Summary of the invention
Place in view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of intelligent terminal user authentication departmentsReason method, intelligent terminal and storage medium, the present invention provide a kind of novel certification for the user authentication of smart home deviceMethod has carried out the identification of fining customization to the manipulation instruction permission of smart home device, has improved the safety of smart homeProperty, the discrimination of phonetic order and the identification of user are improved by the phonetic order method for automatically correcting of voice and lip reading,The identification accuracy of smart home identification is improved, safety is improved.
In order to achieve the above object, this invention takes following technical schemes:
A kind of intelligent terminal user authentication method, wherein include the following steps:
The voice messaging and biological information of intelligent terminal acquisition active user;
The voice messaging and biological information of the active user that will acquire and the voice messaging of pre-set user's specification andBiological information compares identification;
When the voice messaging and biological information of the active user of acquisition and the voice messaging of pre-set user's specification andThe similarity of biological information reaches a predetermined threshold;Then determine active user for pre-set user;
Search the Permission Levels and security level of pre-set user corresponding with active user;Intelligent terminal is controlled to execute and the userPermission Levels and the corresponding operation of security level.
The intelligent terminal user authentication method, wherein the intelligent terminal obtains the voice letter of active userInclude: before the step of breath and biological information
The voice messaging and biological information of user are collected in advance, and voice messaging and biological information with user are setCorresponding user right grade and it is corresponding with the user right grade can operating function.
The intelligent terminal user authentication method, wherein the intelligent terminal obtains the voice letter of active userInclude: before the step of breath and biological information
Security permission classification is carried out to the phonetic order of user in advance, there is user property, only have specified permission canExecute the execution of certain a kind of phonetic order;The attribute of the user includes voice vocal print attribute, face character, lip attribute;
The Permission Levels configuration that the operational order of user is instructed is received, series of instructions classification is grouped, to a certainClass grouping carries out permission imparting.
The intelligent terminal user authentication method, wherein it is described when obtain active user voice messaging andThe similarity of the voice messaging and biological information of biological information and pre-set user's specification reaches a predetermined thresholdValue;Then determine that active user includes: for the step of pre-set user
When intelligent terminal detects that voice vocal print attribute+face character+lip attribute similarity of active user reaches one in advanceDetermine threshold value, phonetic order distribution could be carried out according to the permission of phonetic order when judgement is same user by receiving.
The intelligent terminal user authentication method, wherein the voice messaging of the active user that will acquire andThe voice messaging and biological information of biological information and pre-set user's specification compare after identification stepFurther include:
Intelligent terminal carries out the identification of lip reading while receiving phonetic order, when user speech recognition come out voice andThe voice that lip reading identifies is that similarity reaches certain threshold value, and the instruction for just thinking that user sends belongs to current user, noIt then prompts the presence of the security risk for sending that instruction and active user are not same users, needs to verify again.
The intelligent terminal user authentication method, wherein described to search pre-set user corresponding with active userPermission Levels and security level;Control the step that intelligent terminal executes operation corresponding with the user right grade and security levelSuddenly include:
When the speech recognition of user semanteme and lip reading identification semanteme reach threshold value when, to the two identification voice carry out fromDynamic error correction and instruction correction function;
Matching degree detection is carried out by the instruction that phonetic order semanteme and lip reading semantics recognition of the algorithm to user arrive, and according to inspectionThe speech recognition result of the sound the two of result is surveyed, and is automatically corrected according to result for needing most matched phonetic order.
A kind of intelligent terminal, wherein include: processor, memory and communication bus;
Being stored on the memory can be by intelligent terminal user authentication processing program that the processor executes;
The communication bus realizes the connection communication between processor and memory;
The processor realizes following steps when executing the intelligent terminal user authentication processing program:
The voice messaging and biological information of intelligent terminal acquisition active user;
The voice messaging and biological information of the active user that will acquire and the voice messaging of pre-set user's specification andBiological information compares identification;
When the voice messaging and biological information of the active user of acquisition and the voice messaging of pre-set user's specification andThe similarity of biological information reaches a predetermined threshold;Then determine active user for pre-set user;
Search the Permission Levels and security level of pre-set user corresponding with active user;Intelligent terminal is controlled to execute and the userPermission Levels and the corresponding operation of security level.
The intelligent terminal, wherein the processor is also realized when executing the intelligent terminal user authentication processing programFollowing steps:
The voice messaging and biological information of user are collected in advance, and voice messaging and biological information with user are setCorresponding user right grade and it is corresponding with the user right grade can operating function;
Security permission classification is carried out to the phonetic order of user in advance, there is user property, only have specified permission canExecute the execution of certain a kind of phonetic order;The attribute of the user includes voice vocal print attribute, face character, lip attribute;
The Permission Levels configuration that the operational order of user is instructed is received, series of instructions classification is grouped, to a certainClass grouping carries out permission imparting.
The intelligent terminal, wherein the processor is also realized when executing the intelligent terminal user authentication processing programFollowing steps:
When intelligent terminal detects that voice vocal print attribute+face character+lip attribute similarity of active user reaches one in advanceDetermine threshold value, phonetic order distribution could be carried out according to the permission of phonetic order when judgement is same user by receiving;
Intelligent terminal carries out the identification of lip reading while receiving phonetic order, when user speech recognition come out voice andThe voice that lip reading identifies is that similarity reaches certain threshold value, and the instruction for just thinking that user sends belongs to current user, noIt then prompts the presence of the security risk for sending that instruction and active user are not same users, needs to verify again;
When the speech recognition of user semanteme and lip reading identification semanteme reach threshold value when, to the two identification voice carry out fromDynamic error correction and instruction correction function;
Matching degree detection is carried out by the instruction that phonetic order semanteme and lip reading semantics recognition of the algorithm to user arrive, and according to inspectionThe speech recognition result of the sound the two of result is surveyed, and is automatically corrected according to result for needing most matched phonetic order.
A kind of computer readable storage medium, wherein the computer-readable recording medium storage has one or moreProgram, one or more of programs can be executed by one or more processor, to realize intelligence described in any oneStep in terminal user authentication processing method.
Compared to the prior art, intelligent terminal user authentication method provided by the invention, intelligent terminal and storage are situated betweenMatter provides a kind of smart home user authen method and system based on the identification of speech recognition, recognition of face and lip reading, this hairThe bright instruction to voice carries out security permission classification, has user property, and only there is user certain a kind of permission can executeThe execution of certain a kind of phonetic order, and the attribute of user includes voice vocal print attribute, face character, lip attribute, only works as intelligenceEnergy household detects could be according to voice when voice vocal print attribute+face character+lip attribute of active user is same userThe permission of instruction carries out phonetic order distribution.User can the configuration of phonetic order authority module is instructed again Permission Levels,The configuration can be to series of instructions classification is grouped, to certain one kind grouping carry out permission imparting (such as children's permission (onlyThe phonetic order for having children's correlation function only jumps to related children application or function use to phonetic order), parent's permission,Visitor's permission (the instruction permission of not private application or data)), certain a kind of phonetic order grouping can be distributed user and carried outReally power (reorganization phonetic order could be executed by only possessing permission, otherwise prompt insufficient permission) smart home house keeper has highest weightIt limits (smart home device manager).In order to improve the discrimination of phonetic order, the semantics recognition of phonetic order and the language of lip readingJustice identification carries out error correction recombination, and the automatic phonetic order for correcting user promotes the discrimination of phonetic order.
When it is implemented, the attribute of user includes voice vocal print attribute, face character, lip attribute, only when above threeJust can confirm that it is that real user (distinguishes: most according to the security level of smart home device when a element all meetsLow class, without the equipment of user safety authentication, such as TV;Middle class: the equipment of recognition of face, such as door lock are needed;It is short of now mostHigh safety certification rank: what permission, vocal print+face+lip feature and the lip reading of phonetic order identified, such as secure payment and peaceFull property requires higher access control system etc.).
For example can be by intelligent home voice permission configuration module when specific, user can phonetic order authority module againThe Permission Levels configuration instructed, which, which can be, is grouped series of instructions classification, carries out to certain one kind groupingPermission imparting (for example (phonetic order for only having children's correlation function only jumps to related children to phonetic order to children's permissionUsing or function use), parent's permission, visitor's permission (the instruction permission of not private application or data)), can be to user pointReally weighed that (reorganization phonetic order could be executed by only possessing permission, and otherwise prompt permission is not with certain a kind of phonetic order groupingSmart home house keeper has highest permission (smart home device manager) enough).The instruction of voice carries out security permission classification, toolThere are user property, the execution that only there is user certain a kind of permission can execute certain a kind of phonetic order.
S100, intelligent terminal obtain the voice messaging and biological information of active user.
In the embodiment of the present invention, when that need to carry out user authentication identification, intelligent terminal such as smart home is obtained by cameraTake the voice messaging and biological information of active user.Camera can transmit voice and biological characteristic identification function (vocal print,Face, face identification).
The language of S200, the voice messaging for the active user that will acquire and biological information and pre-set user's specificationMessage breath and biological information compare identification.
Voice messaging and biological information (such as voice vocal print attribute, face character, the mouth for the active user that will acquireLip attribute), with the voice messaging and biological information of the pre-set user's specification (voice vocal print attribute, face character,Lip attribute) compare identification.
S300, when acquisition active user voice messaging and biological information and pre-set user's specificationThe similarity of voice messaging and biological information reaches a predetermined threshold;Then determine active user for pre-set user.
The voice messaging and biological information of preparatory typing party A-subscriber.When followed by identification, as the active user of acquisitionVoice messaging and biological information (such as voice vocal print attribute, face character, lip attribute) and pre-set party A-subscriberThe similarity of the voice messaging and biological information (such as voice vocal print attribute, face character, lip attribute) of standard reaches onePredetermined threshold, such as 90% similarity;Then determine that active user is default party A-subscriber, subsequently into step S400.
I.e. in the embodiment of the present invention, energy home equipment carries out the identification of lip reading while receiving phonetic order, onlyThe voice and the voice that identifies of lip reading come out when the speech recognition of user is that similarity reaches certain threshold value (because voice is knownNot lower to need subsequent automatic correction function, so threshold value positioning 90%, this data can be customized), just think userThe instruction of transmission belongs to current user, subsequently into step S400.Otherwise prompt, which exists to send to instruct with active user, is notThe security risk of same user needs to verify again.
The Permission Levels and security level of S400, lookup pre-set user corresponding with active user;Control intelligent terminal is heldRow operation corresponding with the user right grade and security level.
In the embodiment of the present invention, when user sends phonetic order, smart machine carries out user authentication, distinguishes currentUser right grade and security level.
Then the Permission Levels and security level of pre-set user corresponding with active user are searched;Intelligent terminal is controlled to executeOperation corresponding with the user right grade and security level.
Such as the Permission Levels and security level of pre-set user corresponding with active user are children's permission, then controlRelated children's application is only jumped to phonetic order for the phonetic order for having children's correlation function or function uses.
For example parent's software APP processed etc. can be managed for parent's permission, if it is visitor's permission (not private application or numberAccording to instruction permission)), certain a kind of phonetic order grouping can be distributed user and really weighed that (only possessing permission could executeReorganize phonetic order, otherwise prompt insufficient permission) smart home house keeper have highest permission (smart home device manager).LanguageThe instruction of sound carries out security permission classification, has user property, and only there is user certain a kind of permission can execute certain one kindThe execution of phonetic order.
Security level includes: if it is minimum class for another example, and permission is the equipment that control is not necessarily to user safety authentication, such asTV;If security level be middle class: if permission be to control to need the equipment of recognition of face, such as door lock;
If security level be highest safety certification rank: if permission be control be the permission of phonetic order, vocal print+face+What lip feature and lip reading identified, such as secure payment and the higher access control system of security requirement.
Further, the Permission Levels and security level for searching pre-set user corresponding with active user;Control intelligenceCan include: the step of terminal execution operation corresponding with the user right grade and security level
When the speech recognition of user semanteme and lip reading identification semanteme reach threshold value when, to the two identification voice carry out fromDynamic error correction and instruction correction function;
Matching degree detection is carried out by the instruction that phonetic order semanteme and lip reading semantics recognition of the algorithm to user arrive, and according to inspectionThe speech recognition result of the sound the two of result is surveyed, and is automatically corrected according to result for needing most matched phonetic order.
Such as it when the semanteme of speech recognition and the semanteme of lip reading identification of user reach threshold value, needs to know the twoOther voice carries out automatic error correction function and instruction correction function is (semantic by phonetic order semanteme and lip reading of the algorithm to userThe instruction recognized carries out matching degree detection, and perfects the speech recognition result of the two according to testing result, and certainly according to resultIt is dynamic to be corrected to for needing most matched phonetic order), the recognition efficiency of instruction and the precision of instruction are promoted, user is promoted and refers toEnable the execution efficiency disposably transmitted.
Therefore the present invention provides a kind of intelligent terminal user authentication method, the present invention sets for smart homeStandby user authentication provides a kind of novel authentication method, is refined to the manipulation instruction permission of smart home deviceCustomization identification, improves the safety of smart home, is improved by the phonetic order method for automatically correcting of voice and lip readingThe discrimination of phonetic order and the identification of user improve the identification accuracy of smart home identification, improve safety.
As shown in Fig. 2, being based on above-mentioned intelligent terminal user authentication method, the present invention further correspondingly provides a kind of intelligenceTerminal, the intelligent terminal can be smart television, smart home, smart phone, desktop PC, intelligent refrigerator, serviceThe intelligent terminals such as device.The intelligent terminal includes processor 10, memory 20 and display screen 30, and processor 10 passes through communicationBus 50 is connect with memory 20, and the display screen 30 is connect by communication bus 50 with processor 10.Fig. 2 illustrates only intelligenceThe members of terminal, it should be understood that be not required for implementing all components shown, the implementation that can be substituted it is more orThe less component of person.
The memory 20 can be the internal storage unit of the intelligent terminal in some embodiments, such as intelligence is eventuallyThe memory at end.The memory 20 is also possible to the External memory equipment of the intelligent terminal in further embodiments, such asThe plug-in type USB flash disk being equipped on the intelligent terminal, intelligent memory card (Smart Media Card, SMC), secure digital(Secure Digital, SD) card, flash card (Flash Card) etc..Further, the memory 20 can also both includeThe internal storage unit of institute's intelligent terminal also includes External memory equipment.The memory 20 is installed on the intelligence for storingThe application software and Various types of data of terminal, such as the program code etc. of the installation intelligent terminal.The memory 20 can be withFor temporarily storing the data that has exported or will export.In one embodiment, intelligent end is stored on memory 20End subscriber authentication method program 40, the intelligent terminal user authentication method program 40 can performed by processor 10,To realize intelligent terminal user authentication method in the application.
The processor 10 can be in some embodiments a central processing unit (Central Processing Unit,CPU), microprocessor or other data processing chips, for running the program code stored in the memory 20 or processing numberAccording to, such as execute the intelligent terminal user authentication method etc..
The display screen 30 can be LED display, liquid crystal display, touch liquid crystal display in some embodimentsAnd OLED(Organic Light-Emitting Diode, Organic Light Emitting Diode) touch device etc..The display screen 30 is usedIn the information for being shown in the intelligent terminal and for showing visual user interface.The component 10- of the intelligent terminal30 are in communication with each other by system bus.
In one embodiment, when processor 10 executes intelligent terminal user authentication method program in the memory 20It is performed the steps of when 40
The voice messaging and biological information of intelligent terminal acquisition active user;
The voice messaging and biological information of the active user that will acquire and the voice messaging of pre-set user's specification andBiological information compares identification;
When the voice messaging and biological information of the active user of acquisition and the voice messaging of pre-set user's specification andThe similarity of biological information reaches a predetermined threshold;Then determine active user for pre-set user;
Search the Permission Levels and security level of pre-set user corresponding with active user;Intelligent terminal is controlled to execute and the userPermission Levels and the corresponding operation of security level.
Wherein, following steps are also realized when the processor executes the intelligent terminal user authentication processing program:
The voice messaging and biological information of user are collected in advance, and voice messaging and biological information with user are setCorresponding user right grade and it is corresponding with the user right grade can operating function;
Security permission classification is carried out to the phonetic order of user in advance, there is user property, only have specified permission canExecute the execution of certain a kind of phonetic order;The attribute of the user includes voice vocal print attribute, face character, lip attribute;
The Permission Levels configuration that the operational order of user is instructed is received, series of instructions classification is grouped, to a certainClass grouping carries out permission imparting.
Wherein, following steps are also realized when the processor executes the intelligent terminal user authentication processing program:
When intelligent terminal detects that voice vocal print attribute+face character+lip attribute similarity of active user reaches one in advanceDetermine threshold value, phonetic order distribution could be carried out according to the permission of phonetic order when judgement is same user by receiving;
Intelligent terminal carries out the identification of lip reading while receiving phonetic order, when user speech recognition come out voice andThe voice that lip reading identifies is that similarity reaches certain threshold value, and the instruction for just thinking that user sends belongs to current user, noIt then prompts the presence of the security risk for sending that instruction and active user are not same users, needs to verify again;
When the speech recognition of user semanteme and lip reading identification semanteme reach threshold value when, to the two identification voice carry out fromDynamic error correction and instruction correction function;
Matching degree detection is carried out by the instruction that phonetic order semanteme and lip reading semantics recognition of the algorithm to user arrive, and according to inspectionThe speech recognition result of the sound the two of result is surveyed, and is automatically corrected according to result for needing most matched phonetic order, is hadBody is as described above.
Based on the above embodiment, described computer-readable to deposit the present invention also provides a kind of computer readable storage mediumStorage media is stored with one or more program, and one or more of programs can be executed by one or more processor,To realize the step in the intelligent terminal user authentication method as described in above-mentioned any one, as detailed above.
In conclusion in intelligent terminal user authentication method provided by the invention, intelligent terminal and storage medium, thisIntelligent terminal user authentication method, intelligent terminal and the storage medium provided is provided, provide it is a kind of based on speech recognition,The smart home user authen method and system of recognition of face and lip reading identification, the present invention carry out security permission to the instruction of voiceClassification, with user property, the execution that only there is user certain a kind of permission can execute certain a kind of phonetic order, and userAttribute include voice vocal print attribute, face character, lip attribute, only when smart home detects the voice sound of active userLine attribute+face character+lip attribute could carry out phonetic order distribution according to the permission of phonetic order when being same user.WithFamily can the configuration of phonetic order authority module is instructed again Permission Levels, the configuration can be to series of instructions classify intoRow grouping, carrying out permission imparting to certain one kind grouping, (for example children's permission (only has the phonetic order and language of children's correlation functionSound instruction only jumps to related children application or function use), parent's permission, visitor's permission (not private application or dataInstruct permission)), certain a kind of phonetic order grouping can be distributed user and really weighed that (reorganization could be executed by only possessing permissionOtherwise phonetic order prompts insufficient permission) smart home house keeper have highest permission (smart home device manager).In order to mentionThe discrimination of high phonetic order, the semantics recognition of phonetic order and the semantics recognition of lip reading carry out error correction recombination, and automatic correct is usedThe phonetic order at family promotes the discrimination of phonetic order.
Certainly, those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method,It is that related hardware (such as processor, controller etc.) can be instructed to complete by computer program, the program can storeIn a computer-readable storage medium, which may include the process such as above-mentioned each method embodiment when being executed.ItsDescribed in storage medium can be for memory, magnetic disk, CD etc..
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills canWith improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present inventionProtect range.