CN113343303A - Method and device for shielding target room - Google Patents

Method and device for shielding target room Download PDF

Info

Publication number
CN113343303A
CN113343303A CN202110724072.0A CN202110724072A CN113343303A CN 113343303 A CN113343303 A CN 113343303A CN 202110724072 A CN202110724072 A CN 202110724072A CN 113343303 A CN113343303 A CN 113343303A
Authority
CN
China
Prior art keywords
room
user
target room
target
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110724072.0A
Other languages
Chinese (zh)
Inventor
潘紫良
郭凤威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shipan Technology Beijing Co ltd
Original Assignee
Shipan Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shipan Technology Beijing Co ltd filed Critical Shipan Technology Beijing Co ltd
Priority to CN202110724072.0A priority Critical patent/CN113343303A/en
Publication of CN113343303A publication Critical patent/CN113343303A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The embodiment of the invention provides a method and a device for shielding a target room, wherein the method comprises the following steps: determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located; determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity. The device performs the above method. The device for shielding the target room determines the target room to be shielded according to the attribute information of the room and the user permission level, shields the target room, can hide the room internal information from the user in a targeted manner, prevents the room internal information from being exposed to an unrelated party for running the event activity, and accordingly ensures the data security of the venue.

Description

Method and device for shielding target room
Technical Field
The invention relates to the technical field of virtual reality, in particular to a method and a device for shielding a target room.
Background
The event activities are usually performed in the venue, so that the design policy of event activity operation is convenient to perform planning design and other works on the venue, and the virtual simulation of the venue is particularly important.
The simulation of a real venue can be realized by establishing a virtual venue, but the event activity organization party does not want to expose the room internal information in the virtual venue to an irrelevant event activity operation design party based on the consideration of safety and the like.
The approaches described in this section are not necessarily approaches that have been previously conceived or pursued. Unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section. Similarly, unless otherwise indicated, the problems mentioned in this section should not be regarded as having been acknowledged in any prior art.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a method and an apparatus for shielding a target room.
The embodiment of the invention provides a method for shielding a target room, which comprises the following steps:
determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located;
determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
Wherein the target room to be shaded is determined according to the attribute information and the user authority level,
and if the triggering action of entering the virtual venue triggered by the user is detected, determining a target room to be shielded in the virtual venue according to the attribute information and the user permission level.
Wherein the determining a target room to be shaded according to the attribute information and the user permission level comprises:
if the user permission level is a first user level, determining that the target room is a first target room; the first target room comprises all rooms except the FOP zone and the audience zone;
if the user permission level is a second user level, determining that the target room is a second target room; the second target room comprises a medium area, a room where a large family area of the event activity is located, and a blank room without partitions and character marking information; wherein the browsing right of the second user level is higher than that of the first user level;
if the user permission level is a third user level, determining that the target room is a third target room; the third target room comprises a blank room without partitions and without character marking information; wherein the browsing right of the third user level is higher than the browsing right of the second user level.
The identification of the blank room without the subareas and the character marking information comprises the following steps:
determining whether a character collision body exists in a preset range of the room, if so, determining that the room is a room with character marking information; if not, the room is a room without character marking information;
determining whether the room exists in the partitioned collision volume, if so, determining that the room is a partitioned room; and if not, the room is a room without partitions.
Wherein the obscuring the target room comprises:
and shielding the target room by using a pre-established shielding object model.
Wherein, the establishment of the shelter model comprises the following steps:
a frame line that replicates a top plane of the room;
filling the frame lines with preset colors to obtain a shielding object model plane;
placing an shelter model plane to the bottom plane of the room, and generating a height-adjustable space body with the shelter model plane as the bottom plane through an extreme command;
raising the volume of space such that the shelter model can shelter the room;
and establishing a corresponding relation between the room and the shielding object model.
Wherein said occluding said target room with a pre-established occluding object model comprises:
and determining a target shielding object model corresponding to the target room according to the corresponding relation, and shielding the target room by using the target shielding object model.
The embodiment of the invention provides a device for shielding a target room, which comprises:
a determination unit for determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located;
the shielding unit is used for determining a target room to be shielded according to the attribute information and the user permission level and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual stadium during the event activity.
An embodiment of the present invention provides an electronic device, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein,
the processor, when executing the computer program, implements the method steps of:
determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located;
determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
An embodiment of the invention provides a non-transitory computer readable storage medium having a computer program stored thereon, which when executed by a processor implements the following method steps:
determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located;
determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
