CN117687509A - Virtual reality-based method for creating safety boundary - Google Patents
Virtual reality-based method for creating safety boundary Download PDFInfo
- Publication number
- CN117687509A CN117687509A CN202311526883.5A CN202311526883A CN117687509A CN 117687509 A CN117687509 A CN 117687509A CN 202311526883 A CN202311526883 A CN 202311526883A CN 117687509 A CN117687509 A CN 117687509A
- Authority
- CN
- China
- Prior art keywords
- virtual reality
- security
- user
- detected
- creating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000006399 behavior Effects 0.000 claims abstract description 34
- 238000012544 monitoring process Methods 0.000 claims abstract description 14
- 238000001514 detection method Methods 0.000 claims description 28
- 230000033001 locomotion Effects 0.000 claims description 9
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 7
- 238000009499 grossing Methods 0.000 claims description 6
- 230000001960 triggered effect Effects 0.000 claims description 5
- 230000007613 environmental effect Effects 0.000 claims description 3
- 230000003068 static effect Effects 0.000 claims description 3
- 230000005856 abnormality Effects 0.000 claims description 2
- 239000003550 marker Substances 0.000 claims 1
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 238000012876 topography Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000004387 environmental modeling Methods 0.000 description 1
Landscapes
- Alarm Systems (AREA)
Abstract
The invention discloses a method for creating a safety boundary based on virtual reality, which comprises the following steps: s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information; s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface; s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors; s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention; s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
Description
Technical Field
The invention belongs to the technical field of Virtual Reality (VR), and particularly relates to a method for creating a safety boundary based on virtual reality.
Background
In existing security boundary creation methods, there are some drawbacks, and security boundaries typically involve physical barriers such as fencing, access control systems, etc. However, these conventional methods sometimes appear to be cumbersome and inflexible, difficult to accommodate in complex and varying environments, and the like.
Disclosure of Invention
In view of the above problems, the present invention provides a method for creating a security boundary based on virtual reality, which can create a virtual boundary in a real environment by using a virtual reality technology and dynamically adjust the virtual boundary according to the real situation, thereby implementing more flexible and efficient security boundary creation.
In order to solve the technical problems, the invention adopts the following technical scheme:
a method of creating a security boundary based on virtual reality, comprising the steps of:
s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information;
s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface;
s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors;
s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention;
s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
In a possible implementation, in S10, the environmental information includes topography, building structures, and other obstacles, and the tag classification includes static objects and dynamic objects; and meanwhile, GPS positioning information of the object is acquired, and the GPS positioning information is marked.
In a possible implementation manner, in S30, the behavior of the object and the individual is monitored through the virtual reality system, and performing behavior analysis includes adopting a motion detection method, adopting a frame difference-based algorithm, calculating a pixel value difference between adjacent frames, and if the difference is greater than a threshold value, determining that the pixel value difference is a moving object, and marking the moving object with a mark of a dynamic object; for a moving object, the movement of object pixels between successive frames is detected, tracking the trajectory of the moving object.
In a possible implementation manner, in S30, the behaviors of the object and the individual are monitored through the virtual reality system, and performing behavior analysis includes adopting an abnormal behavior detection method of exponential smoothing, sorting behavior data of the user according to a time sequence, performing data smoothing, and when detecting that the actual data of a node of the user has excessive difference between abnormal and smoothed values, giving and prompting that the greater the difference is, the higher the severity of the triggered event is.
In a possible implementation manner, in S30, the behavior of the object and the individual is monitored through the virtual reality system, and performing behavior analysis includes adopting an intrusion detection method of signature detection for the established security boundary, adopting a built-in system detection library for signature detection, triggering event alarms when the security boundary is triggered to the same behavior data as the system detection library, and sending different security warning information according to different security levels.
In a possible implementation manner, the method further includes: s60, storing instructions of a user and data of a real-time scene.
The invention has the following beneficial effects: the method can be used for enhancing physical safety, detecting potential invasion or abnormal behaviors by monitoring and analyzing the motion in the environment in real time, and can help to identify and prevent security threats and improve the security level.
Drawings
Fig. 1 is a flow chart of steps of a method for creating a security boundary based on virtual reality according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flowchart of the steps of a method for creating a security boundary based on virtual reality according to an embodiment of the present invention is shown, including the steps of:
s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information;
s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface;
s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors; for the object and user behavior detection method, adopting motion detection, abnormal behavior detection or intrusion detection; detecting objects in real time, and marking different security grades for the objects which are possibly causing potential safety hazards due to abnormality, wherein the grade 1 is the highest risk, and the grade 5 is security; for objects with different security levels, the frequency of detection is different, and based on long-time detection, the objects with different security levels are subjected to security level change;
s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention;
s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
In the method for creating the safety boundary based on the virtual reality according to the embodiment of the invention, in S10, the environmental information includes topography, building structure and other obstacles, and the mark classification includes static objects and dynamic objects; and meanwhile, GPS positioning information of the object is acquired, and the GPS positioning information is marked.
In the method for creating the safety boundary based on the virtual reality, in the S30, the behaviors of the object and the individual are monitored through a virtual reality system, the behaviors are analyzed, the method comprises the steps of adopting a motion detection method, adopting a frame difference-based algorithm, calculating pixel value differences between adjacent frames, and if the differences are larger than a threshold value, the differences are considered to be moving objects, and marking the moving objects with dynamic objects; for a moving object, the movement of object pixels between successive frames is detected, tracking the trajectory of the moving object.
In the method for creating the safety boundary based on the virtual reality, in the S30, the behaviors of the object and the individual are monitored through the virtual reality system, the behavior analysis comprises an abnormal behavior detection method adopting exponential smoothing, behavior data of the user are ordered according to a time sequence, data smoothing is carried out, and when the fact that the difference between the abnormal behavior data and the smoothed value of the actual data of one node of the user is detected to be too large, the difference is larger, and the trigger event severity is higher.
In the method for creating the safety boundary based on the virtual reality, in the S30, the behaviors of the object and the individual are monitored through the virtual reality system, the behavior analysis is carried out, the built safety boundary is subjected to an intrusion detection method of signature detection, a built-in system detection library is adopted in the signature detection method, when the behavior data which is the same as the behavior data of the system detection library are triggered in the safety boundary, event alarms are triggered, and different safety warning information is sent according to different safety levels.
The method for creating the safety boundary based on virtual reality according to the embodiment of the invention further comprises the following steps: s60, storing instructions of a user and data of a real-time scene. The stored information is provided for the environment scanning module, so that the environment scanning module can conveniently judge whether the current environment information is the same as the provided information according to the information, the stored information can be reused, the judgment is more refined, and the scanning time and pressure are saved. The operation of the user on the data can be recorded in the database, meanwhile, the stored data can be further processed and processed by the user, and the actual experience of the user is met.
The virtual reality-based safety boundary creation method can be used for enhancing physical safety, detecting potential invasion or abnormal behaviors by monitoring and analyzing movements in the environment in real time, and can help to identify and prevent safety threats and improve the safety level. Virtual reality technology allows a user to customize the shape, size, and location of a security boundary to accommodate different scenarios and requirements. This customization makes the security boundary more suitable for various environments and applications, the virtual system allows remote monitoring, and security personnel can view the virtual environment model and real-time data remotely through an internet connection. The remote management function can increase convenience of operation. The method is suitable for various environments including industrial facilities, public places, residential areas and the like. It can also be used to monitor and protect personal privacy, for example in home security systems, with the development of virtual reality technology, the performance and functionality of this approach can be further improved with improvements in hardware and software. Future developments may include more accurate environmental modeling, more intelligent behavioral analysis, and more custom options.
It should be understood that the exemplary embodiments described herein are illustrative and not limiting. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.
Claims (6)
1. A method of creating a security boundary based on virtual reality, comprising the steps of:
s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information;
s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface;
s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors;
s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention;
s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
2. The virtual reality based method of creating a safety boundary of claim 1, wherein in S10, the environmental information includes terrain, building structures and other obstacles, and the marker classification includes static objects and dynamic objects; and meanwhile, GPS positioning information of the object is acquired, and the GPS positioning information is marked.
3. The virtual reality-based method of creating a safety boundary according to claim 1 or 2, wherein monitoring the behavior of the object and the individual by the virtual reality system in S30 and performing behavior analysis includes employing a motion detection method, employing a frame difference-based algorithm, calculating a pixel value difference between adjacent frames, and if the difference is greater than a threshold, determining that the difference is a moving object, marking the moving object with a dynamic object; for a moving object, the movement of object pixels between successive frames is detected, tracking the trajectory of the moving object.
4. The method for creating a safety boundary based on virtual reality according to claim 1 or 2, wherein the monitoring of the behavior of the object and the individual by the virtual reality system and the behavior analysis in S30 includes the steps of adopting an abnormal behavior detection method of exponential smoothing, sorting the behavior data of the user according to the time sequence, smoothing the data, and giving a prompt that the greater the difference is, the higher the severity of the triggered event is when the difference between the actual data abnormality of one node of the user and the smoothed value is detected to be too great.
5. The method for creating a security boundary based on virtual reality according to claim 1 or 2, wherein the monitoring of the behavior of the object and the individual by the virtual reality system in S30 and the performing of the behavior analysis includes adopting an intrusion detection method of signature detection for the established security boundary, adopting a built-in system detection library for signature detection, triggering event alarms when the detection of the security boundary triggers to the same behavior data as the system detection library, and transmitting different security warning information according to different security levels.
6. The virtual reality-based method of creating a security boundary of claim 1 or 2, further comprising: s60, storing instructions of a user and data of a real-time scene.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311526883.5A CN117687509A (en) | 2023-11-16 | 2023-11-16 | Virtual reality-based method for creating safety boundary |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311526883.5A CN117687509A (en) | 2023-11-16 | 2023-11-16 | Virtual reality-based method for creating safety boundary |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117687509A true CN117687509A (en) | 2024-03-12 |
Family
ID=90127531
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311526883.5A Pending CN117687509A (en) | 2023-11-16 | 2023-11-16 | Virtual reality-based method for creating safety boundary |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117687509A (en) |
-
2023
- 2023-11-16 CN CN202311526883.5A patent/CN117687509A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | Vision-based object-centric safety assessment using fuzzy inference: Monitoring struck-by accidents with moving objects | |
CN111144291B (en) | Video monitoring area personnel intrusion discrimination method and device based on target detection | |
EP3002741B1 (en) | Method and system for security system tampering detection | |
CN114973140A (en) | Dangerous area personnel intrusion monitoring method and system based on machine vision | |
Arslan et al. | Visualizing intrusions in dynamic building environments for worker safety | |
WO2010141116A2 (en) | System and methods for improving accuracy and robustness of abnormal behavior detection | |
CN111079722B (en) | Hoisting process personnel safety monitoring method and system | |
EP1943631A2 (en) | System and method for securing an infrastructure | |
KR20200017594A (en) | Method for Recognizing and Tracking Large-scale Object using Deep learning and Multi-Agent | |
US20190347366A1 (en) | Computer-aided design and analysis method for physical protection systems | |
CN117973705B (en) | Data processing and analyzing system and method for intelligent building site monitoring system | |
CN114218992B (en) | Abnormal object detection method and related device | |
CN112288320A (en) | Subway operation risk monitoring and management system | |
CN116704411A (en) | Security control method, system and storage medium based on Internet of things | |
CN114677640A (en) | Intelligent construction site safety monitoring system and method based on machine vision | |
CN115410354A (en) | Safety early warning method, device and system for industrial plant | |
CN118486152B (en) | Security alarm information data interaction system and method | |
CN111860187A (en) | High-precision worn mask identification method and system | |
CN117711131A (en) | Constructor warning protection system based on gesture danger analysis | |
CN115767017A (en) | Wisdom sentry monitored control system | |
CN111885349A (en) | Pipe rack abnormity detection system and method | |
CN117935453A (en) | Port machine remote control method and system based on binocular camera | |
CN117687509A (en) | Virtual reality-based method for creating safety boundary | |
Hubner et al. | Audio-video sensor fusion for the detection of security critical events in public spaces | |
Xie et al. | On‐line physical security monitoring of power substations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |