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图7为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图8为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图9为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图10为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图11为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图12为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图13为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图14为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图15为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图16为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图17为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图18为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图19为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图20为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图21为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图22为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图23为根据本发明一种可能的实施方式提供的终端设备的用户界面。
图24为根据本发明一种可能的实施方式提供的识别通话对象身份的方法的流程图。
图25为根据本发明一种可能的实施方式提供的系统的框图。
图26为根据本发明一种可能的实施方式提供的终端设备的框图。
具体实施方式
图1为根据本发明一种可能的实施方式提供的终端设备的示意图。
本发明实施例涉及的终端设备100可以包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑、TV、可穿戴设备、AR、VR设备等。
以终端设备100为手机为例,图2示出的是与本发明实施例相关的手机100的部分结构的框图。参考图2,手机100包括、RF(Radio Frequency,射频)电路110、存储器120、其他输入设备130、显示屏140、传感器150、音频电路160、I/O子系统170、处理器180、以及电源190等部件。本领域技术人员可以理解,图2中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。本领领域技术人员可以理解显示屏140属于用户界面(UI,User Interface),且手机100可以包括比图示或者更少的用户界面。
下面结合图2对手机100的各个构成部件进行具体的介绍:
RF电路110可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器180处理;另外,将设计上行的数据发送给基站。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、LNA(Low Noise Amplifier,低噪声放大器)、双工器等。此外,RF电路110还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移 动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
存储器120可用于存储软件程序以及模块,处理器180通过运行存储在存储器120的软件程序以及模块,从而执行手机100的各种功能应用以及数据处理。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图象播放功能等)等;存储数据区可存储根据手机100的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器120可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
其他输入设备130可用于接收输入的数字或字符信息,以及产生与手机100的用户设置以及功能控制有关的键信号输入。具体地,其他输入设备130可包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆、光鼠(光鼠是不显示可视输出的触摸敏感表面,或者是由触摸屏形成的触摸敏感表面的延伸)等中的一种或多种。其他输入设备130与I/O子系统170的其他输入设备控制器171相连接,在其他设备输入控制器171的控制下与处理器180进行信号交互。
显示屏140可用于显示由用户输入的信息或提供给用户的信息以及手机100的各种菜单,还可以接受用户输入。具体的显示屏140可包括显示面板141,以及触控面板142。其中显示面板141可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板141。触控面板142,也称为触摸屏、触敏屏等,可收集用户在其上或附近的接触或者非接触操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板142上或在触控面板142附近的操作,也可以包括体感操作;该操作 包括单点控制操作、多点控制操作等操作类型。),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板142可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位、姿势,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成处理器能够处理的信息,再送给处理器180,并能接收处理器180发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板142,也可以采用未来发展的任何技术实现触控面板142。进一步的,触控面板142可覆盖显示面板141,用户可以根据显示面板141显示的内容(该显示内容包括但不限于,软键盘、虚拟鼠标、虚拟按键、图标等等),在显示面板141上覆盖的当触控面板142上或者附近进行操作,触控面板142检测到在其上或附近的触摸操作后,通过I/O子系统170传送给处理器180以确定触摸事件的类型以确定用户输入,随后处理器180根据触摸事件的类型在显示面板根据用户输入通过I/O子系统170在显示面板141上提供相应的视觉输出。虽然在图2中,触控面板142与显示面板141是作为两个独立的部件来实现手机100的输入和输入功能,但是在某些实施例中,可以将触控面板142与显示面板141集成而实现手机100的输入和输出功能。
手机100还可包括至少一种传感器150,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板141的亮度,接近传感器可在手机100移动到耳边时,关闭显示面板141和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机100还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路160、扬声器161,麦克风162可提供用户与手机100之间的音频接口。音频电路160可将接收到的音频数据转换后的信号,传输到扬声器161,由扬声器161转换为声音信号输出;另一方面,麦克风162将收集的声音信号转换为信号,由音频电路160接收后转换为音频数据,再将音频数据输出至RF电路108以发送给比如另一手机,或者将音频数据输出至存储器120以便进一步处理。
I/O子系统170用来控制输入输出的外部设备,可以包括其他设备输入控制器171、传感器控制器172、显示控制器173。可选的,一个或多个其他输入控制设备控制器171从其他输入设备130接收信号和/或者向其他输入设备130发送信号,其他输入设备130可以包括物理按钮(按压按钮、摇臂按钮等)、拨号盘、滑动开关、操纵杆、点击滚轮、光鼠(光鼠是不显示可视输出的触摸敏感表面,或者是由触摸屏形成的触摸敏感表面的延伸)。值得说明的是,其他输入控制设备控制器171可以与任一个或者多个上述设备连接。所述I/O子系统170中的显示控制器173从显示屏140接收信号和/或者向显示屏140发送信号。显示屏140检测到用户输入后,显示控制器173将检测到的用户输入转换为与显示在显示屏140上的用户界面对象的交互,即实现人机交互。传感器控制器172可以从一个或者多个传感器150接收信号和/或者向一个或者多个传感器150发送信号。
处理器180是手机100的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行手机100的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器180可包括一个或多个处理单元;优选的,处理器180可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器180中。
手机100还包括给各个部件供电的电源190(比如电池),优选的,电源可以通过电源管理系统与处理器180逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗等功能。
尽管未示出,手机100还可以包括摄像头、蓝牙模块等,在此不再赘述。
图3为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100当前正在与一个陌生号码170XXXXXXX进行通话,并在通话过程中采集通话对象的语音特征数据。在日常生活中,用户在与陌生号码通话时,很可能觉得通话对象的声音熟悉,却记不起来是谁,又不好意思问。或者,通话对象实际上是骗子,却声称是用户的熟人,使得用户失去戒心,或者用户即使有怀疑,也不能确定通话对象的身份。
在本发明的一种可能的实施方式中,终端设备100在通话过程中采集通话对象的语音特征数据,并与预设的语音特征数据匹配来确定通话对象的身份,从而使得用户可以在与陌生号码通话的过程中,也能够识别其身份;进一步的,在骗子盗用熟人的电话来电的情况下,也可以识别通话对象并非本人。因此,通话的便利性与安全性得到了提高。
值得一提的是,通话可以是来电,也可以是去电,即主叫或被叫。
在本发明的一种可能的实施方式中,终端设备100可以通过录音的方式将通话对象的语音保存在本地或云端,便于用户过后回放来熟悉声音。
可替代的,在本发明的一种可能的实施方式中,终端设备100可以通过提取通话对象语音中的语音特征数据保存在本地或云端,提高了安全性和匹配计算的速度。即语音特征数据可以是以录音的形式保存,也可以是通过计算来提取声纹特征的形式保存。
在本发明的一种可能的实施方式中,终端设备100可以在通话开始时提示通话对象说出一段特定的语音,以方便与保存的语音特征数据进行对比。终端设备100也可以使用特定的常用表达,如“你好”、“Hello”等语音数据,来进行匹配。
图4为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,在与陌生号码170XXXXXXX通话结束以后,终端设备100提示用户是否要保存采集到的通话对象的语音特征。如果与用户通话的是熟人,或用户打算 继续保持联系,则可以选择确认。当与通话对象再次通话时,终端设备100可以告知用户之前已发生过的通话的时间和时长。
可替代的,在本发明的一种可能的实施方式中,终端设备100也可以不提醒用户,而是把语音特征数据直接保存在本地或服务器。进一步的,保存的语音特征数据可以具有预设的数目。这避免了用户来不及保存或误操作,而丢失语音特征数据的情况。
图5为根据本发明一种可能的实施方式提供的终端设备的用户界面。在已保存了语音特征数据之后,终端设备100可以询问用户是否将联系人加入地址本。如果用户选择确定,终端设备100可以把已保存的相应的语音特征数据直接关联到联系人。在本实施方式中,操作简单自然,具有良好的用户体验。
在本发明的一种可能的实施方式中,用户也可以在任何时候新建联系人,此时终端设备100都可以把已保存的相应的语音特征数据直接关联到联系人。在本实施方式中,可以提供给用户丰富的使用场景。
在本发明的一种可能的实施方式中,终端设备100不提示用户是否保存语音特征数据,而是自动保存,在用户选择新建联系人时,终端设备100可以把已保存的相应的语音特征数据直接关联到联系人。
图6为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,在地址本中,终端设备100示出了三个联系人,Bush和Trump已保存有语音特征数据,Obama则还没有保存语音特征数据。
图7为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,当用户点击联系人Bush的语音特征数据的播放按钮,终端设备100会播放已保存的Bush的语音,使得用户可以熟悉Bush的语音。
在本发明的一种可能的实施方式中,已保存的联系人的语音可以是通话全程的录音。终端设备100也可以另行存储语音特征数据。
在本发明的一种可能的实施方式中,终端设备100可以根据同一通话对象每次通话中采集的语音来优化语音特征数据,以提高识别率。
图8为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100也可以接收用户的操作来删除联系人Bush相应的语音特征数据。例如,已保存的Bush的语音特征数据来自Bush的女儿,则这一语音特征数据错误,应当删除。
在本发明的一种可能的实施方式中,终端设备100也可以根据同一电话号码多次通话中占优的语音特征数据,自动删除可能是错误匹配的语音特征数据。
图9为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100可以接收用户的操作,为联系人Obama从文件中采集语音特征。终端设备100上可以保存有含有Obama语音的录音或视频文件,终端设备100可以从文件中直接得到Obama的语音特征数据,而无须进行通话。
在本发明的一种可能的实施方式中,终端设备100也可以通过启动录音APP等方式,主动采集联系人的语音特征数据。
图10为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,在与已保存了号码,却没有语音特征数据的联系人Obama的通话过程中,终端设备100自动采集语音特征数据,并可以随后提示用户保存或自动保存。
图11为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100将通话过程中采集的语音特征数据关联到已保存了号码的联系人Obama。
图12为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100当前在与陌生号码173XXXXXXX进行通话。终端设备100可以采集匹配正在通话的通话对象的语音特征值,匹配到了已保存的联系人Trump,则确定是Trump使用新号码来电。
图13为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100在确定是Trump使用新号码来电后,可以提示用户是否把陌生号码173XXXXXXX加入到地址本的联系人Trump中。
图14为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,陌生号码173XXXXXXX被加入到地址本的联系人Trump中,和Trump原来保存的172XXXXXXX一起。
在本发明的一种可能的实施方式中,终端设备100也可以不是将新号码173XXXXXXX与已保存号码172XXXXXXX保存到一起,而是将172XXXXXXX替换或覆盖掉。
图15为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,在终端设备100的通话记录中,有三条陌生号码来电的记录,在本地也没有匹配的语音特征数据。用户可能已经忘记了对应的号码的通话对象的身份,或者根本就不认识通话对象,却想获知其身份。
图16为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100可以提示用户与云端的语音特征数据库匹配通话记录,并可以接收用户的操作,来确定通话对象的身份。在本实施方式中,通过与云端的语音特征数据库匹配,终端设备100可以识别出陌生来电者的身份,如银行职员、保险推销人员、幼儿园教师等。
在本发明的一种可能的实施方式中,终端设备100也可以不需要用户的干预,而自行匹配云端的语音特征数据库,从而实现识别陌生来电者的身份。
在本发明的一种可能的实施方式中,终端设备100可以授权通话对象访问自己在云端的语音特征数据库,从而临时或长期地让特定或不特定通话对象获知自己的身份。
在本发明的一种可能的实施方式中,云端匹配可以在通话过程中进行,也可以在通话结束以后进行。
图17为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,在与云端的语音特征数据库匹配完成后,终端设备100识别出三个陌生号码的身份分别为Bush,Obama和Trump。在本实施方式中,每个人的语音特征就代表了自己的身份,从而在某些场景下,可以取消电话号码的存在。
图18为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100正在与地址本中保存的联系人Obama 171XXXXXXX通话,但终端设备100发现通话对象的语音特征数据与已保存的联系人Obama的语音特征数据不匹配。此时很可能有人冒用了Obama的电话,终端设备100可以提示用户当前通话对象不是Obama,以防止用户受骗。
图19为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100正在与地址本中保存的联系人Obama 171XXXXXXX通话,但终端设备100发现通话对象的语音特征数据与已保存的联系人Obama的语音特征数据不匹配,却与Trump匹配。此时有可能是地址本中保存的联系人信息有误,终端设备100可以提醒用户当前通话对象实际上是Trump,并接收用户的输入来更新地址本,将联系人Obama 171XXXXXXX的记录更正为Trump171XXXXXXX。
图20为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100可以具有黑名单功能,来应付同一通话对象更换电话号码对用户进行骚扰。在与陌生号码171XXXXXXX通话过程中,终端设备100匹配出通话对象的语音特征数据匹配于黑名单中的Trump,则可以提示用户当前是骚扰电话,是否要挂断。
在本发明的一种可能的实施方式中,终端设备100在本地或服务器保存的黑名单也可以没有名字,只有语音特征数据。终端设备100也可以只提醒用户当前通话对象在黑名单中,而不显示具体身份。进一步的,终端设备100的地址本也可以不保存号码,只保存语音特征数据。
图21为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100在确认当前陌生号码171XXXXXXX的通话对象为黑名单中的Trump时,则自动挂断当前通话。
在本发明的一种可能的实施方式中,终端设备100也可以在接听呼叫前进行语音验证,在先对通话对象的语音特征数据进行匹配以后,再确定是否 接听。终端设备100可以将匹配的结果提示给用户,让用户选择操作,或者自动接听或挂断。
图22为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100根据语音特征数据来判断身份也可以不局限于通话应用,而是可以应用到多种场景,例如Facetime,微信,Gtalk等语音或视频应用。终端设备100在与标注身份为Obama的联系人使用Facetime视频中,终端设备100采集视频中的语音特征数据,与保存在本地或云端的语音特征数据匹配,发现当前视频对象不是Obama,则向用户发出提示,以防用户被假视频欺骗。
在本发明的一种可能的实施方式中,在语音特征数据匹配的情况下,终端设备100也可以提示用户当前视频对象是Obama本人。
图23为根据本发明一种可能的实施方式提供的终端设备的用户界面。如图所示,终端设备100当前正在与地址本中记录的联系人Obama171XXXXXXX通话。终端设备100可以通过匹配保存的语音特征数据,提示用户当前通话的是Obama本人。
图24为根据本发明一种可能的实施方式提供的识别通话对象身份的方法的流程图。如图所示,终端设备100收到语音来电后,用户选择接听来电,终端设备100开始录制通话对象的语音信息,例如,前5s、10s、1min的语音信息,或者一定语音数据量的语音信息。
终端设备100判断是否是联系人号码来电。
如果终端设备100判断出是联系人号码来电,接下来则判断语音是否匹配地址本,以防止被人假冒熟悉号码来电。如果语音匹配地址本,则终端设备100可以比较当前通话对象的语音特征数据与地址本中保存的语音特征数据,将质量更好,即语音特征更明显的数据,保存进地址本并关联到当前联系人,覆盖掉之前保存的语音特征数据。终端设备100还可以提醒用户当前通话的是本人。如果当前通话对象的语音特征数据与地址本中保存的语音特征数据匹配,则终端设备100判断通话对象的语音特征数据是否在黑名单中,而冒用了联系人 的号码,或者通过改号软件改变来电号码。如果在黑名单中,则终端设备100提醒用户当前通话对象已被拉黑,这可能是诈骗电话。如果不在黑名单中,则为陌生人使用熟悉的号码来电,终端设备100可以提醒用户当心诈骗。
如果终端设备100判断出不是联系人号码来电,接下来,也可以比较当前通话对象的语音特征数据与地址本中保存的语音特征数据。如果当前通话对象的语音特征数据与地址本中保存的语音特征数据匹配,则判断为熟悉的联系人使用新号码来电,终端设备100可以显示匹配的地址本联系人及对应号码给用户,并提醒用户保存或者替换地址本中已有的联系人信息。如果不匹配,终端设备100接下来判断通话对象的语音特征数据是否在黑名单中。如果在黑名单中,则终端设备100可以提醒用户当前通话对象已拉黑,当前通话是骚扰电话,或者直接挂断。如果不在黑名单中,终端设备100则可以将当前通话对象的语音特征数据和号码关联保存到缓存中。保存在缓存中的数据条目可以设置上限,以节约终端设备100的存储空间。然后终端设备100可以提示用户这是陌生人的新号码来电,并提供给用户操作选项,例如,保存联系人,拉黑,或者无操作。如果终端设备100接收到用户保存联系人或者拉黑的操作,则可以将当前通话对象的语音特征数据保存到本地或云端的地址本或者其它形式的存储文件中。
在本发明的一种可能的实施方式中,提示信息可以通过UI显示、灯光、发声、振动、电流等方式提供给用户。
在本发明的一种可能的实施方式中,以上描述的功能也可以是在终端设备100进行主叫的通话中实施。
在本发明的一种可能的实施方式中,也可以只匹配语音特征数据,而不匹配号码。
在本发明的一种可能的实施方式中,陌生人也可以指代地址本中没有保存语音特征数据的通话对象,熟人可以指代地址本中保存有语音特征数据的通话对象。
在本发明的一种可能的实施方式中,匹配语音特征数据也可以在云端完成,终端设备只接收匹配的结果并呈现给用户。
图25为根据本发明一种可能的实施方式提供的系统的框图。如图所示,终端设备100包括存储器21,通信单元22,处理器23,和显示器24。存储器21用于保存具有语音特征数据的地址本,处理器23将通话过程中采集到的通话对象的语音特征数据与地址本中的语音特征数据进行匹配,来确定用户的身份,并将匹配的结果显示在显示器24上。通信单元22用于与服务器25进行通信,对具有语音特征数据的地址本进行同步。
图26为根据本发明一种可能的实施方式提供的终端设备的框图。如图所示,终端设备100包括存储模块31,采集模块32,处理模块33和显示模块34。存储模块31用于保存具有语音特征数据的地址本,采集模块32用于在通话过程中采集通话对象的语音特征数据,处理模块33用于将采集模块32采集到的通话对象的语音特征数据与存储模块31中的语音特征数据进行匹配,来确定用户的身份,并将匹配的结果显示在显示模块34上。
本发明的各实施方式可以任意进行组合,以实现不同的技术效果。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(DSL)或者诸如红外线、无线电和微波之类的无线 技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。
总之,以上所述仅为本发明技术方案的实施例而已,并非用于限定本发明的保护范围。凡根据本发明的揭露,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (33)

  1. 一种识别身份的方法,包括:
    终端设备在通话中采集通话对象的第一语音特征数据;及
    所述终端设备将所述第一语音特征数据与预设的第二语音特征数据进行匹配,来判断所述通话对象的身份。
  2. 如权利要求1所述的方法,其中,所述第二语音特征数据关联到所述终端设备的地址本。
  3. 如权利要求1-2任一项所述的方法,其中,所述第二语音数据以录音的方式存储在所述终端设备中。
  4. 如权利要求1-2任一项所述的方法,其中,所述第二语音数据以声纹特征值的方式存储在所述终端设备中。
  5. 如权利要求1-4任一项所述的方法,其中,所述通话是被叫通话。
  6. 如权利要求2-5任一项所述的方法,其中,当所述通话对象的号码没有保存在所述地址本中,所述第一语音特征数据匹配于所述第二语音特征数据时,所述终端设备将所述第二语音特征数据相关联的联系人信息显示在显示屏上。
  7. 如权利要求6所述的方法,进一步包括:所述终端设备提示用户将所述通话对象的号码保存进所述第二语音特征数据相关联的联系人信息中。
  8. 如权利要求2-7任一项所述的方法,其中,当所述通话对象的号码没有保存在所述地址本中,所述第一语音特征数据不匹配于所述第二语音特征数据时,所述终端设备提示用户将所述第一语音特征数据保存到所述地址本。
  9. 如权利要求2-8任一项所述的方法,其中,当所述通话对象的号码保存在所述地址本中,所述第一语音特征数据匹配于所述第二语音特征数据时,所述终端设备提示用户所述通话对象与所述地址本中的联系人一致。
  10. 如权利要求9所述的方法,进一步包括:所述终端设备将所述第一语音特征数据覆盖所述第二语音特征数据。
  11. 如权利要求2-10任一项所述的方法,其中,当所述通话对象的号码保存在所述地址本中,所述第一语音特征数据不匹配于所述第二语音特征数据时,所述终端设备提示用户所述通话对象与所述地址本中的联系人不一致。
  12. 如权利要求2-11任一项所述的方法,其中,当所述通话对象的号码与所述地址本中所述第二语音特征数据的联系人关联,所述第一语音特征数据匹配于预设的第三语音特征数据时,所述终端设备提示用户所述地址本中所述第二语音特征数据的联系人信息有误。
  13. 如权利要求12所述的方法,进一步包括:所述终端设备将所述通话对象的号码保存到所述地址本中所述第三语音特征数据相关联的联系人信息中。
  14. 如权利要求1-13任一项所述的方法,其中,所述终端设备将所述第一语音特征数据与预设的第四语音特征数据进行匹配,如果匹配,所述终端设备提示用户所述通话对象在黑名单中。
  15. 如权利要求1-14任一项所述的方法,其中,所述终端设备在接通通话之前,进行语音验证,对所述第一语音特征数据进行匹配。
  16. 如权利要求1-15任一项所述的方法,进一步包括:所述终端设备将所述第一语音特征数据和所述通话对象的号码关联保存,在接收到用户对所述通话对象的号码新建联系人的操作时,所述终端设备将所述第一语音特征数据关联到所述联系人。
  17. 一种终端设备,包括:
    处理器;及
    存储介质,其中,所述存储介质存储有程序,所述程序使得所述终端设备执行以下步骤:
    所述终端设备在通话中采集通话对象的第一语音特征数据;及
    所述终端设备将所述第一语音特征数据与预设的第二语音特征数据进行匹配,来判断所述通话对象的身份。
  18. 如权利要求17所述的终端设备,其中,所述第二语音特征数据关联到所述终端设备的地址本。
  19. 如权利要求17-18任一项所述的终端设备,其中,所述第二语音数据以录音的方式存储在所述终端设备中。
  20. 如权利要求17-18任一项所述的终端设备,其中,所述第二语音数据以声纹特征值的方式存储在所述终端设备中。
  21. 如权利要求17-20任一项所述的终端设备,其中,所述通话是被叫通话。
  22. 如权利要求18-21任一项所述的终端设备,其中,当所述通话对象的号码没有保存在所述地址本中,所述第一语音特征数据匹配于所述第二语音特征数据时,所述终端设备将所述第二语音特征数据相关联的联系人信息显示在显示屏上。
  23. 如权利要求22所述的终端设备,所述程序进一步使得:所述终端设备提示用户将所述通话对象的号码保存进所述第二语音特征数据相关联的联系人信息中。
  24. 如权利要求18-23任一项所述的终端设备,其中,当所述通话对象的号码没有保存在所述地址本中,所述第一语音特征数据不匹配于所述第二语音特征数据时,所述终端设备提示用户将所述第一语音特征数据保存到所述地址本。
  25. 如权利要求18-24任一项所述的终端设备,其中,当所述通话对象的号码保存在所述地址本中,所述第一语音特征数据匹配于所述第二语音特征数据时,所述终端设备提示用户所述通话对象与所述地址本中的联系人一致。
  26. 如权利要求25所述的终端设备,所述程序进一步使得:所述终端设备将所述第一语音特征数据覆盖所述第二语音特征数据。
  27. 如权利要求18-26任一项所述的终端设备,其中,当所述通话对象的号码保存在所述地址本中,所述第一语音特征数据不匹配于所述第二语音特征数据时,所述终端设备提示用户所述通话对象与所述地址本中的联系人不一致。
  28. 如权利要求18-27任一项所述的终端设备,其中,当所述通话对象的号码与所述地址本中所述第二语音特征数据的联系人关联,所述第一语音特征数据匹配于预设的第三语音特征数据时,所述终端设备提示用户所述地址本中所述第二语音特征数据的联系人信息有误。
  29. 如权利要求28所述的终端设备,所述程序进一步使得:所述终端设备将所述通话对象的号码保存到所述地址本中所述第三语音特征数据相关联的联系人信息中。
  30. 如权利要求17-29任一项所述的终端设备,其中,所述终端设备将所述第一语音特征数据与预设的第四语音特征数据进行匹配,如果匹配,所述终端设备提示用户所述通话对象在黑名单中。
  31. 如权利要求17-30任一项所述的终端设备,其中,所述终端设备在接通通话之前,进行语音验证,对所述第一语音特征数据进行匹配。
  32. 如权利要求17-31任一项所述的终端设备,所述程序进一步使得:所述终端设备将所述第一语音特征数据和所述通话对象的号码关联保存,在接收到用户对所述通话对象的号码新建联系人的操作时,所述终端设备将所述第一语音特征数据关联到所述联系人。
  33. 一种终端设备,具有地址本,其中,所述地址本包括至少一个联系人,所述联系人关联于语音特征数据。
PCT/CN2016/113990 2016-12-30 2016-12-30 识别通话对象身份的方法和终端设备 WO2018120241A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/113990 WO2018120241A1 (zh) 2016-12-30 2016-12-30 识别通话对象身份的方法和终端设备
CN201680091953.0A CN110121879B (zh) 2016-12-30 2016-12-30 识别通话对象身份的方法和终端设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/113990 WO2018120241A1 (zh) 2016-12-30 2016-12-30 识别通话对象身份的方法和终端设备

Publications (1)

Publication Number Publication Date
WO2018120241A1 true WO2018120241A1 (zh) 2018-07-05

Family

ID=62706770

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/113990 WO2018120241A1 (zh) 2016-12-30 2016-12-30 识别通话对象身份的方法和终端设备

Country Status (2)

Country Link
CN (1) CN110121879B (zh)
WO (1) WO2018120241A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225327A (zh) * 2021-04-29 2021-08-06 心动网络股份有限公司 基于语音识别的登录客户监督方法、装置、设备及介质
US12015960B1 (en) * 2021-09-02 2024-06-18 T-Mobile Innovations Llc System and method for redirection to optimal antenna arrays

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852560A (zh) * 2005-07-22 2006-10-25 华为技术有限公司 一种用户身份识别方法和呼叫控制方法与系统
CN101442579A (zh) * 2007-11-23 2009-05-27 中兴通讯股份有限公司 一种具有语音识别主叫用户信息的移动终端
CN201355554Y (zh) * 2008-12-22 2009-12-02 康佳集团股份有限公司 一种语音识别单元和移动通信终端
CN102780819A (zh) * 2012-07-27 2012-11-14 广东欧珀移动通信有限公司 一种移动终端的语音识别联系人的方法
CN103905612A (zh) * 2012-12-25 2014-07-02 联想(北京)有限公司 一种信息处理的方法及电子设备
CN104010060A (zh) * 2013-02-27 2014-08-27 联想(北京)有限公司 识别来电呼入方身份的方法和电子设备
CN104935713A (zh) * 2014-03-20 2015-09-23 海尔集团公司 通信终端存储电话号码的方法及装置
CN105306657A (zh) * 2014-06-20 2016-02-03 中兴通讯股份有限公司 身份识别方法、装置及通讯终端

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7027986B2 (en) * 2002-01-22 2006-04-11 At&T Corp. Method and device for providing speech-to-text encoding and telephony service
CN103700371B (zh) * 2013-12-13 2017-10-20 江苏大学 一种基于声纹识别的来电身份识别系统及其识别方法
CN105120068A (zh) * 2015-07-16 2015-12-02 百度在线网络技术(北京)有限公司 一种语音通信的接听方法及装置
CN105187667A (zh) * 2015-10-09 2015-12-23 小米科技有限责任公司 来电处理方法及装置
CN105872185A (zh) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 信息提示方法、装置及系统

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852560A (zh) * 2005-07-22 2006-10-25 华为技术有限公司 一种用户身份识别方法和呼叫控制方法与系统
CN101442579A (zh) * 2007-11-23 2009-05-27 中兴通讯股份有限公司 一种具有语音识别主叫用户信息的移动终端
CN201355554Y (zh) * 2008-12-22 2009-12-02 康佳集团股份有限公司 一种语音识别单元和移动通信终端
CN102780819A (zh) * 2012-07-27 2012-11-14 广东欧珀移动通信有限公司 一种移动终端的语音识别联系人的方法
CN103905612A (zh) * 2012-12-25 2014-07-02 联想(北京)有限公司 一种信息处理的方法及电子设备
CN104010060A (zh) * 2013-02-27 2014-08-27 联想(北京)有限公司 识别来电呼入方身份的方法和电子设备
CN104935713A (zh) * 2014-03-20 2015-09-23 海尔集团公司 通信终端存储电话号码的方法及装置
CN105306657A (zh) * 2014-06-20 2016-02-03 中兴通讯股份有限公司 身份识别方法、装置及通讯终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225327A (zh) * 2021-04-29 2021-08-06 心动网络股份有限公司 基于语音识别的登录客户监督方法、装置、设备及介质
US12015960B1 (en) * 2021-09-02 2024-06-18 T-Mobile Innovations Llc System and method for redirection to optimal antenna arrays

Also Published As

Publication number Publication date
CN110121879B (zh) 2020-12-15
CN110121879A (zh) 2019-08-13

Similar Documents

Publication Publication Date Title
WO2021175160A1 (zh) 信息显示方法及电子设备
JP5996783B2 (ja) 声紋特徴モデルを更新するための方法及び端末
US10819840B2 (en) Voice communication method
WO2016134630A1 (zh) 一种识别恶意电话的方法和装置
CN106161749B (zh) 一种恶意电话识别方法,及装置
CN108183853A (zh) 消息提醒方法、移动终端及可读存储介质
WO2019154182A1 (zh) 应用程序的音量设置方法及移动终端
CN105704531A (zh) 播放视频时的免打扰终端及方法
WO2019062364A1 (zh) 显示方法及移动终端
US11765114B2 (en) Voice communication method
WO2021238719A1 (zh) 信息显示方法及电子设备
WO2020063107A1 (zh) 截屏方法和终端
WO2019071424A1 (zh) 应用功能的控制方法及终端
WO2020238451A1 (zh) 终端控制方法和终端
CN108307043A (zh) 语音消息转换方法、移动终端及计算机可读存储介质
CN109587319A (zh) 一种来电处理方法、终端及计算机可读存储介质
WO2019120190A1 (zh) 拨号方法及移动终端
CN105306714A (zh) 一种智能感知操控方法及终端
CN107046595A (zh) 通知信息处理方法、装置及移动终端
CN109462700A (zh) 一种通话方法、移动终端及计算机可读存储介质
WO2019101127A1 (zh) 生物识别模块处理方法、装置及移动终端
WO2018120241A1 (zh) 识别通话对象身份的方法和终端设备
EP4156666A1 (en) Call prompting method, call device, readable storage medium and system on chip
CN109151184A (zh) 一种移动终端控制方法、移动终端及计算机可读存储介质
CN109922199B (zh) 一种联系人信息处理方法及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16925069

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16925069

Country of ref document: EP

Kind code of ref document: A1