Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above-mentioned conventional problems.
Therefore, one technical problem solved by the present invention is: the man-machine interaction method is provided, and by the method, the vehicle control right can be safely and conveniently handed to other users temporarily without the need of a vehicle owner to reach the place where the vehicle is located.
In order to solve the technical problems, the invention provides the following technical scheme: a man-machine interaction method comprises the following steps that a car owner generates an unlocking page through a control module; an authorized user searches for a vehicle and an unlocking area through an unlocking page; the authorized user touches the unlocking area, and the unlocking area sends an unlocking request to the control module; the acquisition module acquires a face image near the vehicle and sends the face image to the control module; the vehicle owner carries out authorization operation through the control module and checks the vehicle state in real time.
As a preferred scheme of the human-computer interaction method of the present invention, wherein: the unlocking page is h5 page and has timeliness, and the content comprises navigation of the vehicle position and the position of the unlocking area.
As a preferred scheme of the human-computer interaction method of the present invention, wherein: the acquisition of the acquisition module further comprises the following steps that the acquisition module keeps a real-time starting state; after the authorized user touches the unlocking area, the acquisition module transmits a face image of the vehicle within 1.5 meters captured within 2 minutes to the control module.
As a preferred scheme of the human-computer interaction method of the present invention, wherein: the authorization operation comprises three levels of operation permission of unlocking the trunk, unlocking the car door and starting the engine.
As a preferred scheme of the human-computer interaction method of the present invention, wherein: if the control module gives the authorized user the operation authority to start the engine, the vehicle feeds back the real-time state of the authorized user to the control module for the owner to check.
As a preferred scheme of the human-computer interaction method of the present invention, wherein: the method comprises the steps that a center control screen is clicked by two fingers, and the staying time is more than 0.5 s; triggering long-press operation feedback; recording the positions of the two fingers on the screen and recording as primary coordinates; recording the positions of the two fingers on the screen after the two fingers slide, and recording as secondary coordinates; judging whether the sliding directions of the two fingers are consistent; judging whether the relative position change of the primary coordinate and the secondary coordinate is larger than 4 cm; and triggering the unlocking area to send an unlocking request to the control module.
As a preferred scheme of the human-computer interaction method of the present invention, wherein: the method also comprises the following steps of carrying out optimization control by taking the optimal interaction as a target, wherein an objective function is as follows:
wherein: t is the minimum touch feedback period, and the time interval is 0.2 s; u is an authorized set; v is an unauthorized set; e
u,tOptimized value, G, for authorized user u at time t
v,tThe number of passers-by v at time t;
as to the number of authorized users u,
the total number of passers-by v.
The invention solves another technical problem that: an interactive system for remotely authorizing others to unlock the vehicle is provided, so that the method can be realized by depending on the system.
In order to solve the technical problems, the invention provides the following technical scheme:
as a preferable scheme of the interactive system for remotely authorizing others to unlock the vehicle according to the present invention, wherein: an interactive system for remotely authorizing others to unlock a vehicle, characterized in that: the system comprises a control module, a control module and a control module, wherein the control module is used for setting unlocking of a vehicle owner and checking the state of a vehicle; the unlocking page is generated by the control module and comprises position information and unlocking information of the vehicle; the unlocking area is arranged on the automobile and can be unlocked by touch; an acquisition module capable of image acquisition.
The invention has the beneficial effects that: the method provided by the invention can safely and conveniently give the vehicle control right to other users temporarily without the need that the owner arrives at the place where the vehicle is located when the owner needs to give the right of opening the vehicle to other users temporarily.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, specific embodiments accompanied with figures are described in detail below, and it is apparent that the described embodiments are a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present invention, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Furthermore, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
The present invention will be described in detail with reference to the drawings, wherein the cross-sectional views illustrating the structure of the device are not enlarged partially in general scale for convenience of illustration, and the drawings are only exemplary and should not be construed as limiting the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
Meanwhile, in the description of the present invention, it should be noted that the terms "upper, lower, inner and outer" and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation and operate, and thus, cannot be construed as limiting the present invention. Furthermore, the terms first, second, or third are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The terms "mounted, connected and connected" in the present invention are to be understood broadly, unless otherwise explicitly specified or limited, for example: can be fixedly connected, detachably connected or integrally connected; they may be mechanically, electrically, or directly connected, or indirectly connected through intervening media, or may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1
Referring to the schematic diagrams of fig. 1-2, fig. 1 is a human-computer interaction method provided in this embodiment, in order to solve the problem that a remote vehicle authorization mode in the prior art is not safe and convenient enough, this embodiment provides that permission is set by a vehicle owner to be sent to a visitor, and the visitor can confirm by the vehicle owner, and meanwhile, the visitor can carry out remote authorization in a mode of finding a vehicle through positioning given by the vehicle owner, so that the vehicle owner is ensured to control the vehicle safely, and meanwhile, the visitor is convenient to find the vehicle and reduce operations.
More specifically, the man-machine interaction method provided by the embodiment includes the following steps:
s1: the owner of the vehicle generates an unlock page 200 through the control module 100. Wherein, it is required to be noted that:
the control module 100 is an application program which can be installed on a mobile phone, a computer, a smart watch and the like, and the generated unlocking page 200 is h5 page and has timeliness, and the content comprises navigation of the vehicle position and the position of the unlocking area 300.
S2: an authorized user finds the vehicle and unlocks the zone 300 via the unlock page 200. The steps to be explained are as follows:
through the unlock page 200, a user other than the owner of the vehicle can successfully find the vehicle and find the unlock region 300 according to the 3d navigation on the unlock page 200 and according to the schematic diagram of the vehicle on the unlock page 200.
S3: the authorized user touches the unlock region 300 and the unlock region 300 sends an unlock request to the control module 100. Among them, it is also to be noted that:
the double-pointing hits the control screen, and the staying time is more than 0.5 s;
triggering long-press operation feedback;
recording the positions of the two fingers on the screen and recording as primary coordinates;
recording the positions of the two fingers on the screen after the two fingers slide, and recording as secondary coordinates;
judging whether the sliding directions of the two fingers are consistent;
judging whether the relative position change of the primary coordinate and the secondary coordinate is larger than 4 cm;
the triggered unlock region 300 sends an unlock request to the control module 100.
S4: the acquisition module 400 acquires a face image near the vehicle and transmits the face image to the control module 100. What should be further described in this step is:
the acquisition module 400 remains in a real-time on state;
after the authorized user touches the unlocking area 300, the acquisition module 400 transmits a face image of the vehicle within 1.5 meters captured within 2 minutes to the control module 100;
the reason the capture module 400 may be a camera, where the 2 minute image is chosen over the real time image is because when a person is too close to the vehicle, it is difficult for the capture module 400 to capture a full facial image, from which the vehicle owner determines whether the unlock request is from a stranger.
S5: the owner of the vehicle performs authorized operation through the control module 100 and checks the vehicle state in real time. Among them, it is also to be noted that:
and carrying out optimization control by taking the optimal interaction as a target, wherein the target function is as follows:
wherein: t is the minimum touch feedback period, and the time interval is 0.2 s; u is an authorized set; v is an unauthorized set; e
u,tOptimized value, G, for authorized user u at time t
v,tThe number of passers-by v at time t;
as to the number of authorized users u,
the total number of passers-by v.
Specifically, still include:
the vehicle owner unlocks through the control module 100 giving one-time permission, sends a safe starting signal to the vehicle through a network, and authorizes operation including three levels of operation permission of unlocking the trunk, unlocking the door and starting the engine.
If the control module 100 gives the authorized user the operation authority to start the engine, the vehicle feeds back the real-time state to the control module 100 for the vehicle owner to view.
Still further, part of the code for implementing the interaction by the control module 100 is as follows:
preferably, the traditional unlocking method needs a vehicle key, but the vehicle cannot be unlocked under the condition that the vehicle owner is not present or cannot be found, and the human-computer interaction method provided by the embodiment has the advantages of time saving, strong real-time performance and convenience in interaction.
Through the interaction mode provided by the embodiment, the right of others to unlock the vehicle can be granted under the condition that the vehicle owner is inconvenient, so that the convenience and the safety are improved; the learning cost and the thinking complexity of the personnel are reduced through visual prompt and simple operation, so that the cognitive load of the personnel is reduced; to verify the advantages of the present invention over conventional methods, the following comparative experiments were designed for verification.
The experimental facilities uses the simulation rack, and the rack contains: a screen for simulating a driving scene and for simulating an unlocking interactive information prompt; an operable steering wheel; a touch screen configured with a certain brand of vehicle interaction system as a control group; comprises a brake, an accelerator pedal and a vehicle door.
The definitions of variables in the experiment included: the operation times, namely the operation times of others and the owner in the process of completing a certain specified task, such as operations of clicking a button, rotating the button, clicking a touch screen, sliding a thumb wheel and the like; the review video is analyzed, the operation times are recorded, the control module 100 calculates the duration and the cognitive load, the subjective feeling of authorized persons is measured by using the NASA-TLX scale, and the cognitive load is considered to be lower and the interaction effect is better as each score is lower.
Analytical methods of the experiment SPSS was used for the t-assay and the following results were obtained:
table 1: and (5) counting a test result data table.
Referring to table 1, the average value of each result of the method (experimental group) of the present embodiment after completing the interaction task is smaller than the average value of each result of the conventional interaction method (control group), which verifies the real technical effect of the method of the present invention.
Example 2
Referring to fig. 3, in order to implement the above-mentioned human-computer interaction method, an interaction system for remotely authorizing others to unlock a vehicle is provided in this embodiment.
Specifically, the system includes a control module 100, an unlock page 200, an unlock region 300, and an acquisition module 400.
The control module 100 is used for a vehicle owner to set unlocking and check the state of the vehicle; the unlock page 200 is generated by the control module 100, and includes position information and unlock information of the vehicle; the unlocking area 300 is arranged on the automobile and can be unlocked by touch; the acquisition module 400 is capable of image acquisition.
Preferably, the control module 100 is an application program that can be installed on a device such as a mobile phone, a computer, or a smart watch, and the collection module 400 is a camera installed near the b-pillar of the vehicle.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described herein includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein. A computer program can be applied to input data to perform the functions described herein to transform the input data to generate output data that is stored to non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
As used in this application, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being: a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of example, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
It should be noted that the above-mentioned embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.