According to the method and the device for shielding the target room, the target room to be shielded is determined according to the attribute information of the room and the user permission level, the internal information of the room can be hidden for the user in a targeted manner, the internal information of the room is prevented from being exposed to an irrelevant party for running the event activity, and therefore the data security of the venue is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of a method of shading a target room according to the present invention;
FIG. 2 is a screenshot of an embodiment of the present invention before a target room is uncovered;
FIG. 3 is a screenshot of an embodiment of the present invention after occluding a target room;
FIG. 4 is a schematic structural diagram of an embodiment of the apparatus for covering a target room according to the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Fig. 1 is a flowchart of an embodiment of a method for shielding a target room according to the present invention, and as shown in fig. 1, the embodiment of the present invention provides a method for shielding a target room, including the following steps:
s101: determining attribute information of a room; the attribute information comprises marking information and the partition where the marking information is located.
Specifically, the device determines attribute information of the room; the attribute information comprises marking information and a partition where the marking information is located. The apparatus may be a computer device, e.g. a server, performing the above method. The method may run in a Unity environment.
A room may be understood as a virtual room contained in a virtual venue modeled from collected real room data.
The annotation information may include textual annotation information, such as the name of the room, etc.
The partition in which the room is located may include a registration partition and/or a runtime partition of the event activity, respectively described as follows:
and (4) running the partitions: the space is divided according to the use function, and the space of the venue is reasonably distributed to each client group and business department participating in operation. This space includes enclosed spaces, open spaces and traffic spaces.
Registering the partition: the system is a tool for managing the passing authority of each client group by an activity organizer or an operation team, and the management idea and the management target of the organizer or the operation team can be reflected.
S102: determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is the user permission level corresponding to the room internal information browsing permission in the virtual venue during the event activity.
Specifically, the device determines a target room to be shielded according to the attribute information and the user permission level, and shields the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity. The user permission levels may include a first user level (level 0), a second user level (level 1), a third user level (level 2), and a fourth user level (level 3) in order from low to high.
The 3-level user right can browse the room internal information which can be browsed by the 3-level to 0-level user right.
The level 2 user authority can browse the room internal information which can be browsed by the level 2-0 user authority.
Level 1 user permissions to view room internal information viewable by both level 1 and level 0 user permissions.
And the 0-level user authority can browse the room internal information which can be browsed by the 0-level user authority.
The respective user permission levels can be configured in advance for different users.
The room interior information may include browsable information inside the room, such as building interior walls, desk and chairs, equipment, and the like.
According to the method for shielding the target room, provided by the embodiment of the invention, the target room to be shielded is determined according to the attribute information and the user permission level of the room, and the target room is shielded, so that the internal information of the room can be hidden for a user in a targeted manner, the internal information of the room is prevented from being exposed to an unrelated party for running the event activity, and the data security of a venue is ensured.
On the basis of the above embodiment, the determining a target room to be shaded according to the attribute information and the user permission level includes:
specifically, if the device detects a trigger action of entering the virtual venue triggered by the user, the device determines a target room to be hidden in the virtual venue according to the attribute information and the user permission level. The event activity is carried out in a plurality of venues, touch keys can be respectively established for each virtual venue, and the user can enter the virtual venue by clicking the touch keys respectively corresponding to each virtual venue.
For example, after the user enters the virtual venue a, the target room to be shaded in the virtual venue a is determined. The rooms in the other virtual venues are not masked.
Prior to this step, the method may further comprise:
and if the triggering action that the user triggers the system login is detected, determining the user permission level according to the user information.
And a user name and password input box can be created, and after the user inputs the user name and the password, the user clicks a touch key corresponding to login to realize login of the system, so that the virtual venue to be browsed can be selected.
For example, the user permission level configured by the corresponding user a is 0 level; the user authority level configured by the corresponding user b is 2 levels. The user authority level of the user b is determined to be level 2 when the triggering action of the system login triggered by the user b is detected.
The method for shielding the target room provided by the embodiment of the invention can determine the target room to be shielded in the virtual venue when the user enters the virtual venue, does not need to process other virtual venues, reduces the data calculation amount and accelerates the response speed of the system.
On the basis of the above embodiment, the determining a target room to be shaded according to the attribute information and the user permission level includes:
specifically, if the device judges that the user permission level is the first user level, determining that the target room is the first target room; the first target room comprises all rooms except the FOP zone and the audience zone; the FOP (field of Play) area is the portion of the field of play in the sporting event, and the spectator area may include areas that are open to spectators, such as the spectator seat area.
That is, for a user at the first user level, the FOP area and the room corresponding to the audience area are displayed.
Specifically, if the device judges that the user permission level is the second user level, the device determines that the target room is the second target room; the second target room comprises a room where a media area and a large family area of the event activity are located, and a blank room without partitions and character marking information; wherein the browsing permission of the second user level is higher than the browsing permission of the first user level; the media area may include an activity area of an event activity media interviewer.
Large venues for event activities may include large venues for Sports, large households for Sports (Sports Family), which are used by Sports teammates to describe a vocabulary that contains many organizations and individuals.
The blank room without partitions and without character marking information can be understood as a room with no partitions and without character marking information, and the blank room can be understood as a room without partitions and without character marking on the current drawing because the system is obtained by modeling according to the collected field data and the drawing.
That is, for the users of the second user level, on the basis of displaying rooms corresponding to the FOP area and the audience area, the rooms in the subareas where the athletes are located can also be displayed.
Specifically, if the device judges that the user permission level is the third user level, the device determines that the target room is the third target room; the third target room comprises a blank room without partitions and without character marking information; wherein the browsing right of the third user level is higher than the browsing right of the second user level. The blank room without partitions and without text marking information can refer to the above description, and is not repeated.
That is, for the users at the third user level, the room corresponding to the FOP area and the audience area and the room of the subarea where the athletes are located are displayed, and the room where the media area and the family area for the event activities are located can also be displayed.
It should be noted that, for the user at the fourth user level, any room may not be hidden, that is, all rooms may be displayed for the user at the fourth user level.
The method for shielding the target room further subdivides the user permission level, determines the specific information of the target room corresponding to the subdivision level, and further ensures the data security of the venue.
On the basis of the above embodiment, the identification of the blank room without the partition and without the text label information includes:
specifically, the device determines whether a character collision body exists in a preset range of the room, and if so, the room is a room with character marking information; if not, the room is a room without character marking information; the specific numerical value of the preset range can be set independently according to the actual situation. The system can be developed through unity, and the text collision volume can comprise unity collider for creating text.
Specifically, the device determines whether the room exists in the partitioned collision volume, and if so, the room is a partitioned room; and if not, the room is a room without partitions. A partition collider may include a unity collider that creates a partition.
The method for shielding the target room provided by the embodiment of the invention can accurately identify the blank room without the subareas and the character marking information, and improve the accuracy of shielding the target room.
On the basis of the above embodiment, the shielding the target room includes:
specifically, the device masks the target room using a pre-established mask model. The model of the shelter may be represented in the form of a bounding box, and is not particularly limited. Fig. 2 is a screenshot before the target room is not masked by the embodiment of the present invention, and fig. 3 is a screenshot after the target room is masked by the embodiment of the present invention, as shown in fig. 2 and fig. 3, the mask model can be completely matched with the shape of the target room.
The method for shielding the target room provided by the embodiment of the invention can completely shield the target room by using the shielding object model.
On the basis of the above embodiment, the building of the shield model includes:
specifically, the device replicates the frame lines of the top plane of the room; referring to fig. 2, a frame line resembling a "P" shape is reproduced.
Specifically, the device fills the frame lines with preset colors to obtain a shielding object model plane; the preset color can be set independently according to actual conditions, and can be selected as the color shown in fig. 3.
The top plane as shown in fig. 3 is the mask model plane.
Specifically, the device places a shielding object model plane to the bottom plane of the room, and generates a height-adjustable space body with the shielding object model plane as the bottom plane through an extreme command; the extreme command is an extrusion command.
I.e. the plane of the model of the shelter is placed at the bottom plane of the room in fig. 2, the height of the volume of space can be gradually increased.
Specifically, the device raises the space body so that the shelter model can shelter the room; referring to FIG. 3, the volume of space is gradually raised until the shelter model can shelter the room.
Specifically, the apparatus establishes a correspondence between the room and the shield model. The above correspondence relationship can be established by naming, for example, the name of a room is a1, the name of the corresponding shelter model is aa1, and a1 and aa1 have a correspondence relationship.
The method for shielding the target room provided by the embodiment of the invention is further convenient for establishing the shielding object model.
On the basis of the above embodiment, the shielding the target room by using the pre-established shielding object model includes:
specifically, the device determines a target shielding object model corresponding to the target room according to the corresponding relation, and shields the target room by using the target shielding object model. For example, the name of the target room is a1, and according to the above correspondence, the model of the target shelter is determined to be aa 1.
The method for shielding the target room provided by the embodiment of the invention can further quickly shield the target room.
Fig. 4 is a schematic structural diagram of an apparatus for shielding a target room according to an embodiment of the present invention, and as shown in fig. 4, an apparatus for shielding a target room according to an embodiment of the present invention includes a determining unit 401 and a shielding unit 402, where:
the determination unit 401 is configured to determine attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located; the shielding unit 402 is configured to determine a target room to be shielded according to the attribute information and the user permission level, and shield the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
Specifically, the determining unit 401 is configured to determine attribute information of a room; the attribute information comprises annotation information and a partition where the annotation information is located; the shielding unit 402 is configured to determine a target room to be shielded according to the attribute information and the user permission level, and shield the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
According to the device for shielding the target room, which is provided by the embodiment of the invention, the target room to be shielded is determined according to the attribute information and the user permission level of the room, and the target room is shielded, so that the internal information of the room can be hidden for a user in a targeted manner, the internal information of the room is prevented from being exposed to an unrelated party for running the event activity, and the data security of a venue is ensured.
The apparatus for shielding a target room provided in the embodiment of the present invention may be specifically configured to execute the processing flows of the above method embodiments, and the functions of the apparatus are not described herein again, and refer to the detailed description of the above method embodiments.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 5, the electronic device includes: a processor (processor)501, a memory (memory)502, and a bus 503;
the processor 501 and the memory 502 complete communication with each other through a bus 503;
the processor 501 is configured to call the program instructions in the memory 502 to execute the methods provided by the above method embodiments, for example, including: determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located; determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
The present embodiment discloses a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, which when executed by a computer, the computer is capable of performing the method provided by the above method embodiments, for example, comprising: determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located; determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the methods provided by the above method embodiments, for example, including: determining attribute information of a room; the attribute information comprises annotation information and a partition where the annotation information is located; determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual stadium during the event activity.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the program may be stored in a computer readable storage medium, and when executed, performs the steps including the above method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and of course, can also be implemented by hardware. With this understanding in mind, the above technical solutions may be embodied in the form of a software product, which can be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method of screening a target room, comprising:
determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located;
determining a target room to be shielded according to the attribute information and the user permission level, and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
2. The method of claim 1, wherein determining a target room to be obscured according to the attribute information and a user permission level comprises:
and if the triggering action of entering the virtual venue triggered by the user is detected, determining a target room to be shielded in the virtual venue according to the attribute information and the user permission level.
3. The method of claim 1, wherein determining a target room to be obscured according to the attribute information and a user permission level comprises:
if the user permission level is a first user level, determining that the target room is a first target room; the first target room comprises all rooms except the FOP zone and the audience zone;
if the user permission level is a second user level, determining that the target room is a second target room; the second target room comprises a medium area, a room where a large family area of the event activity is located, and a blank room without partitions and character marking information; wherein the browsing permission of the second user level is higher than the browsing permission of the first user level;
if the user permission level is a third user level, determining that the target room is a third target room; the third target room comprises a blank room without partitions and without character marking information; wherein the browsing right of the third user level is higher than the browsing right of the second user level.
4. The method of claim 3, wherein the identifying of the non-partitioned blank room without textual label information comprises:
determining whether a character collision body exists in a preset range of the room, if so, determining that the room is a room with character marking information; if not, the room is a room without character marking information;
determining whether the room exists in the partitioned collision volume, if so, determining that the room is a partitioned room; and if not, the room is a room without partitions.
5. The method of any of claims 1 to 4, wherein said obscuring said target room comprises:
and shielding the target room by using a pre-established shielding object model.
6. The method of claim 5, wherein the building of the mask model comprises:
a frame line that replicates a top plane of the room;
filling the frame lines with preset colors to obtain a shielding object model plane;
placing an shelter model plane to the bottom plane of the room, and generating a height-adjustable space body with the shelter model plane as the bottom plane through an extreme command;
raising the volume of space such that the shelter model can shelter the room;
and establishing a corresponding relation between the room and the shielding object model.
7. The method of claim 6, wherein said occluding the target room with a pre-established occluding model comprises:
and determining a target shielding object model corresponding to the target room according to the corresponding relation, and shielding the target room by using the target shielding object model.
8. An apparatus for screening a target room, comprising:
a determination unit for determining attribute information of a room; the attribute information comprises marking information and a partition where the marking information is located;
the shielding unit is used for determining a target room to be shielded according to the attribute information and the user permission level and shielding the target room; the user permission level is a user permission level corresponding to the indoor information browsing permission in the virtual venue during the event activity.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202110724072.0A 2021-06-29 2021-06-29 Method and device for shielding target room Pending CN113343303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110724072.0A CN113343303A (en) 2021-06-29 2021-06-29 Method and device for shielding target room

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110724072.0A CN113343303A (en) 2021-06-29 2021-06-29 Method and device for shielding target room

Publications (1)

Publication Number Publication Date
CN113343303A true CN113343303A (en) 2021-09-03

Family

ID=77481350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110724072.0A Pending CN113343303A (en) 2021-06-29 2021-06-29 Method and device for shielding target room

Country Status (1)

Country Link
CN (1) CN113343303A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102129638A (en) * 2011-01-26 2011-07-20 北京美谷科技有限公司 MVR (Measurable Virtual Reality) self-service house choosing system and method
CN107071297A (en) * 2017-03-24 2017-08-18 合肥云智物联科技有限公司 A kind of virtual reality system that logical computer room displaying is believed for electric power
US20190354699A1 (en) * 2018-05-18 2019-11-21 Microsoft Technology Licensing, Llc Automatic permissions for virtual objects
CN110914788A (en) * 2017-05-16 2020-03-24 皇家飞利浦有限公司 Virtual overlays for user interaction in augmented reality
CN112121430A (en) * 2020-09-30 2020-12-25 腾讯科技(深圳)有限公司 Information display method, device, equipment and storage medium in virtual scene
CN112489191A (en) * 2020-11-18 2021-03-12 深圳市中博科创信息技术有限公司 Display method, device and medium for building three-dimensional model

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102129638A (en) * 2011-01-26 2011-07-20 北京美谷科技有限公司 MVR (Measurable Virtual Reality) self-service house choosing system and method
CN107071297A (en) * 2017-03-24 2017-08-18 合肥云智物联科技有限公司 A kind of virtual reality system that logical computer room displaying is believed for electric power
CN110914788A (en) * 2017-05-16 2020-03-24 皇家飞利浦有限公司 Virtual overlays for user interaction in augmented reality
US20190354699A1 (en) * 2018-05-18 2019-11-21 Microsoft Technology Licensing, Llc Automatic permissions for virtual objects
CN112121430A (en) * 2020-09-30 2020-12-25 腾讯科技(深圳)有限公司 Information display method, device, equipment and storage medium in virtual scene
CN112489191A (en) * 2020-11-18 2021-03-12 深圳市中博科创信息技术有限公司 Display method, device and medium for building three-dimensional model

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马静恒 等: "基于三维世界的交互式管理信息系统研究", 计算机应用与软件, vol. 28, no. 7, 31 July 2011 (2011-07-31), pages 296 - 298 *

Similar Documents

Publication Publication Date Title
Jongman et al. Declining vulnerability to river floods and the global benefits of adaptation
US20080183483A1 (en) Office management solution
KR20160033148A (en) Optimizing electronic layouts for media content
CN104978184B (en) Dynamic user interface placement algorithm
Liu et al. A perception‐based emotion contagion model in crowd emergent evacuation simulation
DE112021005364T5 (en) DEFENSE TARGETED DATABASE ATTACKS THROUGH DYNAMIC HONEYPOT DATABASE RESPONSE GENERATION
CN114741667A (en) Document display method and device and computer readable storage medium
Ji et al. Design and development of a maintenance and virtual training system for ancient Chinese architecture
Saralioğlu et al. Data model design for qualified natural-protected area in Turkey
Geepalla et al. Spatio-temporal role based access control for physical access control systems
CN106326760B (en) It is a kind of for data analysis access control rule method is described
Wang et al. The influence of atrium types on the consciousness of shared space in amalgamated traditional dwellings–a case study on traditional dwellings in Quanzhou City, Fujian Province, China
CN113343303A (en) Method and device for shielding target room
CN107729097A (en) Displayed page collocation method and relevant device
Javed et al. Access control policy misconfiguration detection in online social networks
CA3118490A1 (en) System and method for creating interactive gps-integrated, 3d-modelled spaces
CN112051958B (en) Drawing multi-screen terminal interaction method and related device
US10192295B2 (en) Methods and systems for normalizing images
CN109543166A (en) Generation method, server and the computer readable storage medium of house property poster template
CN112948933A (en) House model construction method, house model display method, house model management device, and storage medium
CN109871212B (en) Method, device and equipment for processing special topic page and storage medium
CN115705375A (en) Tree component rendering method and device
KR20220147817A (en) Simulation training and evaluation system for fire fighting activity on-scene command system
US8468178B2 (en) Providing location based information in a virtual environment
Arman et al. VizQ: A system for scalable processing of visibility queries in 3D spatial databases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination