CN-121979470-A - Voice control method and related device
Abstract
The application discloses a voice control method, which comprises the steps that electronic equipment is in a screen locking state, and a first operation is detected. In response to the first operation, the electronic device triggers authentication of the user and triggers the speech recognition application to detect the speech instruction. When the voice recognition application of the electronic equipment detects the voice instruction and authentication is successful, the electronic equipment unlocks and executes the operation corresponding to the voice instruction. Therefore, one operation of the user is realized, authentication and voice instruction detection of the user are triggered at the same time, and when the authentication and the authentication are successful and the voice instruction is detected, the operation corresponding to the voice instruction is executed, so that the operation steps of the user when controlling the electronic equipment through voice are simplified, and the operation time of the user is saved.
Inventors
- ZHAO YUXI
- ZHANG WEN
Assignees
- 华为技术有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20190629
Claims (17)
- 1. A voice control method, comprising: the electronic equipment is in a screen locking state, and a first operation is detected; Responding to the first operation, triggering authentication of a user by the electronic equipment, and triggering a voice recognition application to detect a voice instruction; And when the voice recognition application of the electronic equipment detects the voice instruction and authentication is successful, the electronic equipment unlocks and executes the operation corresponding to the voice instruction.
- 2. The method according to claim 1, wherein the electronic device triggers authentication of a user and triggers a speech recognition application to detect speech instructions in response to the first operation, in particular comprising: and the electronic equipment triggers authentication of a user in response to the first operation, and triggers the voice recognition application to detect the voice instruction in response to the first operation.
- 3. The method according to claim 1, wherein the electronic device triggers authentication of a user and triggers a speech recognition application to detect speech instructions in response to the first operation, in particular comprising: Responding to the first operation, and triggering authentication of a user by the electronic equipment; and when the electronic equipment detects triggering the authentication of the user, triggering the voice recognition application to detect the voice instruction.
- 4. The method according to claim 1, wherein the electronic device triggers authentication of a user and triggers a speech recognition application to detect speech instructions in response to the first operation, in particular comprising: Responding to the first operation, and triggering authentication of a user by the electronic equipment; when the authentication is successful, the electronic equipment triggers the voice recognition application to detect the voice instruction; When the voice recognition application of the electronic equipment detects the voice instruction and authentication is successful, the electronic equipment unlocks and executes the operation corresponding to the voice instruction, and the method specifically comprises the following steps: When the authentication is successful, unlocking the electronic equipment; After the electronic equipment is unlocked, when the voice recognition application detects the voice instruction, the electronic equipment executes the operation corresponding to the voice instruction.
- 5. The method according to claim 1, wherein the method further comprises: and when the voice command is not detected within the appointed time after the voice recognition application is triggered by the electronic equipment to detect the voice command, closing the voice recognition application by the electronic equipment.
- 6. The method according to claim 1, wherein the method further comprises: When the authentication of the electronic equipment to the user fails, the electronic equipment outputs a first prompt for prompting the user to trigger the authentication of the electronic equipment to the user again.
- 7. The method of claim 1, wherein the first operation comprises a lift operation; The electronic equipment triggers authentication of the user and specifically comprises the steps that the electronic equipment triggers face authentication of the user; the responding to the first operation, the electronic equipment triggers authentication of a user and triggers a voice recognition application to detect a voice instruction, and the method specifically comprises the following steps: and responding to the lifting operation, triggering the face authentication of the user by the electronic equipment, and triggering the voice recognition application to detect a voice instruction.
- 8. The method of claim 1, wherein the first operation comprises an operation to trigger display of a fingerprint identification icon; The electronic equipment triggers the authentication of the user and specifically comprises the steps that the electronic equipment triggers the fingerprint authentication of the user; the responding to the first operation, the electronic equipment triggers authentication of a user and triggers the voice recognition application to detect a voice instruction, and the method specifically comprises the following steps: and responding to the operation of triggering and displaying the fingerprint identification icon, triggering fingerprint authentication of a user by the electronic equipment, and triggering the voice identification application to detect a voice instruction.
- 9. The method of claim 1, wherein the first operation comprises an operation to trigger a display of a password unlock interface; The electronic equipment triggers the authentication of the user and specifically comprises the steps that the electronic equipment triggers the password authentication of the user; the responding to the first operation, the electronic equipment triggers authentication of a user and triggers a voice recognition application to detect a voice instruction, and the method specifically comprises the following steps: And responding to the operation of triggering and displaying the password unlocking interface, triggering the password authentication of the user by the electronic equipment, and triggering the voice recognition application to detect a voice instruction.
- 10. The method of claim 1, wherein the first operation comprises a wake-up speech comprising a preset wake-up word; the responding to the first operation, the electronic equipment triggers authentication of a user and triggers a voice recognition application to detect a voice instruction, and the method specifically comprises the following steps: And in response to detecting the wake-up voice of the preset wake-up word, the electronic equipment triggers authentication of the user and triggers the voice recognition application to detect a voice instruction.
- 11. The method according to claim 10, wherein the electronic device triggers authentication of the user, in particular comprising: The electronic device triggers face authentication of the user and/or, The electronic device triggers fingerprint authentication of the user and/or, The electronic device triggers password authentication for the user.
- 12. A voice control method, comprising: Collecting voice signals of a user when the electronic equipment is in a screen locking state, wherein the voice signals comprise wake-up words, voice instructions correspond to the wake-up words, and the voice instructions are used for requesting the electronic equipment to execute operations corresponding to the voice instructions; when the electronic equipment detects a wake-up word from the voice signal, triggering to start a voice recognition application and triggering authentication of the user; after the authentication of the user is successful, the voice recognition application of the electronic equipment executes the operation corresponding to the voice instruction.
- 13. The method according to claim 12, wherein the method further comprises: when the authentication of the electronic equipment fails, the electronic equipment outputs a first prompt for prompting a user to trigger the electronic equipment to authenticate the user again.
- 14. The method according to claim 12, wherein the electronic device triggers authentication of the user, in particular comprising: The electronic device triggers face authentication of the user and/or, The electronic device triggers fingerprint authentication of the user and/or, The electronic device triggers password authentication for the user.
- 15. An electronic device comprising a memory and at least one processor, the memory coupled with the one or more processors, the memory to store computer program code comprising computer instructions that, when executed by the one or more processors, cause the electronic device to perform the method of any of claims 1-14.
- 16. A computer storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform the method of any of claims 1-14.
- 17. A computer program product, characterized in that the computer program product, when run on an electronic device, causes the electronic device to perform the method of any one of claims 1-14.
Description
Voice control method and related device The present application is a divisional application, the application number of the original application is 201910581559.0, the original application date is 2019, 06 and 29, and the whole content of the original application is incorporated by reference. Technical Field The present application relates to the field of terminal technologies, and in particular, to a voice control method and a related device. Background Currently, when a screen of an electronic device (such as a mobile phone, a tablet personal computer, etc.) is locked, if a user needs to operate the electronic device, the user needs to unlock the electronic device, enter a main interface, and then perform corresponding operation. For example, when a user needs to make an electronic device payment, weChat payment is taken as an example. When the screen of the electronic equipment is locked, a user needs to unlock the electronic equipment first and enter a main interface. And then searching the WeChat icon from the main interface, and enabling the electronic equipment to display a WeChat user interface by clicking the WeChat icon. The user also needs to operate the corresponding virtual buttons on the WeChat user interface to enable the electronic device to display the WeChat payment receiving two-dimensional code interface, so that the user can pay to the merchant. As can be seen from the above description, in the above conventional manner, when a user uses a certain function of the electronic device, such as WeChat payment, two or more steps are required, which is complicated and has poor user experience. Disclosure of Invention The application provides a voice control method and a related device, which realize that one operation of a user triggers authentication and voice instruction detection of the user at the same time in a screen locking state of electronic equipment, and execute the operation corresponding to the voice instruction when the authentication is successful and the voice instruction is detected, thereby simplifying the operation steps when the user controls the electronic equipment through voice and saving the operation time of the user. In a first aspect, the application provides a voice control method, which includes that firstly, an electronic device is in a screen locking state, and a first operation is detected. Then, in response to the first operation, the electronic device triggers authentication of the user and triggers the speech recognition application to detect the speech instruction. Then, when the voice recognition application of the electronic equipment detects the voice instruction and authentication is successful, the electronic equipment unlocks and executes the operation corresponding to the voice instruction. According to the voice control method provided by the application, the identity of the user can be authenticated in response to the received user operation when the electronic equipment is in the screen locking state, and the voice recognition application is triggered to detect the voice instruction input by the user. After the electronic device is unlocked and the voice recognition application detects the voice command, the detected voice command may be safely executed. Therefore, when the electronic equipment is in a screen locking state, a user can trigger the authentication unlocking and the voice recognition application to detect the voice command through one operation so as to control the functions or the applications on the electronic equipment, so that the operation steps when the user controls the electronic equipment through the voice are simplified, and the operation time of the user is saved. In one possible implementation manner, the electronic device triggers authentication of the user and triggers the voice recognition application to detect the voice command in response to the first operation, and specifically includes that the electronic device triggers authentication of the user in response to the first operation and triggers the voice recognition application to detect the voice command in response to the first operation. For example, an unlock instruction in an electronic device may trigger both an electronic device to authenticate unlock and a voice instruction detection function to trigger a voice recognition application. In one possible implementation manner, the electronic device triggers authentication of the user in response to the first operation and triggers the voice recognition application to detect the voice command, and specifically includes that the electronic device triggers authentication of the user in response to the first operation. The electronic device triggers the voice recognition application to detect a voice command when detecting triggering authentication of the user. In one possible implementation manner, the electronic device triggers authentication of the user in response to the first operation and triggers the voice rec