CN114299718B - Interaction method, server and storage medium - Google Patents

Interaction method, server and storage medium Download PDF

Info

Publication number
CN114299718B
CN114299718B CN202111628966.6A CN202111628966A CN114299718B CN 114299718 B CN114299718 B CN 114299718B CN 202111628966 A CN202111628966 A CN 202111628966A CN 114299718 B CN114299718 B CN 114299718B
Authority
CN
China
Prior art keywords
node
risk
scheme
customized
relationship
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111628966.6A
Other languages
Chinese (zh)
Other versions
CN114299718A (en
Inventor
樊骏锋
潘晓彤
赵群
赵恒艺
宁洪珂
王亭玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN202111628966.6A priority Critical patent/CN114299718B/en
Publication of CN114299718A publication Critical patent/CN114299718A/en
Application granted granted Critical
Publication of CN114299718B publication Critical patent/CN114299718B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Traffic Control Systems (AREA)

Abstract

The application discloses an interaction method, which comprises the following steps: obtaining a customized scheme of the function of the operation vehicle-mounted system customized by a user; and performing risk assessment on the customized scheme by using a preset risk map, and feeding back a risk early warning prompt to a user under the condition that the customized scheme has risks. In the method and the device, the preset risk map is used for evaluating the customizing scheme of the vehicle-mounted system function customized by the user, and the risk early warning prompt is fed back under the condition that the customizing scheme has risks. The risk map is utilized to reasonably organize the wind control knowledge, carry out risk assessment on the scheme customized by the user, and prompt the wind direction to the user, so that the safety of the customized scheme is ensured, and the user is promoted to more reasonably customize the scheme.

Description

Interaction method, server and storage medium
Technical Field
The present application relates to the field of transportation, and in particular, to an interaction method, a server, and a computer-readable storage medium.
Background
For the customization scheme of the functions of the vehicle system, the convenience of using the vehicle by a user is greatly improved. The user customizes the functions of the vehicle-mounted system in advance, and the customization scheme comprises a trigger condition and an execution instruction. However, while customization solutions provide users with a highly automated customization solution, they also introduce significant uncertainty. Because the customization scheme is customized in the terminal equipment, the execution instructions in the customization scheme can not be completely evaluated in different vehicle states, and whether the execution instructions have risks or not can not be completely evaluated, so that certain potential safety hazards exist in the execution of the customization scheme.
Disclosure of Invention
In view of the above, the present application provides an interaction method, a server and a computer-readable storage medium.
The application provides an interaction method, which comprises the following steps:
obtaining a customized scheme of the function of the operation vehicle-mounted system customized by a user;
performing risk assessment on the customized scheme by using a preset risk map;
and feeding back a risk early warning prompt to a user under the condition that the customized scheme has risks.
Therefore, for the customizing scheme of the vehicle-mounted system function customized by the user, the preset risk map is used for evaluation, and the risk early warning prompt is fed back under the condition that the customizing scheme has risks. The risk map can be used for reasonably organizing the wind control knowledge, performing risk assessment on the scheme customized by the user, and prompting the wind direction to the user, so that the safety of the customized scheme is ensured, and the user is promoted to customize the scheme more reasonably.
The method for performing risk assessment on the customized scheme by using the preset risk map comprises the following steps:
analyzing the customized scheme customized by the user to obtain an execution instruction;
determining a first node of the execution instruction in the preset risk graph;
and performing risk assessment on the customized scheme according to the risk relationship of the first node.
Therefore, after the user finishes scheme customization, an execution instruction is obtained after analysis, the execution instruction corresponds to a node in a preset risk graph, and then risk evaluation is carried out on the customized scheme according to the risk relation of the first node, so that the risk of the corresponding type in the customized scheme is determined.
The performing risk assessment on the customized scheme according to the risk relationship of the first node includes:
under the condition that the number of the first nodes is multiple, constructing a first sub-graph according to the multiple first nodes;
determining that the customization scheme is at risk if a closed loop exists in the first sub-graph.
In this way, in the case where the execution instructions are linked to multiple first nodes, a sub-graph is constructed in the graph, and if the sub-graph has a closed loop, it is confirmed that the customization scheme risks performing iterative operations between the instructions.
The performing risk assessment on the customized scheme according to the risk relationship of the first node includes:
acquiring a second node and/or a third node associated with the first node through a first risk relationship;
constructing a second subgraph according to the first node and the second node and/or constructing a third subgraph according to the first node and the second node;
and determining that the customization scheme is at risk according to the second subgraph and/or the third subgraph.
In this way, according to the first node, the second node and/or the third node associated with the first node through the first risk relationship are searched, and then according to the subgraph constructed by the first node and the second node and/or the first node and the third node, the existence of the potential risk in the customization scheme is confirmed.
Under the condition that the customized scheme has risks, feeding back a risk early warning prompt to a user comprises the following steps:
and feeding back risk prompt information generated according to the second subgraph and/or the third subgraph to a user.
Therefore, risk prompt information is fed back to the user, so that the user can know that the customized scheme has risks and the customized scheme cannot be executed under partial conditions.
The risk assessment of the customized scheme according to the risk relationship of the first node comprises:
acquiring a second node and/or a third node associated with the first node through a second risk relationship;
constructing a fourth sub-graph according to the first node and the second node and/or constructing a fifth sub-graph according to the first node and the second node;
and determining that the customization scheme is at risk according to the fourth subgraph and/or the fifth subgraph.
In this way, according to the first node, the second node and/or the third node associated with the first node through the second risk relationship is searched, and then according to the subgraph constructed by the first node and the second node and/or the third node, the existence of the potential risk in the customization scheme is confirmed.
Under the condition that the customized scheme has risks, feeding back a risk early warning prompt to a user comprises the following steps:
and feeding back risk prompt information generated according to the fourth subgraph and/or the fifth subgraph to the user.
Therefore, risk prompt information is fed back to the user, so that the user can know that the customized scheme has risks and the customized scheme cannot be executed under partial conditions.
The method for performing risk assessment on the customized scheme by using the preset risk map comprises the following steps:
when the customization scheme is triggered, acquiring vehicle state information and external environment information;
analyzing the customized scheme and carrying out risk assessment on the customized scheme by utilizing the vehicle state information, the external environment information and the preset risk map.
In this way, the combination of vehicle state information, external environment information, and a preset risk profile may allow for risk assessment in the event that a scenario is actually triggered.
Analyzing the customization scheme and performing risk assessment on the customization scheme by using the vehicle state information, the external environment information and the preset risk map, wherein the method comprises the following steps:
analyzing the customization scheme to obtain an execution instruction;
determining that the execution instruction is at a first node of the preset risk map;
determining the vehicle state information at a fourth node of the preset risk map;
determining a fifth node of the external environment information in the preset risk map;
and performing risk assessment on the customization scheme according to the risk relationship between the first node and the fourth node and the risk relationship between the first node and the fifth node.
In this way, the customized scheme is subjected to risk assessment according to the execution command, the vehicle state information and the external environment information which respectively correspond to the nodes and the risk relationship among the nodes.
The performing risk assessment on the customized scheme according to the risk relationship between the first node and the fourth node and the risk relationship between the first node and the fifth node includes:
constructing a sixth subgraph according to the first node and the fourth node;
constructing a seventh subgraph according to the first node and the fifth node;
determining that the customization scheme is at risk according to the sixth subgraph and/or the seventh subgraph.
In this manner, the risk of the customization scheme is evaluated by constructing a subgraph of the first node and the fourth node, and the first node and the fifth node.
Under the condition that the customized scheme has risks, feeding back a risk early warning prompt to a user comprises the following steps:
and feeding back the risk prompt information generated according to the sixth subgraph and/or the risk prompt information generated according to the seventh subgraph to the user.
Therefore, the subgraph generates risk prompt information to prompt a user that the customized scheme has risk.
The determining that the customization scheme is at risk according to the sixth sub-graph and/or the seventh sub-graph comprises:
and determining that the customization scheme is at risk and blocking the customization scheme from executing under the condition that the first node and the fourth node in the sixth sub-graph are associated through a first risk relationship and/or the first node and the fifth node in the seventh sub-graph are associated through a first risk relationship.
Therefore, the user can know that the customized scheme has risks, and execution blocking is carried out on the risks of the first risk relation, so that driving safety is guaranteed.
Said determining that said customization scheme is at risk from said sixth sub-graph and/or said seventh sub-graph comprises:
determining that the customized solution is at risk if the first node and the fourth node in the sixth subgraph are associated by a second risk relationship, and/or the first node and the fifth node in the seventh subgraph are associated by a second risk relationship.
In this way, the user is informed that the customization scheme is risky, and for the second type of risk, the user can decide whether the customization scheme is executed or not.
The application also provides a server, which comprises a memory and a processor, wherein the memory stores a computer program, and the computer program is executed by the processor to realize the interaction method.
Therefore, for the customization scheme of the vehicle-mounted system function customized by the user, the preset risk map is used for evaluation, and the risk early warning prompt is fed back under the condition that the risk exists in the customization scheme. The risk map is utilized to reasonably organize the wind control knowledge, carry out risk assessment on the scheme customized by the user, and prompt the wind direction to the user, so that the safety of the customized scheme is ensured, and the user is promoted to more reasonably customize the scheme.
The present application also provides a non-transitory computer-readable storage medium, which when executed by one or more processors, performs the above-described method.
Therefore, for the customization scheme of the vehicle-mounted system function customized by the user, the preset risk map is used for evaluation, and the risk early warning prompt is fed back under the condition that the risk exists in the customization scheme. The risk map can be used for reasonably organizing the wind control knowledge, performing risk assessment on the scheme customized by the user, and prompting the wind direction to the user, so that the safety of the customized scheme is ensured, and the user is promoted to customize the scheme more reasonably.
Additional aspects and advantages of embodiments of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The above and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic flow chart of an interaction method of the present application;
FIG. 2 is a schematic diagram of a risk profile of the interaction method of the present application;
FIG. 3 is a second schematic flow chart of the interaction method of the present application;
FIG. 4 is a third schematic flow chart of the interaction method of the present application;
FIG. 5 is a schematic view of an interaction method of the present application;
FIG. 6 is a fourth flowchart of the interaction method of the present application;
FIG. 7 is a second schematic view of the interaction method of the present application;
FIG. 8 is a fifth flowchart of the interaction method of the present application;
FIG. 9 is a sixth schematic flow chart of the interaction method of the present application;
FIG. 10 is a third schematic view of the interaction method of the present application;
FIG. 11 is a seventh schematic flow chart of the interaction method of the present application;
FIG. 12 is an eighth schematic flow chart of the interaction method of the present application;
FIG. 13 is a ninth schematic flow chart of the interaction method of the present application;
FIG. 14 is a tenth schematic flow chart of the interaction method of the present application;
FIG. 15 is a fourth schematic view of the interaction method of the present application;
FIG. 16 is a fifth scenario diagram illustrating the interaction method of the present application;
FIG. 17 is an eleventh schematic flow chart of the interaction method of the present application;
FIG. 18 is a flow chart of an exemplary interaction method of the present application;
fig. 19 is a thirteen schematic flowchart of the interaction method of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for the purpose of explaining the embodiments of the present application, and are not to be construed as limiting the embodiments of the present application.
Referring to fig. 1, the present application provides an interaction method, including:
01: obtaining a customized scheme of the function of the operation vehicle-mounted system customized by a user;
02: performing risk assessment on the customized scheme by using a preset risk map;
03: and under the condition that the customized scheme has risks, feeding back a risk early warning prompt to the user.
The application also provides a server, and the interaction method can be realized by the server. The server comprises a storage and a processor, wherein the storage stores a computer program, and the processor is used for acquiring a customized scheme customized by a user for operating the functions of the vehicle-mounted system, carrying out risk assessment on the customized scheme by using a preset risk map, and feeding back a risk early warning prompt to the user under the condition that the customized scheme has risks.
The customization scheme of the functions of the vehicle-mounted system comprises a preset non-voice trigger condition and one or more execution instructions under the non-voice trigger condition. The non-voice trigger condition means that the trigger mode for the customization scheme is non-voice, that is, the customization scheme does not need to be triggered by a voice request of a user. The non-voice trigger conditions include time conditions, location conditions, vehicle status, and the like. The execution instruction is to automatically execute the operation of the vehicle-mounted system function under the condition that the non-voice triggering condition is met, such as setting of air conditioning parameters, adjustment of a seat, use of a multimedia function and the like.
The customized scheme provides great convenience for a user to drive. For example, after getting on a vehicle, a user often sets a series of settings for the vehicle, which are cumbersome if the settings are operated one by the user. The existing vehicles use expressions of 'good morning' and 'departure bar' as voice type triggering conditions, the scheme needs the user to remember and get used, if the user does not have the expression, the user can forget to speak after getting on the vehicle at the present time and does not speak 'good morning' to the voice assistant, the situation that the triggering conditions are not triggered can be generated, and subsequent execution cannot be carried out. And by means of a customized scheme, the triggering condition is set as the closing of the vehicle door, and the adjustment of the function of the relevant vehicle-mounted system is set as the execution instruction, so that in the subsequent vehicle using process, after a user gets on the vehicle and closes the vehicle door, the vehicle-mounted system can automatically execute the corresponding execution instruction.
However, the customization scheme, while providing a highly automated customization scheme for the user, also introduces significant uncertainty. Because the customization scheme is customized on the terminal equipment, the execution instructions in the customization scheme can not be completely evaluated in different vehicle states, and whether risks exist in the execution instructions per se can not be completely evaluated, so that certain potential safety hazards exist in the execution of the customization scheme.
Referring to fig. 2, the preset risk map in the present application is constructed in advance and stored in the server. The risk graph includes nodes and relationships between the nodes. The nodes comprise execution instructions of the vehicle-mounted system function customization scheme, vehicle states and vehicle external environments. The relationship between the nodes is constructed according to the risk relationship between the nodes and the nodes. Executing the instruction's own risk relationship involves iterative operations. The risk relationship between the execution of the instructions and the vehicle state includes driving safety and user health. The risk relationship between the execution of the instructions and the environment outside the vehicle includes driving safety and user health. Due to the relevance expression of the graph, the relation of each node can be embodied, and better maintenance and contact effects are achieved. The risk map is constructed in a manual marking mode and is continuously optimized and maintained, so that the risk relation existing in the execution instruction which is provided for the user to customize is covered as comprehensively as possible, and risk early warning can be carried out in the process of customizing the scheme and triggering the scheme by the user.
When the customized scheme is evaluated, the execution instruction in the customized scheme is corresponding to the risk map, whether the execution instruction has a risk or not is evaluated according to the existing risk relationship of the risk map, and the risk early warning is timely carried out on the user under the risk condition. And (3) the user is informed that the customized scheme has risks, so that the scheme can be edited and modified in time.
Therefore, in the interaction method and the server, the user customizes the customization scheme for operating the functions of the vehicle-mounted system, evaluates the customization scheme by using the preset risk map, and feeds back the risk early warning prompt under the condition that the customization scheme has risks. The risk map is utilized to reasonably organize the wind control knowledge, carry out risk assessment on the scheme customized by the user, and prompt the wind direction to the user, so that the safety of the customized scheme is ensured, and the user is promoted to more reasonably customize the scheme.
Referring to fig. 3, step 02 includes:
021: analyzing the customized scheme customized by the user to obtain an execution instruction;
022: determining a first node of an execution instruction in a preset risk graph;
023: and performing risk assessment on the customized scheme according to the risk relationship of the first node.
The processor is used for analyzing the customized scheme finished by the user to obtain an execution instruction, determining a first node of the execution instruction in a preset risk map, and performing risk assessment on the customized scheme according to the risk relationship of the first node.
After the user finishes customizing the scheme, the server analyzes the scheme which finishes customizing to obtain an execution instruction of the customizing scheme. And further linking the execution instruction with a preset risk graph, so that the execution instruction corresponds to the node of the risk graph. The execution instructions correspond to first nodes in the risk graph, and each execution instruction corresponds to one first node.
The executing instruction for controlling the determined vehicle-mounted system can directly correspond to the node of the risk map, for example, the executing instruction for opening the window, closing the window and the like. The specific content execution instruction, such as an execution instruction for playing specific multimedia content, needs to be classified by a predetermined classification model and then corresponds to a node of the risk map, for example, a ghost story is played, and the classification is performed by a classification model: terror music is played. Risk assessment at non-triggering for a solution that accomplishes customization involves two aspects, the first being the risk of executing the instruction itself and the second being the potential risk of executing the instruction.
The risk of the first node includes the risk of executing the instructions themselves, i.e., performing iterations between instructions. And risks between the execution of the instructions and the vehicle state, the execution of the instructions and the external environment state, i.e. user health and driving safety.
Therefore, after the user finishes scheme customization, an execution instruction is obtained after analysis, the execution instruction corresponds to a node in a preset risk graph, and then risk evaluation is carried out on the customized scheme according to the risk relation of the first node, so that the risk of the corresponding type in the customized scheme is determined.
Referring to fig. 4, step 023 includes:
0231: under the condition that the number of the first nodes is multiple, constructing a first sub-graph according to the multiple first nodes;
0232: and determining that the customization scheme is at risk in the case that the first sub-graph has a closed loop.
The processor is used for constructing a first sub-graph according to the plurality of first nodes under the condition that the number of the first nodes is multiple, and determining that the customization scheme is at risk under the condition that the first sub-graph has a closed loop.
When there are multiple instructions to execute in a custom scheme, there may be a risk of repetitive operations. And for a plurality of execution instructions obtained after analysis, each execution instruction corresponds to a first node in the risk graph respectively. Therefore, a sub-graph among a plurality of first nodes is constructed in the risk graph, and if the sub-graph has a closed loop, the risk of the customization scheme, namely the risk of executing repeated operations among the instructions, is confirmed.
Referring to FIG. 5, for example, the customization scheme includes three instructions to execute: 1. opening the vehicle window; 2. closing the vehicle window; 3. and opening the vehicle window. The three executed instructions correspond to two different first nodes, two identical first nodes. Constructing the subgraphs of the three first nodes in the graph, wherein a closed loop exists, the customized scheme has the risk of executing repeated operations among instructions.
Specifically, the instructions are executed: opening the window and executing the command: the closed vehicle window corresponds to two different first nodes respectively, and the two execution instructions are as follows: and the opening of the window corresponds to the same first node. Therefore, in a subgraph constructed by the three parts, according to the sequence of executing the instructions, the pointer representing the relation among the nodes points to the first node for closing the window from the first node for opening the window and points to the first node for opening the window from the first node for closing the window. Because two execution instructions for opening the window correspond to the same first node, a closed loop is formed in the subgraph.
In this way, in the case where the execution instructions are linked to multiple first nodes, a sub-graph is constructed in the graph, and if the sub-graph has a closed loop, it is confirmed that the customization scheme risks performing iterative operations between the instructions.
Referring to fig. 6, step 023 includes:
0233: acquiring a second node and/or a third node associated with the first node through a first risk relationship;
0234: constructing a second subgraph according to the first node and the second node and/or constructing a third subgraph according to the first node and the second node;
0235: and determining that the customization scheme is at risk according to the second subgraph and/or the third subgraph.
The processor is used for acquiring a second node and/or a third node which is associated with the first node through a first risk relationship, constructing a second subgraph according to the first node and the second node and/or constructing a third subgraph according to the first node and the second node, and determining that the customized scheme has risks according to the second subgraph and/or the third subgraph.
The risk assessment currently performed is performed in a case where the scenario is customized without actually being triggered, and therefore, the vehicle state information and the external environment information at the time of the customization of the scenario are not acquired, and only the risk assessment of the potentially relevant behavior that may jeopardize driving safety is performed.
The association may be that the first node is directly associated with the second node or the third node, or the first node is indirectly associated with the second node or the third node through a relationship therebetween. The relationship between the second nodes means an association relationship that exists between the plurality of second nodes due to proximity of conditions or states. The relationship between the third nodes refers to an association relationship existing among a plurality of third nodes due to proximity of conditions or states.
Referring again to fig. 2, direct association means that the first node is associated with a second node or a third node through user health or driving safety. The indirect association means that the second node is closely associated to other second nodes according to the state, so that the first node is associated with other second nodes. Or the third node is related to other third nodes according to the condition proximity, so that the first node is related to other third nodes.
The first risk relationship is driving safety. The second node and/or the third node associated with the first node through the first risk relationship are/is acquired, namely the second node associated with the execution instruction as the first node through the driving safety and the third node associated with the driving safety are acquired.
The second node is a node corresponding to the vehicle state information, and the third node is a node corresponding to the external environment state information.
Referring to fig. 7, for example, for the execution instruction "play ghost story", the first node "play terrorist music" is corresponded to in the risk graph. For the first node 'playing terror music', finding a second node 'high-speed driving' associated with 'playing terror music' through a first risk relationship 'driving safety' in a risk map, and accordingly constructing a second sub-graph: "play terror music" — "drive safe" → "high speed travel", the second sub-graph confirms that there is a risk, i.e. a potential risk, to the customization scheme. The risk potential means that when actually triggered, if the vehicle state satisfies the second node, the execution instruction of the first node may not be executed because of the risk relationship. That is, when the customized scheme is triggered, if the vehicle is in a high-speed driving state, the terrorist music playing will not be performed due to the driving safety.
For another example, for a first node "playing horror music", a third node "late night" associated with "playing horror music" by a first risk relationship "safe driving" is found in the risk graph, and accordingly a third sub-graph is constructed: "play terror music" - "safe driving" - → "late night" built the third subgraph. The third subgraph confirms that the customization scheme has risks, namely potential risks. The risk potential means that when actually triggered, if the vehicle state satisfies the third node, the execution instruction of the first node may not be executed because there is a risk. That is, when the customization scheme is triggered, if the current situation is late at night, terrorist music playing will not be performed due to driving safety.
In this way, according to the first node, the second node and/or the third node associated with the first node through the first risk relationship are searched, and then according to the subgraph constructed by the first node and the second node and/or the first node and the third node, the existence of the potential risk in the customization scheme is confirmed.
Referring to fig. 8, step 03 includes:
031: and feeding back risk prompt information generated according to the second subgraph and/or the third subgraph to the user.
The processor is configured to feed back risk hint information generated from the second sub-graph and/or the third sub-graph to a user.
In the case that the potential risk of the customization scheme is confirmed, the risk prompt information generated according to the second sub-graph and/or the third sub-graph is returned, so that the user is informed of the expectation that the customization scheme cannot be implemented in some cases, and the customization scheme can be adjusted in a targeted mode.
Therefore, risk prompt information is fed back to the user, so that the user can know that the customized scheme has risks and cannot execute the customized scheme under partial conditions.
Referring to fig. 9, step 023 includes:
0236: acquiring a second node and/or a third node which is associated with the first node through a second risk relationship;
0237: constructing a fourth subgraph according to the first node and the second node and/or constructing a fifth subgraph according to the first node and the second node;
0238: and determining that the customization scheme is at risk according to the fourth subgraph and/or the fifth subgraph.
The processor is used for acquiring a second node and/or a third node which is associated with the first node through a second risk relationship, constructing a fourth subgraph according to the first node and the second node and/or constructing a fifth subgraph according to the first node and the second node, and determining that the customized scheme has risks according to the fourth subgraph and/or the fifth subgraph.
The second risk relationship is user health. And acquiring the second node and/or the third node which is associated with the first node through the second risk relationship, namely acquiring the second node which is associated with the execution instruction as the first node through the second risk relationship, namely through the health of the user and acquiring the third node which is associated with the health of the user.
The second node is a node corresponding to the vehicle state information, and the third node is a node corresponding to the external environment state information.
Referring to fig. 10, for example, for the execution instruction "play ghost story", the node "play terrorist music" is corresponded to in the risk graph. For the first node "playing terror music", the second node associated with "user health" and "playing terror music" through the second risk relationship is not found in the risk map. Therefore, for the execution instruction of "playing ghost story", no fourth sub-graph is constructed in the risk graph, or the "playing ghost story" has no potential risk of affecting the health of the user when the vehicle is in a certain state.
For the first node "playing horror music", a third node "late night" associated with "playing horror music" through a second risk relationship "user health" can be found in the risk map, and accordingly a fifth sub-graph is constructed: "playing terror music" - "user health" - → "late night". The fifth sub-graph confirms that the customization scheme is risky, i.e., potentially risky. The risk potential means that when actually triggered, if the external environment state information satisfies the third node, the execution instruction of the first node may not be executed because there is a risk. That is, when the customization scheme is triggered, if it is late at night, the horror music playing will not be executed due to the health of the user.
In this way, according to the first node, the second node and/or the third node associated with the first node through the second risk relationship are searched, and then according to the subgraph constructed by the first node and the second node and/or the third node, the existence of the potential risk in the customization scheme is confirmed.
Referring to fig. 11, step 03 includes:
032: and feeding back the risk prompt information generated according to the fourth subgraph and/or the fifth subgraph to the user.
The processor is used for feeding back the risk prompt information generated according to the fourth subgraph and/or the fifth subgraph to the user.
In the case that the potential risk of the customization scheme is confirmed, the risk prompt information generated according to the fourth subgraph and/or the fifth subgraph is returned, so that the user is informed of the expectation that the customization scheme cannot be implemented in some cases, and the customization scheme can be adjusted in a targeted mode.
Therefore, risk prompt information is fed back to the user, so that the user can know that the customized scheme has risks and cannot execute the customized scheme under partial conditions.
Referring to fig. 12, step 02 includes:
024: when the customization scheme is triggered, vehicle state information and external environment information are acquired;
025: and analyzing the customized scheme and carrying out risk assessment on the customized scheme by utilizing the vehicle state information, the external environment information and a preset risk map.
The processor is used for acquiring the vehicle state information and the external environment information when the customization scheme is triggered, analyzing the customization scheme and carrying out risk assessment on the customization scheme by using the vehicle state information, the external environment information and a preset risk map.
As described above, when the scenario customization is completed but not actually triggered, only the evaluation of the potential risk can be performed because the vehicle state information and the external environment information cannot be actually obtained. And when the customization scheme is actually triggered, the current vehicle state information and the external environment information can be combined to evaluate the customization scheme in a preset risk map.
The vehicle state information and the external environment information can be detected by using related sensors on the vehicle and reported to the server. The vehicle state information may include vehicle speed, gear, power, etc. The external environment information may include weather information, road conditions information, and the like.
And performing risk evaluation on the customized scheme according to the subgraphs among the nodes by using the acquired vehicle state information and the external environment information and combining with the execution instruction, wherein the corresponding nodes can be corresponded in the risk map.
In this way, the combination of vehicle state information, external environment information, and a preset risk profile may allow for risk assessment in the event that a scenario is actually triggered.
Referring to fig. 13, step 025 includes:
0251: analyzing the customization scheme to obtain an execution instruction;
0252: determining that an execution instruction is at a first node of the preset risk graph;
0253: determining a fourth node of the vehicle state information in a preset risk map;
0254: determining a fifth node of the external environment information in a preset risk map;
0255: and performing risk evaluation on the customized scheme according to the risk relationship between the first node and the fourth node and the risk relationship between the first node and the fifth node.
The processor is used for analyzing the customization scheme to obtain an execution instruction, determining that the execution instruction is located at a first node of the preset risk map, determining that the vehicle state information is located at a third node of the preset risk map, determining that the external environment information is located at a fourth node of the preset risk map, and performing risk assessment on the customization scheme according to the risk relationship between the first node and the third node and the risk relationship between the first node and the fourth node.
After the customization scheme is triggered, analyzing the customization scheme to obtain an execution instruction, enabling the execution instruction to correspond to a first node in the risk graph, enabling the acquired vehicle state information to correspond to a third node in the risk graph, and enabling the external environment information to correspond to a fourth node in the risk graph. For example, the vehicle state information: the vehicle speed is 120km/h, corresponding to a high-speed driving node in the risk map, and external environment information: time 00, corresponding to the "late night" node in the risk map.
It should be noted that the second node, the third node, the fourth node, and the fifth node in this application are only used for distinguishing the non-executed instructions in the risk assessment at different occasions for convenience of explanation. Specifically, the second node and the third node are nodes corresponding to non-execution instructions in the risk graph when risk assessment is performed after scheme customization is completed, wherein the second node is a node corresponding to vehicle state information, and the third node is a node corresponding to external environment information. And the fourth node and the fifth node are nodes corresponding to non-execution instructions in the risk graph when risk evaluation is performed when the customization scheme is triggered, wherein the fourth node corresponds to the vehicle state information, and the fifth node corresponds to the external environment information.
The risk relationships between the first node and the fourth node, and between the first node and the fifth node are also consistent with the risk relationships between the first node and the second node, and between the first node and the third node in the risk assessment after the scheme is customized, specifically, the risk relationships include a first risk relationship: driving safety, and a second risk relationship: the user is healthy.
In this way, the customized scheme is subjected to risk assessment according to the execution command, the vehicle state information and the external environment information which respectively correspond to the nodes and the risk relationship among the nodes.
Referring to FIG. 14, step 0255 includes:
02551: constructing a sixth subgraph according to the first node and the fourth node;
02552: constructing a seventh subgraph according to the first node and the fifth node;
02553: and determining that the customization scheme is at risk according to the sixth subgraph and/or the seventh subgraph.
The processor is used for constructing a sixth subgraph according to the first node and the fourth node, constructing a seventh subgraph according to the first node and the fifth node, and determining that the customization scheme is at risk according to the sixth subgraph and/or the seventh subgraph.
Analyzing the customization scheme to obtain an execution instruction, enabling the execution instruction to correspond to a first node in the risk graph, enabling the acquired vehicle state information to correspond to a fourth node in the risk graph, and enabling the external environment information to correspond to a fifth node in the risk graph. And constructing a sixth subgraph and a seventh subgraph in the risk graph according to the first node and the fourth node and the first node and the fifth node respectively, so as to confirm that the customization scheme is at risk according to the sixth subgraph and/or the seventh subgraph.
Wherein the validation of the customization scheme risks validation according to the presence of the sixth sub-graph and/or the seventh sub-graph without further processing of the associated sub-graph. It is understood that if a sub-graph can be constructed, two nodes can be associated by a risk relationship, and if the sub-graph cannot be constructed, that is, no corresponding risk relationship exists between the two nodes.
Referring to fig. 15, for example, the current vehicle state information: vehicle speed 120km/h, external environment information: time 00, corresponding to the third node "driving at high speed" in the risk map and the fourth node "late at night" in the risk map, respectively.
For the first node 'open window', finding that the first node 'open window' is associated with the fourth node 'high-speed driving' through a first risk relation 'driving safety' in the risk map, and constructing a sixth sub-graph according to the relationship: "open window" - "drive safety" - → "high speed travel".
Referring to fig. 16, as another example, for the first node "open the window", the risk relationship that the first node "open the window" is associated with the fifth node "low temperature" through "user health" is found in the risk map, and the first node "open the window" is further associated to the fifth node "late night" according to the similar conditions, so that a seventh sub-graph is constructed: "open window" - "user health" - → "Low temperature" - "similar conditions" - → "late night".
In the process of risk assessment during triggering, no matter what risk relationship the first node has with the fourth node, the first node is regarded as the sixth subgraph, and no matter what risk relationship the first node has with the fifth node, the first node is regarded as the seventh subgraph.
Thus, the risk of the customization scheme is evaluated by constructing subgraphs of the first node and the fourth node and the first node and the fifth node.
Referring to fig. 17, step 03 includes:
033: and feeding back the risk prompt information generated according to the sixth subgraph and/or the risk prompt information generated according to the seventh subgraph to the user.
The processor is configured to feed back to the user the risk hint information generated according to the sixth sub-graph and/or the risk hint information generated according to the seventh sub-graph.
And under the condition that the subgraph can be constructed according to the corresponding nodes, confirming that the customized scheme has risks, and feeding back risk prompt information to the user.
As in the example above, according to the sixth sub-diagram constructed: "open the window" - "drive safety" - → "high-speed travel" generated risk prompt information. According to the seventh constructed subgraph: "open window" - "user healthy" - → "low temperature" - "condition approximately" → "late night". And generating risk prompt information.
The feedback mode of the risk prompt information can be played through TTS voice, for example, for the risk prompt of the above example, "currently in high-speed driving, and the window is not opened for the moment" can be played through voice to prompt the user.
Therefore, the subgraph generates risk prompt information to prompt a user that the customized scheme has risk.
Referring to FIG. 18, step 02553 comprises:
025531: and in the case that the first node and the fourth node in the sixth subgraph are associated through the first risk relationship, and/or the first node and the fifth node in the seventh subgraph are associated through the first risk relationship, determining that the customization scheme has risks, and blocking the customization scheme from executing.
As in the previously described example, "open window" — "driving safety" → "high speed travel" in the sixth sub-graph, the first node "open window" being associated with the fourth node "high speed travel" through the first risk relationship "driving safety". Whereas in the seventh sub-graph there is no first risk relationship.
And if the risk relationship of the driving safety exists, the execution instruction is indicated to have the risk in the aspect of the driving safety in the current vehicle state or the external environment, and in the case, the corresponding execution instruction is intercepted, namely, the execution instruction is not executed any more so as to ensure the driving safety.
Therefore, the user can know that the customized scheme has risks, and execution blocking is carried out on the risks of the first risk relation, so that driving safety is guaranteed.
Referring to FIG. 19, step 02553 comprises:
025532: and determining that the customized scheme is at risk if the first node and the fourth node in the sixth sub-graph are associated through a second risk relationship, and/or the first node and the fifth node in the seventh sub-graph are associated through a second risk relationship.
The processor is configured to determine that the customization scheme is risky if the first node and the fourth node in the sixth sub-graph are associated through a second risk relationship, and/or if the first node and the fifth node in the seventh sub-graph are associated through a second risk relationship.
As in the previously described example, the second risk relationship does not exist in the sixth sub-graph. In the seventh sub-graph, "open window" - "user health" - → "low temperature" - "condition proximity" - → "late night", the first node "open window" is associated with the fifth node "low temperature", "late night" through the second risk relationship "user health".
And if the risk relationship of the health of the user exists, the executing instruction is indicated to have a risk of influencing the health of the user in the current vehicle state or the external environment, and for the situation, the user can be prompted to select to confirm whether the executing instruction is executed or not.
In this way, the user is made aware that the customization scheme is risky, and for the second type of risk, the user can decide by himself whether the customization scheme is to be executed.
The embodiment of the invention also provides a computer readable storage medium. One or more non-transitory computer-readable storage media storing a computer program that, when executed by one or more processors, implements the interaction method of any of the embodiments described above. It will be understood by those skilled in the art that all or part of the processes in the method for implementing the above embodiments may be implemented by a computer program instructing relevant software. The program may be stored in a non-transitory computer readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), or the like.
In the description of the present specification, reference to the description of "one embodiment", "some embodiments", "illustrative embodiments", "examples", "specific examples" or "some examples", etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable acts for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes additional implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
Although embodiments of the present application have been shown and described above, it is to be understood that the above embodiments are exemplary and not to be construed as limiting the present application, and that changes, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (13)

1. An interaction method, comprising:
obtaining a customized scheme of the functions of the operation vehicle-mounted system customized by a user;
analyzing the customization scheme to obtain an execution instruction;
determining a first node of the execution instruction in a preset risk graph, wherein the risk graph comprises nodes and a relation between the nodes, and the first node is a node corresponding to the execution instruction of the customization scheme of the functions of the vehicle-mounted system;
performing risk assessment on the customized scheme according to the risk relationship of the first node or the risk relationship of the first node and other nodes, wherein the risk relationship of the first node comprises repeated operation of the execution instruction, and the risk relationship of the first node and other nodes comprises driving safety and user health; the performing risk assessment on the customized scheme according to the risk relationship of the first node or the risk relationship of the first node and other nodes includes: when the customization scheme is completed and is not triggered, acquiring a second node and/or a third node which is associated with the first node through a first risk relationship, wherein the first risk relationship is the driving safety, the second node is a node corresponding to vehicle state information, the third node is a node corresponding to external environment state information, and the second node and the third node are nodes corresponding to non-execution instructions in the risk graph after the customization scheme is completed and when the customization scheme is not triggered; constructing a second subgraph and/or constructing a third subgraph according to the first node and the second node; determining that the customization scheme is at risk according to the second subgraph and/or the third subgraph;
and under the condition that the customized scheme has risks, feeding back a risk early warning prompt to the user.
2. The method of claim 1, wherein the risk evaluating the customized solution according to the risk relationship of the first node or the risk relationship of the first node and other nodes comprises:
under the condition that the number of the first nodes is multiple and at least two first nodes are the same, constructing a first sub-graph according to the execution sequence of the first nodes in the customization scheme;
determining that the customization scheme is at risk if a closed loop exists in the first sub-graph.
3. The method of claim 1, wherein the feeding back a risk pre-warning prompt to a user if the customized solution is at risk comprises:
and feeding back risk prompt information generated according to the second subgraph and/or the third subgraph to a user.
4. The method of claim 1, wherein the risk assessment of the customized solution according to the risk relationship of the first node or the risk relationship of the first node to other nodes comprises:
when the customization scheme is completed and is not triggered, acquiring a second node and/or a third node associated with the first node through a second risk relationship, wherein the second risk relationship is the health of the user, the second node is a node corresponding to vehicle state information, the third node is a node corresponding to external environment state information, and the second node and the third node are nodes corresponding to non-execution instructions in the risk graph after the customization scheme is completed and when the customization scheme is not triggered;
constructing a fourth sub-graph and/or constructing a fifth sub-graph according to the first node and the second node;
and determining that the customization scheme is at risk according to the fourth subgraph and/or the fifth subgraph.
5. The method of claim 4, wherein the feeding back a risk pre-warning prompt to the user if the customized solution is at risk comprises:
and feeding back risk prompt information generated according to the fourth subgraph and/or the fifth subgraph to the user.
6. The method of claim 1, wherein the risk assessment of the customized solution according to the risk relationship of the first node or the risk relationship of the first node to other nodes comprises:
when the customized scheme is triggered, acquiring vehicle state information when the customized scheme is executed and external environment information when the customized scheme is executed;
analyzing the customization scheme and carrying out risk assessment on the customization scheme by utilizing the vehicle state information, the external environment information and the preset risk map, wherein the preset risk map comprises nodes and relations among the nodes, the nodes comprise execution instructions of the vehicle-mounted system function customization scheme, nodes corresponding to the vehicle state information or nodes corresponding to the vehicle external environment information, and the relations among the nodes comprise repeated operation, driving safety and user health.
7. The method of claim 6, wherein said parsing the customization scheme and risk evaluating the customization scheme using the vehicle state information, the external environment information, and the preset risk profile comprises:
analyzing the customization scheme to obtain an execution instruction;
determining that the execution instruction is at a first node of the preset risk map;
determining the vehicle state information at a fourth node of the preset risk map;
determining a fifth node of the external environment information in the preset risk map;
and performing risk assessment on the customized scheme according to the risk relationship between the first node and the fourth node and the risk relationship between the first node and the fifth node, wherein the risk relationship between the first node and the fourth node comprises the driving safety and the user health, and the risk relationship between the first node and the fifth node comprises the driving safety and the user health, and the fourth node and the fifth node are nodes corresponding to non-execution instructions in the risk graph when the customized scheme is triggered after being completed.
8. The method of claim 7, wherein the risk evaluating the customized solution according to the risk relationship of the first node to the fourth node and the risk relationship of the first node to the fifth node comprises:
constructing a sixth subgraph according to the first node and the fourth node;
constructing a seventh subgraph according to the first node and the fifth node;
determining that the customization scheme is at risk according to the sixth subgraph and/or the seventh subgraph.
9. The method of claim 8, wherein the feeding back a risk pre-warning prompt to the user if the customized solution is at risk comprises:
and feeding back the risk prompt information generated according to the sixth subgraph and/or the risk prompt information generated according to the seventh subgraph to the user.
10. The method of claim 8, wherein the determining that the customization scheme is at risk from the sixth sub-graph and/or the seventh sub-graph comprises:
and under the condition that the first node and the fourth node in the sixth sub-graph are associated through a first risk relationship, and/or the first node and the fifth node in the seventh sub-graph are associated through a first risk relationship, determining that the customized scheme is at risk, and blocking the customized scheme from being executed, wherein the first risk relationship is the driving safety.
11. The method of claim 8, wherein the determining that the customization scheme is at risk from the sixth sub-graph and/or the seventh sub-graph comprises:
determining that the customized solution is at risk if the first node and the fourth node in the sixth sub-graph are associated by a second risk relationship, and/or the first node and the fifth node in the seventh sub-graph are associated by a second risk relationship, the second risk relationship being the user's health.
12. A server, characterized in that the server comprises a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, carries out the method of any one of claims 1-11.
13. A non-transitory computer-readable storage medium of a computer program, wherein the computer program, when executed by one or more processors, implements the method of any one of claims 1-11.
CN202111628966.6A 2021-12-28 2021-12-28 Interaction method, server and storage medium Active CN114299718B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111628966.6A CN114299718B (en) 2021-12-28 2021-12-28 Interaction method, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111628966.6A CN114299718B (en) 2021-12-28 2021-12-28 Interaction method, server and storage medium

Publications (2)

Publication Number Publication Date
CN114299718A CN114299718A (en) 2022-04-08
CN114299718B true CN114299718B (en) 2023-02-10

Family

ID=80971208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111628966.6A Active CN114299718B (en) 2021-12-28 2021-12-28 Interaction method, server and storage medium

Country Status (1)

Country Link
CN (1) CN114299718B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8631081B2 (en) * 2008-11-12 2014-01-14 YeeJang James Lin System and method for information risk management
EP3810477A4 (en) * 2018-06-25 2022-03-23 Allstate Insurance Company Logical configuration of vehicle control systems based on driver profiles
CN109885033B (en) * 2019-03-18 2021-07-30 百度在线网络技术(北京)有限公司 Safety processing method and device for vehicle control command
CN111798118B (en) * 2020-06-30 2023-08-18 中国工商银行股份有限公司 Enterprise operation risk monitoring method and device
CN111753100A (en) * 2020-06-30 2020-10-09 广州小鹏车联网科技有限公司 Knowledge graph generation method and server for vehicle-mounted application
CN112035667B (en) * 2020-09-02 2023-07-21 河南中原消费金融股份有限公司 Knowledge graph display method and device and terminal equipment
CN113627711B (en) * 2021-06-21 2024-06-28 东风汽车集团股份有限公司 Risk assessment method and related equipment for vehicle functional safety
CN113642926B (en) * 2021-08-31 2023-08-08 上海明略人工智能(集团)有限公司 Method and device for risk early warning, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114299718A (en) 2022-04-08

Similar Documents

Publication Publication Date Title
CN110928409B (en) Vehicle-mounted scene mode control method and device, vehicle and storage medium
US11544625B2 (en) Computing system for training, deploying, executing, and updating machine learning models
Bak et al. Smart Block: A visual block language and its programming environment for IoT
CN109876445B (en) High-decoupling guiding method and system based on behavior tree
Combéfis et al. A formal framework for design and analysis of human-machine interaction
US9292263B2 (en) System and method for embedding symbols within a visual representation of a software design to indicate completeness
CN114299718B (en) Interaction method, server and storage medium
US11949640B2 (en) Email widgets
Eklund et al. Architecture for large-scale innovation experiment systems
CN113189909B (en) Control method, device and equipment of vehicle control instruction block and storage medium
CN113760423A (en) Vehicle with intelligent user interface
CN110413518B (en) Control object library generation method and device and computer readable storage medium
Fong et al. A preference modelling approach to support intelligibility in pervasive applications
WO2023123995A1 (en) Vehicle data processing method and apparatus, and vehicle
WO2020050891A1 (en) Robot memory management techniques
CN115509572A (en) Method for dynamically configuring business logic, cloud platform, vehicle and storage medium
Panagiotidi et al. Towards practical normative agents: A framework and an implementation for norm-aware planning
JP5123337B2 (en) Verification data generation device, verification data generation program, and verification data generation method
CN106897104B (en) Program editing platform and program editing method
JP2007058750A (en) Data specification description document and verification data generation device
US20140223152A1 (en) Configuring operating system administration capabilities using an embedded workflow engine
CN114816373B (en) Instant error prompt method and system for low-code development platform
CN109408984B (en) CPS scene modeling method and device
CN117601888A (en) Interaction method, server and storage medium
Fu et al. Modeling of individualized human driver model for automated personalized supervision

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant