[go: up one dir, main page]

CN117956067A - Remote control method, device and equipment for call equipment - Google Patents

Remote control method, device and equipment for call equipment Download PDF

Info

Publication number
CN117956067A
CN117956067A CN202311833828.0A CN202311833828A CN117956067A CN 117956067 A CN117956067 A CN 117956067A CN 202311833828 A CN202311833828 A CN 202311833828A CN 117956067 A CN117956067 A CN 117956067A
Authority
CN
China
Prior art keywords
user
communication equipment
communication
equipment
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311833828.0A
Other languages
Chinese (zh)
Inventor
杨锋
王声平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Waterward Software Technology Co ltd
Original Assignee
Shenzhen Waterward Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Waterward Software Technology Co ltd filed Critical Shenzhen Waterward Software Technology Co ltd
Priority to CN202311833828.0A priority Critical patent/CN117956067A/en
Publication of CN117956067A publication Critical patent/CN117956067A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/14Use of phonemic categorisation or speech recognition prior to speaker recognition or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computational Linguistics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to the technical field of equipment control, and discloses a remote control method, a remote control device and remote control equipment for communication equipment, wherein the method comprises the following steps: monitoring whether a user of the first call equipment has an operation requirement or not in the call process of the first call equipment and the second call equipment; if yes, authenticating the identity of the user of the second communication equipment for multiple times; if the authentication is successful for a plurality of times, monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format; if yes, the first communication device is controlled according to the control command. The invention enables children to remotely control the mobile phone of the old.

Description

Remote control method, device and equipment for call equipment
Technical Field
The present application relates to the field of device control technologies, and in particular, to a method, an apparatus, and a device for remote control of a call device.
Background
Because of the poor memory of the elderly and the poor acceptance of new things, the elderly may experience many problems during use of smartphones, such as not knowing how to operate the phone or how to operate certain functions of the phone. In some cases, the old must use the smart phone, but the old cannot use the smart phone, but the child is not at the side of the child, and the old cannot be helped to operate the smart phone in a hand, so that the old is helped and has no door. This problem needs to be solved.
Disclosure of Invention
The invention mainly aims to provide a remote control method, a remote control device and remote control equipment for communication equipment, and aims to solve the problem that the old does not know how to control a mobile phone, and children are not at the side of the old, so that the old cannot be helped to control the mobile phone in a hand.
In order to achieve the above object, an embodiment of the present application provides a remote control method for a call device, where the method includes:
monitoring whether a user of the first call equipment has an operation requirement or not in the call process of the first call equipment and the second call equipment;
If yes, authenticating the identity of the user of the second communication equipment for multiple times;
if the authentication is successful for a plurality of times, monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format;
if yes, the first communication device is controlled according to the control command.
Further, the preset sentence format is: start tag + maneuver command + end tag.
Further, the step of authenticating the identity of the user of the second communication device multiple times includes:
extracting voiceprint features of a second telephony device user based on speech of the second telephony device user;
Judging whether the voiceprint characteristics of the second communication equipment user are consistent with the voiceprint characteristics prestored in the first communication equipment;
If the authentication is inconsistent, judging that the first authentication is unsuccessful;
If the two types of the first authentication are consistent, judging that the first authentication is successful, and acquiring a real-time photo or a real-time video clip of the second communication equipment user or a response of the second communication equipment user to a question sent by the first communication equipment user;
And after detecting that the user of the first communication device confirms that the real-time photo or the real-time video clip or the answer is correct, judging that the second authentication is successful, otherwise, judging that the second authentication is unsuccessful.
Further, the step of controlling the first call device according to the control command includes:
During the process of controlling the first communication equipment according to the control command, the operation of the first communication equipment is identified in real time;
when the user identifies that the user has the predefined sensitive operation, suspending the sensitive operation and carrying out warning prompt, and requesting the user of the first communication device to confirm whether to continue to execute the sensitive operation;
when the user of the first communication device is detected to confirm that the sensitive operation is continuously executed, the sensitive operation is continuously executed;
And when detecting that the user of the first communication device gives up executing the sensitive operation, terminating the flow of controlling the first communication device according to the control command.
Further, the step of controlling the first call device according to the control command includes:
During the process of controlling the first communication equipment according to the control command, identifying an operating application program;
if the application program which is identified to be operated is a pre-defined sensitive application program, and when the application program is identified to be switched to another application program to be operated, suspending the operation of the first call equipment, carrying out warning prompt, and requesting a user of the first call equipment to confirm whether the switching to the another application program is allowed to be operated;
when detecting that the user of the first communication device is allowed to switch to the other application program for operation, continuing to control the first communication device according to the control command;
And when detecting that the user of the first communication device is not allowed to switch to the other application program for operation, terminating the flow of controlling the first communication device according to the control command.
Further, when the warning is performed through voice, the step of performing warning prompt further includes:
Acquiring real-time voice acquired by a microphone of first communication equipment in real time;
separating warning voice from the real-time voice through a voice separation method, and filtering the warning voice to obtain a first voice;
and the first voice is sent to the second communication equipment after being coded and compressed.
Further, the step of monitoring whether the user of the first call device has an operation requirement includes:
carrying out semantic recognition on real-time voice of a user of the first communication equipment, and acquiring a semantic recognition result;
And when the semantic recognition result is related to operation, judging that the user of the first communication equipment has operation requirements, otherwise, judging that the user of the first communication equipment has no operation requirements.
Further, the step of monitoring whether the user of the first call device has an operation requirement includes:
keyword recognition is carried out on real-time voice of a user of the first communication equipment;
When the keyword is identified, judging that the user of the first communication equipment has the operation requirement, otherwise, judging that the user of the first communication equipment has no operation requirement; wherein the keywords are keywords related to operations.
In a second aspect, an embodiment of the present application provides a remote control device for a call device, where the device includes:
The first monitoring module is used for monitoring whether a user of the first communication equipment has an operation requirement or not in the communication process of the first communication equipment and the second communication equipment;
the authentication module is used for authenticating the identity of the user of the second communication equipment for multiple times if the identity exists;
the second monitoring module is used for monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format if the authentication is successful for a plurality of times;
and the control module is used for controlling the first communication equipment according to the control command if yes.
A third aspect of the present application proposes a computer device comprising a memory storing a computer program and a processor implementing the steps of the telephony device remote control method of any of the above described aspects when the computer program is executed.
A fourth aspect of the present application proposes a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the telephony device remote control method of any of the above.
According to the embodiment of the application, whether the user of the first communication equipment has an operation requirement or not is monitored in the communication process of the first communication equipment and the second communication equipment, and when the user of the first communication equipment has the operation requirement, the identity of the user of the second communication equipment is authenticated for multiple times, and the identity of the user of the second communication equipment is authenticated for multiple times, so that only authorized personnel can remotely control, malicious operation or abuse of the equipment by unauthorized personnel is prevented, and the information safety and the fund safety of the first communication equipment are ensured. In addition, after the authentication is successful for a plurality of times, whether the user of the second communication device speaks the operation command in a preset statement format or not is monitored, and the operation command is very accurately positioned to the operation command when the user speaks the operation command in the preset statement format, so that the recognition accuracy is improved, and in addition, normal communication is not influenced. Finally, if the user of the second communication device is monitored to speak the control command in the preset statement format, the first communication device is controlled according to the control command, so that the child can remotely control the mobile phone of the old, and the problem that the old does not know how to control the mobile phone, but the child is not at the side, and cannot help the old to control the mobile phone in a hand is solved.
Drawings
Fig. 1 is a flow chart of a remote control method of a call device according to an embodiment of the application;
fig. 2 is a schematic block diagram of a remote control device for a call device according to an embodiment of the present application;
fig. 3 is a schematic block diagram of a computer device according to an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, modules, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, modules, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any module and all combination of one or more of the associated listed items.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Referring to fig. 1, an embodiment of the present invention provides a remote control method for a call device, where the method includes steps S1 to S4.
In the application, the communication equipment can be electronic equipment with communication functions such as a smart phone, a smart tablet and the like. The first communication device is a controlled end, the second communication device is a controlled end, and a user of the second communication device can remotely control the first communication device through voice (by means of the second communication device). Through the scheme, the child can remotely control the mobile phone of the old, so that the problem that the old does not know how to control the mobile phone, but the child is not at the side and cannot help the old to control the mobile phone in hands is solved.
The present application may be executed by a server, or may be executed by a first call device, or may be executed by both the first call device and the server, where the first call device and the second call device need to have a networking function and need to be in a networking state, and a server is taken as an example.
S1, monitoring whether a user of the first communication equipment has an operation requirement or not in the communication process of the first communication equipment and the second communication equipment.
In step S1, the first telephony device turns on a function that allows other telephony devices to remotely manipulate itself under certain conditions. After the first call device and the second call device establish call connection, the server monitors whether the user of the first call device has operation requirements in real time, specifically, analyzes the voice signal collected by the microphone of the first call device in real time, and analyzes whether the user of the first call device has operation requirements, for example, the user of the first call device speaks a certain function of my payment device and does not know how to operate, and through analyzing the sentence, the user of the first call device can know how to operate but not how to operate, namely, the user of the first call device has operation requirements.
And S2, if the user identity of the second communication equipment is authenticated for a plurality of times.
In step S2, the second communication device may collect identity feature information of its user, where the identity feature information refers to feature information that can indicate identity, such as voiceprints, photos, videos, and so on. The second telephony device may allow other devices to read the identity information. If the second communication device is not allowed to collect the identity information of the user of the second communication device or is not allowed to read the identity information, the identity of the user of the second communication device cannot be authenticated, and in this case, the user of the first communication device is fed back, and the process is ended. And carrying out multiple authentications on the identity of the user of the second communication equipment, specifically, carrying out multiple authentications by utilizing corresponding identity characteristic information according to a set sequence, for example, firstly utilizing voiceprint authentication, then utilizing photo or video authentication, or firstly utilizing photo or video authentication and then utilizing voiceprint authentication. The embodiment of the invention does not limit the authentication sequence.
The step can ensure that only authorized personnel can remotely control the equipment through carrying out multiple times of authentication on the identity of the user of the second communication equipment, prevent the unauthorized personnel from carrying out malicious operation or abuse on the equipment, and ensure the information safety and the fund safety of the first communication equipment.
And S3, if the authentication is successful for a plurality of times, monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format.
In step S3, specifically, after the authentication is successful for multiple times, the second session device is authorized to control the first session device, after the authentication is successful, a result of the successful authorization is fed back to a user of the second session device, after the user of the second session device knows that the authentication is successful, an operation control command needs to be spoken according to a preset statement format to realize the operation of the first session device through the server, where the preset statement format is as follows: start tag + command + end tag, such as "start operation, open application store, download payment instrument, end operation". According to the embodiment of the application, whether the user of the second communication equipment speaks the control command in the preset statement format or not is monitored, specifically speaking the control command in the statement format of the start tag, the control command and the end tag, the control command can be very accurately positioned, the identification accuracy is improved, and in addition, normal communication is not influenced. It should be noted that this step may be replaced by the following steps: if the authentication is successful, whether the user of the second communication equipment speaks the operation command is monitored through semantic analysis. However, if the user of the second communication device recognizes the command through semantic analysis, the normal communication and the operation content are easily confused, and a recognition error problem occurs. In addition, the semantic recognition needs large data support, the calculation speed is slow, and the operation in the real-time conversation process is seriously influenced by the calculation speed.
It should be noted that the preset sentence format may include preset sentence words, and only mutually agreed persons know the set sentence words, because the preset sentence format may actually form the role of re-authentication besides the operation command opening.
And S4, if so, controlling the first communication equipment according to the control command.
In step S4, the first call device is operated according to the operation command, so that the child can remotely operate the mobile phone of the old, and the problem that the old does not understand how to operate the mobile phone, but the child is not at the side, and cannot help the old to operate the mobile phone in hand is solved.
According to the embodiment of the application, whether the user of the first communication equipment has an operation requirement or not is monitored in the communication process of the first communication equipment and the second communication equipment, and when the user of the first communication equipment has the operation requirement, the identity of the user of the second communication equipment is authenticated for multiple times, and the identity of the user of the second communication equipment is authenticated for multiple times, so that only authorized personnel can remotely control, malicious operation or abuse of the equipment by unauthorized personnel is prevented, and the information safety and the fund safety of the first communication equipment are ensured. In addition, after the authentication is successful for a plurality of times, whether the user of the second communication device speaks the operation command in the preset statement format is monitored, the operation command is very accurately positioned to the operation command when the user speaks the operation command in the preset statement format, so that the recognition accuracy is improved, normal communication is not affected, and the preset statement format also forms the re-identity authentication. Finally, if the user of the second communication device is monitored to speak the control command in the preset statement format, the first communication device is controlled according to the control command, so that the child can remotely control the mobile phone of the old, and the problem that the old does not know how to control the mobile phone, but the child is not at the side, and cannot help the old to control the mobile phone in a hand is solved.
In an embodiment, the preset sentence format is: start tag + maneuver command + end tag.
According to the embodiment of the application, whether the user of the second communication equipment speaks the control command in the format of the start tag, the control command and the end tag is monitored, the control command can be very accurately positioned, and therefore the identification accuracy is improved. In addition, normal communication is not affected.
In one embodiment, the step of authenticating the identity of the user of the second communication device multiple times includes:
S21, extracting voiceprint features of a user of the second communication device based on voice of the user of the second communication device;
s22, judging whether the voiceprint characteristics of the second communication equipment user are consistent with the voiceprint characteristics prestored in the first communication equipment;
s23, if the authentication is inconsistent, judging that the first authentication is unsuccessful;
S24, if the two types of the first authentication are consistent, judging that the first authentication is successful, and acquiring a real-time photo or a real-time video clip of the second conversation device user or a response of the second conversation device user to a question sent by the first conversation device user;
S25, after the first call equipment user is detected to confirm that the real-time photo or the real-time video clip or the answer is correct, the second authentication is judged to be successful, otherwise, the second authentication is judged to be unsuccessful.
In the embodiment of the present application, specifically, in step S21, the voiceprint feature may be extracted by a voiceprint extraction algorithm, for example, a Mel Frequency Cepstral Coefficient (MFCC) extraction method, and a Linear Predictive Coding (LPC) extraction method. In step S22, the determining whether the voiceprint feature of the second communication device user is consistent with the voiceprint feature pre-stored in the first communication device specifically includes: and calculating the similarity between the voiceprint characteristics of the second communication equipment user and the voiceprint characteristics prestored in the first communication equipment, and if the similarity is larger than a set threshold value, considering the voiceprint characteristics to be consistent with the voiceprint characteristics, otherwise, considering the voiceprint characteristics to be inconsistent with the voiceprint characteristics. The similarity calculation method may be cosine similarity, euclidean distance, or the like. When it is required to be described, the user of the second communication device is the user of the second communication device, and the user of the first communication device is the user of the first communication device. The first call device needs to record the voice of the person who gives the control authority in advance, so that voiceprint features can be extracted and stored in the first call device based on the recorded voice, and the voiceprint features are uploaded to the server by the first call device. In step S24, after the authentication is successful, a request for acquiring a real-time photo or a request for acquiring a real-time video is sent to the second session device, if the user of the second session device agrees to the request, the second session device starts the front camera to take a picture or record a video, so as to obtain a real-time photo or a real-time video clip of the user of the second session device, sends the real-time photo or the real-time video clip to the first session device, and requests the user of the first session device to confirm whether the person who wants to give control authority to the photo or the video clip (i.e. confirm whether the photo or the video clip is correct), and if so, determines that the authentication is successful. In addition, if the first authentication is successful, the second call device user needs to obtain the answer to the question sent by the first call device user, then the first call device needs to obtain the question sent by the first call device, then the question is sent to the second call device, the second call device user answers the question, and the second call device obtains the answer and returns the answer to the first call device user to confirm whether the answer is correct or not. For example, the elderly speaks "what day my birthday is" (the question is generally known only to the child) for whom the child needs to answer.
According to the embodiment of the application, the voiceprint characteristics of the user of the second communication equipment are acquired for authentication, and the voiceprint is a unique biological characteristic of an individual, has higher uniqueness and stability, is difficult to forge and imitate, and improves the reliability of identity authentication. In addition, the voiceprint recognition does not need an additional device, only needs to use voice for authentication, is convenient and quick, and improves convenience. By acquiring the real-time photo, video or answering questions of the user of the second communication device, the information in the authentication process can be ensured to be real-time, thus the authentication in a mode that static pictures or recordings and the like are easy to forge can be avoided, and the reliability of the authentication is improved. The risk of impersonation displacement can be greatly reduced through multiple times of authentication, the accuracy and the credibility of authentication are improved, and the information safety and the fund safety of the first communication equipment are ensured.
Through the scheme, when the voice print characteristics and the real-time photos or the persons in the real-time fragments at the other end of the call are children of the old, the other end of the call is allowed to control the mobile phone of the old, so that the information safety and the fund safety of the old are ensured.
In an embodiment, the step of controlling the first call device according to the control command includes:
During the process of controlling the first communication equipment according to the control command, the operation of the first communication equipment is identified in real time;
when the user identifies that the user has the predefined sensitive operation, suspending the sensitive operation and carrying out warning prompt, and requesting the user of the first communication device to confirm whether to continue to execute the sensitive operation;
when the user of the first communication device is detected to confirm that the sensitive operation is continuously executed, the sensitive operation is continuously executed;
And when detecting that the user of the first communication device gives up executing the sensitive operation, terminating the flow of controlling the first communication device according to the control command.
In the embodiment of the present application, the sensitive operation includes a password input operation or an identity information input operation, for example, when it is identified that a payment password needs to be input, the operation of suspending the user of the first call device from inputting the payment password, that is, not allowing the user of the first call device to input the payment password and performing an alert prompt to alert the user of the first call device that the user of the first call device may cause information leakage or property loss, where the alert prompt may be any one or a combination of several of a text prompt, an icon prompt and a voice prompt, and requests the user of the first call device to confirm whether to continue to perform the sensitive operation, and only when it is detected that the user of the first call device confirms to continue to perform the sensitive operation, the sensitive operation is continued, that is, the user of the first call device is allowed to input the payment password or the identity information. Otherwise, the flow of controlling the first communication equipment according to the control command is terminated, and the control is ended.
In the embodiment of the application, the operation of the first communication equipment is identified in real time in the process of controlling the first communication equipment according to the control command; when the sensitive operation is identified, suspending the sensitive operation and carrying out warning prompt, and requesting a user of the first communication equipment to confirm whether to continue executing the sensitive operation; when the user of the first communication device is detected to confirm that the sensitive operation is continuously executed, the sensitive operation is continuously executed; when the user of the first communication device is detected to give up executing the sensitive operation, the process of controlling the first communication device according to the control command is terminated, so that the occurrence of information leakage or property loss events can be reduced.
In an embodiment, the step of controlling the first call device according to the control command includes:
During the process of controlling the first communication equipment according to the control command, identifying an operating application program;
if the application program which is identified to be operated is a pre-defined sensitive application program, and when the application program is identified to be switched to another application program to be operated, suspending the operation of the first call equipment, carrying out warning prompt, and requesting a user of the first call equipment to confirm whether the switching to the another application program is allowed to be operated;
when detecting that the user of the first communication device is allowed to switch to the other application program for operation, continuing to control the first communication device according to the control command;
And when detecting that the user of the first communication device is not allowed to switch to the other application program for operation, terminating the flow of controlling the first communication device according to the control command.
In an embodiment of the present application, the predefined sensitive application may be a payment type application, such as a bank APP, a payment device, etc. The further application may be any application, including sensitive applications. For example, when the operation is performed on the banking APP of the sponsor, if the operation of switching to the vacation QQ from the banking APP of the sponsor is detected, the operation of the first communication equipment is suspended, the warning prompt is performed, and the user of the first communication equipment is requested to confirm whether the operation of switching to the vacation QQ is allowed or not; when detecting that the user of the first communication device allows switching to the transmission QQ for operation, continuing to control the first communication device according to the control command; and when detecting that the user of the first communication equipment is not allowed to switch to the transmission QQ for operation, terminating the flow of controlling the first communication equipment according to the control command. Because the sensitive application program has the sensitive information of the user of the first general device, when the user detects that the sensitive application program is switched to other application programs for operation, the user of the first communication device is required to confirm to operate the sensitive application program in other application programs, so that the leakage of the sensitive information of the user of the first device can be avoided, and the safety of the data information is improved.
In an embodiment, when the warning is performed by voice, the step of performing warning prompt further includes:
Acquiring real-time voice acquired by a microphone of first communication equipment in real time;
separating warning voice from the real-time voice through a voice separation method, and filtering the warning voice to obtain a first voice;
and the first voice is sent to the second communication equipment after being coded and compressed.
In the embodiment of the application, the warning voice is the voice for playing the warning information. The speech separation method (or audio source separation) refers to separating different audio sources from a mixed audio signal, for example, separating the speech of each speaker from a mixed audio containing a plurality of speakers. The speech separation method can adopt the existing end-to-end speech separation model based on deep learning. Because the voice broadcast is reported, the microphone can collect voice broadcast sound, if the voice broadcast sound is not filtered, then warning sound can be transmitted to the second communication equipment, if the second communication equipment is a fraud person, the opportunity of timely response of the fraud person is given, namely, the fraud person can deceive the user of the first communication equipment by using other speech techniques, which is unfavorable to the user of the first communication equipment, and is unfavorable to the old people.
In an embodiment, the step of monitoring whether the user of the first call device has an operation requirement includes:
carrying out semantic recognition on real-time voice of a user of the first communication equipment, and acquiring a semantic recognition result;
And when the semantic recognition result is related to operation, judging that the user of the first communication equipment has operation requirements, otherwise, judging that the user of the first communication equipment has no operation requirements.
In the embodiment of the application, compared with keyword recognition, semantic recognition can mine whether the user of the first communication equipment really has operation requirements, but the calculation speed is slightly slow.
In an embodiment, the step of monitoring whether the user of the first call device has an operation requirement includes:
keyword recognition is carried out on real-time voice of a user of the first communication equipment;
When the keyword is identified, judging that the user of the first communication equipment has the operation requirement, otherwise, judging that the user of the first communication equipment has no operation requirement; wherein the keywords are keywords related to operations.
Compared with semantic recognition, the keyword recognition calculation speed is higher, so that the speed of operation demand recognition is improved, and the technology is more suitable for low-resource equipment.
Referring to fig. 2, in a second aspect, an embodiment of the present application provides a remote control device for a call device, where the device includes:
the first monitoring module 1 is used for monitoring whether a user of the first communication equipment has an operation requirement or not in the communication process of the first communication equipment and the second communication equipment;
An authentication module 2, configured to authenticate the identity of the user of the second communication device multiple times, if any;
the second monitoring module 3 is configured to monitor whether a user of the second session device speaks an operation command in a preset sentence format if the authentication is successful;
And the control module 4 is used for controlling the first communication equipment according to the control command if yes.
In an embodiment, the preset sentence format is: start tag + maneuver command + end tag.
In one embodiment, the authentication module 2 comprises:
the voice print feature extraction unit is used for extracting voice print features of the second conversation device user based on voice of the second conversation device user;
The judging unit is used for judging whether the voiceprint characteristics of the second communication equipment user are consistent with the voiceprint characteristics prestored in the first communication equipment;
A first judging unit for judging that the first authentication is unsuccessful if the first authentication is inconsistent;
The second judging unit is used for judging that the first authentication is successful if the first authentication is consistent, and acquiring a real-time photo or a real-time video clip of the second conversation device user or a response of the second conversation device user to a question sent by the first conversation device user;
And the third judging unit is used for judging that the second authentication is successful after detecting that the user of the first communication equipment confirms that the real-time photo or the real-time video clip or the answer is correct, or else judging that the second authentication is unsuccessful.
In an embodiment, the manipulation module 4 comprises:
The first identification unit is used for identifying the operation of the first communication equipment in real time in the process of controlling the first communication equipment according to the control command;
A suspension unit, configured to suspend a sensitive operation and perform a warning prompt when it is identified that the sensitive operation has a predefined sensitive operation, and request a user of the first call device to confirm whether to continue to perform the sensitive operation;
the execution unit is used for continuing to execute the sensitive operation when the user of the first communication device is detected to confirm that the sensitive operation is continued to be executed;
And the first termination unit is used for terminating the flow of controlling the first call equipment according to the control command when detecting that the user of the first call equipment gives up executing the sensitive operation.
In an embodiment, the manipulation module 4 comprises:
The second identification unit is used for identifying an operating application program in the process of controlling the first communication equipment according to the control command;
The second suspension unit is used for suspending the operation of the first call equipment and carrying out warning prompt and requesting the user of the first call equipment to confirm whether the operation is allowed to be switched to the other application program or not if the operation is identified as the predefined sensitive application program and the operation is identified to be switched to the other application program;
A control unit, configured to, when it is detected that the user of the first telephony device allows switching to the other application program for operation, continue to control the first telephony device according to the control command;
and the third termination unit is used for terminating the flow of controlling the first call equipment according to the control command when detecting that the user of the first call equipment is not allowed to switch to the other application program for operation.
In an embodiment, when alerting through voice, after alerting, the method further includes:
Acquiring real-time voice acquired by a microphone of first communication equipment in real time;
separating warning voice from the real-time voice through a voice separation method, and filtering the warning voice to obtain a first voice;
and the first voice is sent to the second communication equipment after being coded and compressed.
In an embodiment, the first listening module 1 comprises:
the semantic recognition unit is used for carrying out semantic recognition on the real-time voice of the user of the first communication equipment and acquiring a semantic recognition result;
and the fourth judging unit is used for judging that the user of the first communication equipment has operation requirements when the semantic recognition result is related to operation, and judging that the user of the first communication equipment has no operation requirements otherwise.
In an embodiment, the first listening module 1 comprises:
the keyword recognition unit is used for recognizing keywords of the real-time voice of the user of the first communication equipment;
A fifth judging unit, configured to judge that the user of the first call device has a need for operation when the keyword is identified, and otherwise, judge that the user of the first call device has no need for operation; wherein the keywords are keywords related to operations.
Referring to fig. 3, an embodiment of the present application further provides a computer device, and an internal structure of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The nonvolatile storage medium stores an operating device, a computer program, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer equipment is used for storing data of a remote control method of the communication equipment and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. Further, the above-mentioned computer apparatus may be further provided with an input device, a display screen, and the like. The computer program, when executed by a processor, is configured to implement a method for remote control of a call device, including: monitoring whether a user of the first call equipment has an operation requirement or not in the call process of the first call equipment and the second call equipment; if yes, authenticating the identity of the user of the second communication equipment for multiple times; if the authentication is successful for a plurality of times, monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format; if yes, the first communication device is controlled according to the control command. It will be appreciated by those skilled in the art that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
An embodiment of the present application further provides a computer readable storage medium having a computer program stored thereon, where the computer program when executed by a processor implements the above-mentioned remote control method for a call device, including: monitoring whether a user of the first call equipment has an operation requirement or not in the call process of the first call equipment and the second call equipment; if yes, authenticating the identity of the user of the second communication equipment for multiple times; if the authentication is successful for a plurality of times, monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format; if yes, the first communication device is controlled according to the control command. It is understood that the computer readable storage medium in this embodiment may be a volatile readable storage medium or a nonvolatile readable storage medium.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present application and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes using the descriptions and drawings of the present invention or directly or indirectly applied to other related technical fields are included in the scope of the invention.

Claims (10)

1. A method for remote control of a call device, the method comprising:
monitoring whether a user of the first call equipment has an operation requirement or not in the call process of the first call equipment and the second call equipment;
If yes, authenticating the identity of the user of the second communication equipment for multiple times;
if the authentication is successful for a plurality of times, monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format;
if yes, the first communication device is controlled according to the control command.
2. The remote control method of a call device according to claim 1, wherein the preset sentence format is: start tag + maneuver command + end tag.
3. The telephony device remote control method as claimed in claim 1, wherein the step of authenticating the identity of the user of the second telephony device a plurality of times comprises:
extracting voiceprint features of a second telephony device user based on speech of the second telephony device user;
Judging whether the voiceprint characteristics of the second communication equipment user are consistent with the voiceprint characteristics prestored in the first communication equipment;
If the authentication is inconsistent, judging that the first authentication is unsuccessful;
If the two types of the first authentication are consistent, judging that the first authentication is successful, and acquiring a real-time photo or a real-time video clip of the second communication equipment user or a response of the second communication equipment user to a question sent by the first communication equipment user;
And after detecting that the user of the first communication device confirms that the real-time photo or the real-time video clip or the answer is correct, judging that the second authentication is successful, otherwise, judging that the second authentication is unsuccessful.
4. The telephony device remote control method of claim 1, wherein the step of controlling the first telephony device in response to the control command comprises:
During the process of controlling the first communication equipment according to the control command, the operation of the first communication equipment is identified in real time;
when the user identifies that the user has the predefined sensitive operation, suspending the sensitive operation and carrying out warning prompt, and requesting the user of the first communication device to confirm whether to continue to execute the sensitive operation;
when the user of the first communication device is detected to confirm that the sensitive operation is continuously executed, the sensitive operation is continuously executed;
And when detecting that the user of the first communication device gives up executing the sensitive operation, terminating the flow of controlling the first communication device according to the control command.
5. The telephony device remote control method of claim 1, wherein the step of controlling the first telephony device in response to the control command comprises:
During the process of controlling the first communication equipment according to the control command, identifying an operating application program;
if the application program which is identified to be operated is a pre-defined sensitive application program, and when the application program is identified to be switched to another application program to be operated, suspending the operation of the first call equipment, carrying out warning prompt, and requesting a user of the first call equipment to confirm whether the switching to the another application program is allowed to be operated;
when detecting that the user of the first communication device is allowed to switch to the other application program for operation, continuing to control the first communication device according to the control command;
And when detecting that the user of the first communication device is not allowed to switch to the other application program for operation, terminating the flow of controlling the first communication device according to the control command.
6. The method for remote control of a call device according to claim 4 or 5, wherein, when alerting by voice, the alerting step further comprises:
Acquiring real-time voice acquired by a microphone of first communication equipment in real time;
separating warning voice from the real-time voice through a voice separation method, and filtering the warning voice to obtain a first voice;
and the first voice is sent to the second communication equipment after being coded and compressed.
7. The telephony device remote control method as claimed in claim 1, wherein the step of monitoring whether the user of the first telephony device has an operational requirement comprises:
carrying out semantic recognition on real-time voice of a user of the first communication equipment, and acquiring a semantic recognition result;
And when the semantic recognition result is related to operation, judging that the user of the first communication equipment has operation requirements, otherwise, judging that the user of the first communication equipment has no operation requirements.
8. The telephony device remote control method as claimed in claim 1, wherein the step of monitoring whether the user of the first telephony device has an operational requirement comprises:
keyword recognition is carried out on real-time voice of a user of the first communication equipment;
When the keyword is identified, judging that the user of the first communication equipment has the operation requirement, otherwise, judging that the user of the first communication equipment has no operation requirement; wherein the keywords are keywords related to operations.
9. A remote control device for a telephony device, the device comprising:
The first monitoring module is used for monitoring whether a user of the first communication equipment has an operation requirement or not in the communication process of the first communication equipment and the second communication equipment;
the authentication module is used for authenticating the identity of the user of the second communication equipment for multiple times if the identity exists;
the second monitoring module is used for monitoring whether a user of the second communication equipment speaks an operation control command in a preset statement format if the authentication is successful for a plurality of times;
and the control module is used for controlling the first communication equipment according to the control command if yes.
10. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, carries out the steps of the telephony device remote control method of any of claims 1 to 8.
CN202311833828.0A 2023-12-27 2023-12-27 Remote control method, device and equipment for call equipment Pending CN117956067A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311833828.0A CN117956067A (en) 2023-12-27 2023-12-27 Remote control method, device and equipment for call equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311833828.0A CN117956067A (en) 2023-12-27 2023-12-27 Remote control method, device and equipment for call equipment

Publications (1)

Publication Number Publication Date
CN117956067A true CN117956067A (en) 2024-04-30

Family

ID=90804064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311833828.0A Pending CN117956067A (en) 2023-12-27 2023-12-27 Remote control method, device and equipment for call equipment

Country Status (1)

Country Link
CN (1) CN117956067A (en)

Similar Documents

Publication Publication Date Title
US10417405B2 (en) Device access using voice authentication
KR102250460B1 (en) Methods, devices and systems for building user glottal models
US20030074201A1 (en) Continuous authentication of the identity of a speaker
US9607621B2 (en) Customer identification through voice biometrics
CN104270404B (en) A kind of login method and device based on terminal iidentification
CN108074310B (en) Voice interaction method based on voice recognition module and intelligent lock management system
US20220029981A1 (en) Voice biometric authentication in a virtual assistant
EP2840767A1 (en) Speaker recognition and voice tagging for improved service
US9014347B2 (en) Voice print tagging of interactive voice response sessions
CN105827581A (en) Account login method and terminal
JP6693126B2 (en) User authentication system, user authentication method and program
JP2000067005A (en) Identity verification method, device using the method, and recording medium recording identity verification device control program
WO2020189432A1 (en) Authentication system and authentication method
CN117956067A (en) Remote control method, device and equipment for call equipment
Tanwar et al. An approach to ensure security using voice authentication system
CN212515893U (en) Self-service terminal of police service
EP4506838A1 (en) Methods and systems for authenticating users
CN111785280A (en) Identity authentication method and device, storage medium and electronic equipment
CN118197313A (en) Response control method, device and terminal of voice assistant
TR2024018022A2 (en) IMEI CLONING DETECTION SYSTEM
CA3251160A1 (en) Methods and systems for authenticating users
CN117351945A (en) Identity authentication methods, devices and media
HK1191114B (en) Device access using voice authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination