CN117687509A - Virtual reality-based method for creating safety boundary - Google Patents

Virtual reality-based method for creating safety boundary Download PDF

Info

Publication number
CN117687509A
CN117687509A CN202311526883.5A CN202311526883A CN117687509A CN 117687509 A CN117687509 A CN 117687509A CN 202311526883 A CN202311526883 A CN 202311526883A CN 117687509 A CN117687509 A CN 117687509A
Authority
CN
China
Prior art keywords
virtual reality
security
user
detected
creating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311526883.5A
Other languages
Chinese (zh)
Inventor
万耀辉
张巍丽
杨阳
丁赫
裘昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Arcvideo Technology Co ltd
Original Assignee
Hangzhou Arcvideo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Arcvideo Technology Co ltd filed Critical Hangzhou Arcvideo Technology Co ltd
Priority to CN202311526883.5A priority Critical patent/CN117687509A/en
Publication of CN117687509A publication Critical patent/CN117687509A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention discloses a method for creating a safety boundary based on virtual reality, which comprises the following steps: s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information; s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface; s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors; s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention; s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.

Description

Virtual reality-based method for creating safety boundary
Technical Field
The invention belongs to the technical field of Virtual Reality (VR), and particularly relates to a method for creating a safety boundary based on virtual reality.
Background
In existing security boundary creation methods, there are some drawbacks, and security boundaries typically involve physical barriers such as fencing, access control systems, etc. However, these conventional methods sometimes appear to be cumbersome and inflexible, difficult to accommodate in complex and varying environments, and the like.
Disclosure of Invention
In view of the above problems, the present invention provides a method for creating a security boundary based on virtual reality, which can create a virtual boundary in a real environment by using a virtual reality technology and dynamically adjust the virtual boundary according to the real situation, thereby implementing more flexible and efficient security boundary creation.
In order to solve the technical problems, the invention adopts the following technical scheme:
a method of creating a security boundary based on virtual reality, comprising the steps of:
s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information;
s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface;
s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors;
s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention;
s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
In a possible implementation, in S10, the environmental information includes topography, building structures, and other obstacles, and the tag classification includes static objects and dynamic objects; and meanwhile, GPS positioning information of the object is acquired, and the GPS positioning information is marked.
In a possible implementation manner, in S30, the behavior of the object and the individual is monitored through the virtual reality system, and performing behavior analysis includes adopting a motion detection method, adopting a frame difference-based algorithm, calculating a pixel value difference between adjacent frames, and if the difference is greater than a threshold value, determining that the pixel value difference is a moving object, and marking the moving object with a mark of a dynamic object; for a moving object, the movement of object pixels between successive frames is detected, tracking the trajectory of the moving object.
In a possible implementation manner, in S30, the behaviors of the object and the individual are monitored through the virtual reality system, and performing behavior analysis includes adopting an abnormal behavior detection method of exponential smoothing, sorting behavior data of the user according to a time sequence, performing data smoothing, and when detecting that the actual data of a node of the user has excessive difference between abnormal and smoothed values, giving and prompting that the greater the difference is, the higher the severity of the triggered event is.
In a possible implementation manner, in S30, the behavior of the object and the individual is monitored through the virtual reality system, and performing behavior analysis includes adopting an intrusion detection method of signature detection for the established security boundary, adopting a built-in system detection library for signature detection, triggering event alarms when the security boundary is triggered to the same behavior data as the system detection library, and sending different security warning information according to different security levels.
In a possible implementation manner, the method further includes: s60, storing instructions of a user and data of a real-time scene.
The invention has the following beneficial effects: the method can be used for enhancing physical safety, detecting potential invasion or abnormal behaviors by monitoring and analyzing the motion in the environment in real time, and can help to identify and prevent security threats and improve the security level.
Drawings
Fig. 1 is a flow chart of steps of a method for creating a security boundary based on virtual reality according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flowchart of the steps of a method for creating a security boundary based on virtual reality according to an embodiment of the present invention is shown, including the steps of:
s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information;
s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface;
s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors; for the object and user behavior detection method, adopting motion detection, abnormal behavior detection or intrusion detection; detecting objects in real time, and marking different security grades for the objects which are possibly causing potential safety hazards due to abnormality, wherein the grade 1 is the highest risk, and the grade 5 is security; for objects with different security levels, the frequency of detection is different, and based on long-time detection, the objects with different security levels are subjected to security level change;
s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention;
s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
In the method for creating the safety boundary based on the virtual reality according to the embodiment of the invention, in S10, the environmental information includes topography, building structure and other obstacles, and the mark classification includes static objects and dynamic objects; and meanwhile, GPS positioning information of the object is acquired, and the GPS positioning information is marked.
In the method for creating the safety boundary based on the virtual reality, in the S30, the behaviors of the object and the individual are monitored through a virtual reality system, the behaviors are analyzed, the method comprises the steps of adopting a motion detection method, adopting a frame difference-based algorithm, calculating pixel value differences between adjacent frames, and if the differences are larger than a threshold value, the differences are considered to be moving objects, and marking the moving objects with dynamic objects; for a moving object, the movement of object pixels between successive frames is detected, tracking the trajectory of the moving object.
In the method for creating the safety boundary based on the virtual reality, in the S30, the behaviors of the object and the individual are monitored through the virtual reality system, the behavior analysis comprises an abnormal behavior detection method adopting exponential smoothing, behavior data of the user are ordered according to a time sequence, data smoothing is carried out, and when the fact that the difference between the abnormal behavior data and the smoothed value of the actual data of one node of the user is detected to be too large, the difference is larger, and the trigger event severity is higher.
In the method for creating the safety boundary based on the virtual reality, in the S30, the behaviors of the object and the individual are monitored through the virtual reality system, the behavior analysis is carried out, the built safety boundary is subjected to an intrusion detection method of signature detection, a built-in system detection library is adopted in the signature detection method, when the behavior data which is the same as the behavior data of the system detection library are triggered in the safety boundary, event alarms are triggered, and different safety warning information is sent according to different safety levels.
The method for creating the safety boundary based on virtual reality according to the embodiment of the invention further comprises the following steps: s60, storing instructions of a user and data of a real-time scene. The stored information is provided for the environment scanning module, so that the environment scanning module can conveniently judge whether the current environment information is the same as the provided information according to the information, the stored information can be reused, the judgment is more refined, and the scanning time and pressure are saved. The operation of the user on the data can be recorded in the database, meanwhile, the stored data can be further processed and processed by the user, and the actual experience of the user is met.
The virtual reality-based safety boundary creation method can be used for enhancing physical safety, detecting potential invasion or abnormal behaviors by monitoring and analyzing movements in the environment in real time, and can help to identify and prevent safety threats and improve the safety level. Virtual reality technology allows a user to customize the shape, size, and location of a security boundary to accommodate different scenarios and requirements. This customization makes the security boundary more suitable for various environments and applications, the virtual system allows remote monitoring, and security personnel can view the virtual environment model and real-time data remotely through an internet connection. The remote management function can increase convenience of operation. The method is suitable for various environments including industrial facilities, public places, residential areas and the like. It can also be used to monitor and protect personal privacy, for example in home security systems, with the development of virtual reality technology, the performance and functionality of this approach can be further improved with improvements in hardware and software. Future developments may include more accurate environmental modeling, more intelligent behavioral analysis, and more custom options.
It should be understood that the exemplary embodiments described herein are illustrative and not limiting. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.

Claims (6)

1. A method of creating a security boundary based on virtual reality, comprising the steps of:
s10, based on the virtual reality head-mounted equipment and the sensor, scanning current environment information;
s20, providing a virtual reality user interface, and enabling a user to customize the shape, size and position of the safety boundary based on scanned real scene information; and providing information prompts and warnings to the user through the virtual user interface;
s30, monitoring behaviors of objects and individuals through a virtual reality system, and analyzing the behaviors;
s40, when a potential threat is detected, automatically triggering an alarm; for the detected models with different security levels, when a potential dangerous event is detected, sending a security warning to a user through a user interface module or stopping the service of the virtual reality equipment, and sending a warning event to a security officer for human intervention;
s50, performing remote monitoring, and remotely checking the virtual model and real-time data of the physical environment by security personnel through Internet connection.
2. The virtual reality based method of creating a safety boundary of claim 1, wherein in S10, the environmental information includes terrain, building structures and other obstacles, and the marker classification includes static objects and dynamic objects; and meanwhile, GPS positioning information of the object is acquired, and the GPS positioning information is marked.
3. The virtual reality-based method of creating a safety boundary according to claim 1 or 2, wherein monitoring the behavior of the object and the individual by the virtual reality system in S30 and performing behavior analysis includes employing a motion detection method, employing a frame difference-based algorithm, calculating a pixel value difference between adjacent frames, and if the difference is greater than a threshold, determining that the difference is a moving object, marking the moving object with a dynamic object; for a moving object, the movement of object pixels between successive frames is detected, tracking the trajectory of the moving object.
4. The method for creating a safety boundary based on virtual reality according to claim 1 or 2, wherein the monitoring of the behavior of the object and the individual by the virtual reality system and the behavior analysis in S30 includes the steps of adopting an abnormal behavior detection method of exponential smoothing, sorting the behavior data of the user according to the time sequence, smoothing the data, and giving a prompt that the greater the difference is, the higher the severity of the triggered event is when the difference between the actual data abnormality of one node of the user and the smoothed value is detected to be too great.
5. The method for creating a security boundary based on virtual reality according to claim 1 or 2, wherein the monitoring of the behavior of the object and the individual by the virtual reality system in S30 and the performing of the behavior analysis includes adopting an intrusion detection method of signature detection for the established security boundary, adopting a built-in system detection library for signature detection, triggering event alarms when the detection of the security boundary triggers to the same behavior data as the system detection library, and transmitting different security warning information according to different security levels.
6. The virtual reality-based method of creating a security boundary of claim 1 or 2, further comprising: s60, storing instructions of a user and data of a real-time scene.
CN202311526883.5A 2023-11-16 2023-11-16 Virtual reality-based method for creating safety boundary Pending CN117687509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311526883.5A CN117687509A (en) 2023-11-16 2023-11-16 Virtual reality-based method for creating safety boundary

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311526883.5A CN117687509A (en) 2023-11-16 2023-11-16 Virtual reality-based method for creating safety boundary

Publications (1)

Publication Number Publication Date
CN117687509A true CN117687509A (en) 2024-03-12

Family

ID=90127531

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311526883.5A Pending CN117687509A (en) 2023-11-16 2023-11-16 Virtual reality-based method for creating safety boundary

Country Status (1)

Country Link
CN (1) CN117687509A (en)

Similar Documents

Publication Publication Date Title
Kim et al. Vision-based object-centric safety assessment using fuzzy inference: Monitoring struck-by accidents with moving objects
CN111144291B (en) Video monitoring area personnel intrusion discrimination method and device based on target detection
EP3002741B1 (en) Method and system for security system tampering detection
CN114973140A (en) Dangerous area personnel intrusion monitoring method and system based on machine vision
Arslan et al. Visualizing intrusions in dynamic building environments for worker safety
WO2010141116A2 (en) System and methods for improving accuracy and robustness of abnormal behavior detection
CN111079722B (en) Hoisting process personnel safety monitoring method and system
EP1943631A2 (en) System and method for securing an infrastructure
KR20200017594A (en) Method for Recognizing and Tracking Large-scale Object using Deep learning and Multi-Agent
US20190347366A1 (en) Computer-aided design and analysis method for physical protection systems
CN117973705B (en) Data processing and analyzing system and method for intelligent building site monitoring system
CN114218992B (en) Abnormal object detection method and related device
CN112288320A (en) Subway operation risk monitoring and management system
CN116704411A (en) Security control method, system and storage medium based on Internet of things
CN114677640A (en) Intelligent construction site safety monitoring system and method based on machine vision
CN115410354A (en) Safety early warning method, device and system for industrial plant
CN118486152B (en) Security alarm information data interaction system and method
CN111860187A (en) High-precision worn mask identification method and system
CN117711131A (en) Constructor warning protection system based on gesture danger analysis
CN115767017A (en) Wisdom sentry monitored control system
CN111885349A (en) Pipe rack abnormity detection system and method
CN117935453A (en) Port machine remote control method and system based on binocular camera
CN117687509A (en) Virtual reality-based method for creating safety boundary
Hubner et al. Audio-video sensor fusion for the detection of security critical events in public spaces
Xie et al. On‐line physical security monitoring of power substations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination