WO2020108293A1 - Control method, related apparatus, and storage medium - Google Patents

Control method, related apparatus, and storage medium Download PDF

Info

Publication number
WO2020108293A1
WO2020108293A1 PCT/CN2019/117623 CN2019117623W WO2020108293A1 WO 2020108293 A1 WO2020108293 A1 WO 2020108293A1 CN 2019117623 W CN2019117623 W CN 2019117623W WO 2020108293 A1 WO2020108293 A1 WO 2020108293A1
Authority
WO
WIPO (PCT)
Prior art keywords
robot
user
information
control
robots
Prior art date
Application number
PCT/CN2019/117623
Other languages
French (fr)
Chinese (zh)
Inventor
黄晓庆
骆磊
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Publication of WO2020108293A1 publication Critical patent/WO2020108293A1/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B25HAND TOOLS; PORTABLE POWER-DRIVEN TOOLS; MANIPULATORS
    • B25JMANIPULATORS; CHAMBERS PROVIDED WITH MANIPULATION DEVICES
    • B25J9/00Programme-controlled manipulators
    • B25J9/16Programme controls
    • B25J9/1674Programme controls characterised by safety, monitoring, diagnostic

Definitions

  • the objective of some embodiments of the present application is to provide a control method, a related device, and a storage medium, so that a security threat caused by a robot to a user can be effectively avoided.
  • An embodiment of the present application provides a control method, which is applied to a server and includes the following steps: acquiring position information of multiple robots; acquiring control information sent by a user's control device; according to position information and control information of multiple robots , Identify robots with security threats; control robots with security threats to stop.
  • control information includes: location information of the user and an absolute direction pointed by the control device.
  • determining a threatened area according to the user’s position information and the absolute direction pointed by the control device specifically including: the user’s position is taken as the apex, the absolute direction pointed by the control device is taken as the axis, and the preset angle is the apex angle.
  • Conical space Use conical space as a threatened area.
  • FIG. 2 is a schematic diagram of an application scenario of the control method according to the first embodiment of the present application.
  • Step 101 Acquire position information of multiple robots.
  • the specific content of the control information acquired by the server is different, according to the position information and control information of multiple robots, a specific implementation manner of determining a robot with a security threat will also have The difference.
  • the user's location information includes the user's latitude and longitude information and altitude information, because the processor pre-stores the robot and the user's three-dimensional map information within the user's range of motion, so the user's position in the three-dimensional map can be accurately determined according to the user's location information Coordinate position.
  • the server may perform a marking operation on the robot specified by the user.
  • the user sends the identity code of a robot that is considered safer to the server through an instruction, and the server numbers the robot indicated by the instruction after receiving the instruction.
  • this embodiment is a device embodiment corresponding to the first embodiment, and this embodiment can be implemented in cooperation with the first embodiment.
  • the relevant technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the relevant technical details mentioned in this embodiment can also be applied in the first embodiment.
  • modules involved in this embodiment are all logical modules.
  • a logical unit may be a physical unit or a part of a physical unit, or Combination of multiple physical units.
  • this embodiment does not introduce units that are not closely related to solving the technical problems proposed in this application, but this does not mean that there are no other units in this embodiment.
  • the memory 502 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required by at least one function; the storage data area may store a list of options, and the like.
  • the memory may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the memory 502 may optionally include a memory remotely set relative to the processor 501, and these remote memories may be connected to an external device through a network. Examples of the above network include but are not limited to the Internet, intranet, local area network, mobile communication network, and combinations thereof.
  • RAM Random Access Memory
  • CD-ROM Compact Disc

Abstract

A control method, a control apparatus, and a storage medium. The control method is applied to a server, and comprises: acquiring position information of multiple robots; acquiring control information sent by a control device of a user; determining, according to the position information of the multiple robots and the control information, a robot posing a safety threat; and controlling the robot posing a safety threat to stop operating. The control apparatus comprises: a first acquisition module (301), a second acquisition module (302), a determination module (303), and a control module (304), wherein the first acquisition module (301) is used to acquire position information of multiple robots, the second acquisition module (302) is used to acquire control information sent by a control device of a user, the determination module (303) is used to determine, according to the position information of the multiple robots and the control information, a robot posing a safety threat, and the control module (304) is used to control the robot posing a safety threat to stop operating. The server comprises at least one processor (501) and a memory (502) communicatively connected to the server. The memory (502) stores instructions executable by the processor (501). The instructions are executed by the processor (501), such that the processor executes the corresponding control method. A computer-readable storage medium stores a computer program. When the computer program is executed by the processor (501), the corresponding control method is implemented. The control method, the control apparatus, and the storage medium effectively avoid a safety threat posed by a robot to the user.

Description

一种控制方法、 相关装置及存储介质 Control method, related device and storage medium
[0001] 本申请引用于 2018年 11月 29日递交的名称为“一种控制方法、 相关装置及存储 介质”的第 201811442609.9号中国专利申请, 其通过引用被全部并入本申请。 技术领域 [0001] This application refers to China Patent Application No. 201811442609.9, which was filed on November 29, 2018 and titled "A Control Method, Related Devices, and Storage Media," which is fully incorporated by reference into this application. Technical field
[0002] 本申请实施例涉及通信技术领域, 特别涉及一种控制方法、 相关装置及存储介 质。 [0002] Embodiments of the present application relate to the field of communication technologies, and in particular, to a control method, related devices, and storage media.
背景技术 Background technique
[0003] 随着机器人技术的发展, 机器人的应用越来越广泛, 在工业、 家庭和安防等众 多领域都已经在用机器人替代人类的工作。 同时机器人的智能性和独立思考能 力也在日益提升, 有独立分析判断和情感, 而不再是只能做简单的机械处理。 [0003] With the development of robot technology, the application of robots is becoming more and more extensive, and robots have been used to replace human work in many fields such as industry, home and security. At the same time, the robot's intelligence and independent thinking ability are also increasing, with independent analysis and judgment and emotion, instead of only doing simple mechanical processing.
[0004] 发明人发现现有技术至少存在以下问题: 在机器人的智能性提升到一定程度, 或者原有执行逻辑中存在某些问题或漏洞时, 机器人是可能在某些场合下对周 围人造成安全威胁的, 而现有技术中还没有一种有效的方式可以有效的规避这 种威胁。 [0004] The inventor found that the prior art has at least the following problems: When the intelligence of the robot is improved to a certain degree, or there are certain problems or loopholes in the original execution logic, the robot may cause surrounding people on certain occasions Security threats, and there is no effective way in the prior art to effectively evade such threats.
发明概述 Summary of the invention
技术问题 technical problem
问题的解决方案 Solution to the problem
技术解决方案 Technical solution
[0005] 本申请部分实施例的目的在于提供一种控制方法、 相关装置及存储介质, 使得 能够有效的规避机器人对用户造成的安全威胁。 [0005] The objective of some embodiments of the present application is to provide a control method, a related device, and a storage medium, so that a security threat caused by a robot to a user can be effectively avoided.
[0006] 本申请实施例提供了一种控制方法, 应用于服务器, 包括以下步骤: 获取多个 机器人的位置信息; 获取用户的控制设备发送的控制信息; 根据多个机器人的 位置信息和控制信息, 确定出具有安全威胁的机器人; 控制具有安全威胁的机 器人停止。 [0006] An embodiment of the present application provides a control method, which is applied to a server and includes the following steps: acquiring position information of multiple robots; acquiring control information sent by a user's control device; according to position information and control information of multiple robots , Identify robots with security threats; control robots with security threats to stop.
[0007] 本申请实施例还提供了一种控制装置, 包括: 第一获取模块、 第二获取模块、 确定模块和控制模块, 第一获取模块, 用于获取多个机器人的位置信息; 第二 获取模块, 用于获取用户的控制设备发送的控制信息; 确定模块, 用于根据多 个机器人的位置信息和控制信息, 确定出具有安全威胁的机器人; 控制模块, 用于控制具有安全威胁的机器人停止。 [0007] An embodiment of the present application further provides a control device, including: a first acquisition module, a second acquisition module, a determination module, and a control module, the first acquisition module is used to acquire position information of multiple robots; The acquisition module is used to acquire the control information sent by the user's control device; the determination module is used to determine the robot with security threat based on the position information and control information of multiple robots; the control module is used to control the robot with security threat stop.
[0008] 本申请实施例还提供了一种服务器, 包括: 至少一个处理器; 以及, 与至少一 个处理器通信连接的存储器; 其中, 存储器存储有可被至少一个处理器执行的 指令, 指令被至少一个处理器执行, 以使至少一个处理器能够执行如上的控制 方法。 [0008] An embodiment of the present application also provides a server, including: at least one processor; and, a memory communicatively connected to the at least one processor; wherein, the memory stores instructions executable by the at least one processor, and the instructions are At least one processor executes to enable the at least one processor to execute the above control method.
[0009] 本申请实施例还提供了一种计算机可读存储介质, 存储有计算机程序, 计算机 程序被处理器执行时实现如上所述的控制方法。 [0009] Embodiments of the present application also provide a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the control method described above is implemented.
[0010] 本申请实施例相对于现有技术而言, 通过获取多个机器人的位置信息以及控制 设备发送的控制信息, 能够准确的确定出多个机器人中具有安全威胁的机器人 , 通过控制具有安全威胁的机器人停止, 可以有效规避具有安全威胁的机器人 对用户造成的伤害, 从而提高了机器人应用的安全性和可靠性。 [0010] Compared with the prior art, the embodiments of the present application can accurately determine the robots with security threats among the multiple robots by acquiring the position information of multiple robots and the control information sent by the control device, and by controlling the security Stopping the threatened robot can effectively avoid the harm caused by the robot with security threats to the user, thereby improving the safety and reliability of the robot application.
[0011] 例如, 控制信息包括用户的位置信息。 [0011] For example, the control information includes location information of the user.
[0012] 例如, 根据多个机器人的位置信息和控制信息, 确定出具有安全隐患的机器人 , 具体包括: 根据用户的位置信息和多个机器人的位置信息, 从多个机器人中 筛选出在预设范围内且距离用户最近的机器人, 并将筛选出的机器人作为具有 安全威胁的机器人。 [0012] For example, according to the position information and control information of a plurality of robots, a robot with potential safety hazards is determined, which specifically includes: filtering out presets from the plurality of robots according to the position information of the user and the position information of the plurality of robots The robot within the range and closest to the user, and the selected robot is regarded as a robot with security threats.
[0013] 例如, 控制信息还包括用户的身份信息。 [0013] For example, the control information further includes user identity information.
[0014] 例如, 根据多个机器人的位置信息和控制信息, 确定出具有安全隐患的机器人 , 具体包括: 根据用户的身份信息从历史交互数据库中进行查找, 确定出与用 户存在历史交互信息的机器人; 根据用户的位置信息从存在历史交互信息的机 器人中筛选出距离最近且存在历史交互信息的机器人; 判断距离最近且存在历 史交互信息的机器人, 与用户之间的距离是否在预设范围内, 若是, 则将距离 最近且存在历史交互信息的机器人作为具有安全威胁的机器人, 否则, 根据用 户的位置信息和多个机器人的位置信息, 直接从多个机器人中筛选出在预设范 围内且距离用户最近的机器人, 并将筛选出的机器人作为具有安全威胁的机器 人。 该实施例中, 首先根据用户的身份信息从曾经有过交互的机器人中进行筛 选, 在曾经有过交互的机器人中无法筛选出具有安全威胁的机器人时, 则直接 从多个机器人中筛选出距离用户最近的机器人, 并将该机器人作为具有安全威 胁的机器人, 从而保证了具有安全威胁的机器人确定方式的多样性和准确性。 [0014] For example, according to the position information and control information of a plurality of robots, a robot with potential safety hazards is determined, which specifically includes: searching from a historical interaction database according to the user's identity information to determine a robot that has historical interaction information with the user ; According to the user's location information, screen out the robots with the closest historical interaction information from the robots with historical interaction information; Determine whether the robot with the closest distance and historical interaction information is within the preset range from the user, If so, the robot with the closest distance and historical interaction information is regarded as a robot with security threats, otherwise, the distance within the preset range and distance is directly selected from multiple robots based on the user's position information and the position information of multiple robots The user's nearest robot, and the selected robot is regarded as a robot with security threats. In this embodiment, first of all, according to the user's identity information, screen from the robot that has interacted with If the robots that have interacted cannot be screened for security threats, the robot closest to the user is directly selected from multiple robots, and the robot is regarded as a robot with security threats, thereby ensuring Diversity and accuracy of the manner in which robots determine security threats.
[0015] 例如, 控制信息包括: 用户的位置信息和控制设备指向的绝对方向。 [0015] For example, the control information includes: location information of the user and an absolute direction pointed by the control device.
[0016] 例如, 根据多个机器人的位置信息和控制信息, 确定出具有安全隐患的机器人 , 具体包括: 根据用户的位置信息和控制设备指向的绝对方向确定出存在威胁 的区域; 根据用户的位置信息确定出在存在威胁的区域内, 距离用户距离最近 的机器人; 将距离最近的机器人作为具有安全威胁的机器人。 该实施例中, 首 先确定出存在威胁的区域, 然后在存在威胁的区域内查找距离用户最近的机器 人, 并将该机器人作为具有安全威胁的机器人, 从而进一步缩小了查找的范围 , 保证了具有威胁的机器人确定的准确性。 [0016] For example, according to the position information and control information of a plurality of robots, a robot with potential safety hazards is determined, which specifically includes: determining a threatened area according to the user’s position information and the absolute direction pointed by the control device; according to the user’s position The information identifies the robot that is closest to the user in the area where there is a threat; the robot that is closest to it is regarded as a robot with security threats. In this embodiment, the threatened area is first determined, and then the robot closest to the user is found in the threatened area, and the robot is regarded as a robot with a security threat, thereby further narrowing the search range and ensuring the threat The robot determines the accuracy.
[0017] 例如, 根据用户的位置信息和控制设备指向的绝对方向确定出存在威胁的区域 , 具体包括: 以用户的位置为顶点, 控制设备指向的绝对方向为轴线, 预设角 度为顶角构建锥形空间; 将锥形空间作为存在威胁的区域。 [0017] For example, determining a threatened area according to the user’s position information and the absolute direction pointed by the control device, specifically including: the user’s position is taken as the apex, the absolute direction pointed by the control device is taken as the axis, and the preset angle is the apex angle. Conical space; Use conical space as a threatened area.
[0018] 例如, 将距离最近的机器人作为具有安全威胁的机器人之后, 还包括: 若根据 预存的三维地图信息, 确定具有安全威胁的机器人不在用户的视觉范围内, 则 重新执行控制方法。 该实施例中, 若根据三维地图确定出具有安全威胁的机器 人不在用户的视觉范围内, 通过重新执行控制方法, 避免出现误判的情况, 进 一步提高了机器人应用的安全性。 [0018] For example, after the robot with the closest distance is regarded as a robot with a security threat, it further includes: if it is determined that the robot with a security threat is not within the user's visual range based on the pre-stored three-dimensional map information, the control method is re-executed. In this embodiment, if it is determined that the robot with a security threat is not within the user's visual range according to the three-dimensional map, by re-executing the control method, the situation of misjudgment is avoided, and the security of the robot application is further improved.
[0019] 例如, 用户的位置信息还包括: 用户的经纬度信息和海拔高度信息。 [0019] For example, the user's location information further includes: the user's latitude and longitude information and altitude information.
[0020] 例如, 获取多个机器人的位置信息之后, 还包括: 对指定的机器人进行标记操 作; 将被标记的机器人进行排除, 其中, 被标记的机器人为安全性符合预设要 求的机器人。 该实施例中, 通过将用户认为比较安全的机器人进行标记并进行 排除, 从而提高了查找具有安全威胁的机器人的速度。 [0020] For example, after acquiring position information of a plurality of robots, the method further includes: performing a marking operation on the designated robot; excluding the marked robot, where the marked robot is a robot whose safety meets preset requirements. In this embodiment, by marking and excluding robots deemed safe by the user, the speed of finding robots with security threats is increased.
[0021] 例如, 控制具有安全威胁的机器人停止, 具体包括: 向具有安全威胁的机器人 发送暂停指令; 控制具有安全威胁的机器人根据暂停指令在在预设时间内停止 [0021] For example, controlling a robot with a security threat to stop includes specifically: sending a suspension instruction to the robot with a security threat; controlling the robot with a security threat to stop within a preset time according to the suspension instruction
发明的有益效果 对附图的简要说明 Beneficial effects of invention Brief description of the drawings
附图说明 BRIEF DESCRIPTION
[0022] 一个或多个实施例通过与之对应的附图中的图片进行示例性说明, 这些示例性 说明并不构成对实施例的限定, 附图中具有相同参考数字标号的元件表示为类 似的元件, 除非有特别申明, 附图中的图不构成比例限制。 [0022] One or more embodiments are exemplified by the pictures in the corresponding drawings, and these exemplary descriptions do not constitute limitations on the embodiments, and elements with the same reference numerals in the drawings are expressed as similar Unless otherwise stated, the figures in the drawings do not constitute a scale limitation.
[0023] 图 1是根据本申请第一实施例中的控制方法的流程图; [0023] FIG. 1 is a flowchart of a control method according to the first embodiment of the present application;
[0024] 图 2是根据本申请第一实施例中的控制方法应用场景的示意图; [0024] FIG. 2 is a schematic diagram of an application scenario of the control method according to the first embodiment of the present application;
[0025] 图 3是根据本申请第一实施例中的存在威胁的区域确定方式示意图; [0025] FIG. 3 is a schematic diagram of a manner of determining a threatened area according to the first embodiment of the present application;
[0026] 图 4是根据本申请第二实施例中的控制方法的流程图; [0026] FIG. 4 is a flowchart of a control method according to a second embodiment of the present application;
[0027] 图 5是根据本申请第三实施例中的控制装置的方框示意图; [0027] FIG. 5 is a block schematic diagram of a control device according to a third embodiment of the present application;
[0028] 图 6是根据本申请第四实施例中的控制装置的方框示意图; [0028] FIG. 6 is a block schematic diagram of a control device according to a fourth embodiment of the present application;
[0029] 图 7是根据本申请第五实施例中的服务器的结构示意图。 [0029] FIG. 7 is a schematic structural diagram of a server according to a fifth embodiment of the present application.
发明实施例 Invention Example
本发明的实施方式 Embodiments of the invention
[0030] 为了使本申请的目的、 技术方案及优点更加清楚明白, 以下结合附图及实施例 , 对本申请部分实施例进行进一步详细说明。 应当理解, 此处所描述的具体实 施例仅仅用以解释本申请, 并不用于限定本申请。 [0030] In order to make the purpose, technical solutions and advantages of the present application more clear, the following describes some embodiments of the present application in further detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain this application, and are not used to limit this application.
[0031] 本申请第一实施例涉及一种控制方法, 该控制方法应用于服务器。 具体流程如 图 1所示, 包括以下步骤: [0031] The first embodiment of the present application relates to a control method, which is applied to a server. The specific process is shown in Figure 1, and includes the following steps:
[0032] 步骤 101, 获取多个机器人的位置信息。 [0032] Step 101: Acquire position information of multiple robots.
[0033] 具体的说, 本实施例的应用场景示意图如图 2所示, 在服务器控制范围内的多 个机器人与服务器是实时进行通信连接的, 因此服务器可以实时获取多个机器 人的位置信息, 所有机器人的位置信息可以在服务器中实现实时更新, 并且服 务器也可以向多个机器人中发送指令, 使机器人根据指令进行相应的操作。 本 实施例中并不限定机器人的具体数量, 只要是在服务器中进行过注册的机器人 都是在本申请的保护范围内。 [0033] Specifically, a schematic diagram of an application scenario of this embodiment is shown in FIG. 2, multiple robots within the control range of the server communicate with the server in real time, so the server can obtain position information of multiple robots in real time, The position information of all robots can be updated in real time in the server, and the server can also send instructions to multiple robots, so that the robots can perform corresponding operations according to the instructions. The specific number of robots is not limited in this embodiment, as long as the robots are registered in the server, they are all within the protection scope of this application.
[0034] 步骤 102, 获取用户的控制设备发送的控制信息。 [0034] Step 102: Obtain control information sent by a user's control device.
[0035] 具体的说, 在本实施例中, 可以在控制设备上设置两个按键即第一按键和第二 按键, 当用户发现可能存在安全威胁的机器人, 而机器人距离用户比较近, 用 户来不及将控制设备指向可能存在安全威胁的机器人时, 用户通过触发第一按 键可以使服务器获取到控制设备发送的控制信息, 此时的控制信息包括用户的 位置信息和用户的身份信息。 而当存在安全威胁的机器人距离用户较远时, 用 户可以将控制设备指向存在安全威胁的机器人, 并通过触发第二按键也可使服 务器获取到控制设备发送的控制信息, 此时的控制信息是包括用户的位置信息 和控制设备指向的绝对方向。 不论是哪一种按键触发方式, 服务器从控制设备 所获取的用户的位置信息是包括用户的经纬度信息和海拔高度信息, 用户的身 份信息是提前保存在控制设备内的。 [0035] Specifically, in this embodiment, two buttons, a first button and a second button, may be provided on the control device Button, when the user finds a robot that may have a security threat, and the robot is relatively close to the user, the user has no time to point the control device to the robot that may have a security threat, the user can trigger the first button to enable the server to obtain the control information sent by the control device At this time, the control information includes the user's location information and the user's identity information. When the robot with a security threat is far from the user, the user can point the control device to the robot with a security threat, and the server can also obtain the control information sent by the control device by triggering the second button. The control information at this time is Including the user's location information and the absolute direction the control device is pointing. Regardless of the key triggering method, the user's location information acquired by the server from the control device includes the user's latitude and longitude information and altitude information, and the user's identity information is stored in the control device in advance.
[0036] 其中, 在本实施例中, 服务器可以采用无线传输的方式获取控制设备发送的控 制信息, 例如, 通过 WIFI通信进行信号传输或者通过蓝牙通信进行信号传输, 本实施例中并不限定进行无线传输的具体技术, 只要服务器能够获取到用户的 控制设备发送的控制信息, 都是在本申请的保护范围内的。 [0036] In this embodiment, the server may use wireless transmission to obtain control information sent by the control device, for example, signal transmission through WIFI communication or signal transmission through Bluetooth communication, which is not limited in this embodiment. The specific technology of wireless transmission is within the protection scope of this application as long as the server can obtain the control information sent by the user's control device.
[0037] 步骤 103 , 根据多个机器人的位置信息和控制信息, 确定出具有安全威胁的机 器人。 [0037] Step 103: According to the position information and control information of multiple robots, determine a robot with a security threat.
[0038] 具体的说, 在本实施例中, 由于服务器所获取的控制信息的具体内容不同, 根 据多个机器人的位置信息和控制信息, 确定出具有安全威胁的机器人的具体实 现方式也会有所区别。 并且用户的位置信息是包括用户的经纬度信息和海拔高 度信息, 因为处理器中预存有机器人以及用户运动范围内的三维地图信息, 因 此根据用户的位置信息可以准确的确定出用户在三维地图中的坐标位置。 [0038] Specifically, in this embodiment, since the specific content of the control information acquired by the server is different, according to the position information and control information of multiple robots, a specific implementation manner of determining a robot with a security threat will also have The difference. And the user's location information includes the user's latitude and longitude information and altitude information, because the processor pre-stores the robot and the user's three-dimensional map information within the user's range of motion, so the user's position in the three-dimensional map can be accurately determined according to the user's location information Coordinate position.
[0039] 在一个实施例中, 当服务器获取到的控制信息包括用户的位置信息时, 此时服 务器会根据用户的位置信息即用户在三维地图中的坐标位置, 以及多个机器人 的位置信息, 从多个机器人中筛选出在预设范围内距离用户最近的机器人, 并 将筛选出的机器人作为具有安全威胁的机器人。 [0039] In one embodiment, when the control information acquired by the server includes the user's location information, the server will then according to the user's location information, that is, the user's coordinate position in the three-dimensional map, and the location information of multiple robots, The robots closest to the user within a preset range are selected from multiple robots, and the selected robots are regarded as robots with security threats.
[0040] 例如, 当服务器获取到的控制信息包括用户的位置信息和用户的身份信息时, 此时服务器会首先根据用户的身份信息从历史交互数据库中进行查找, 确定出 与用户存在历史交互信息的机器人。 例如, 可以确定在预设时间内存在历史交 互信息的机器人, 例如, 设定预设时间为 5秒, 则可以确定出在 5秒内与用户存 在历史交互信息的机器人。 再根据用户的位置信息即用户在三维地图中的坐标 位置, 从存在历史交互信息的机器人中筛选出距离最近且存在历史交互信息的 机器人, 判断距离最近且存在历史交互信息的机器人, 与用户之间的距离是否 在预设范围内, 如果是在预设范围内的话, 则将距离最近且存在历史交互信息 的机器人作为具有安全威胁的机器人。 例如, 设定预设范围为 5米, 假设筛选出 的机器人与用户之间的距离在 5米以内, 就将筛选出的机器人作为具有安全威胁 的机器人。 而当距离最近且存在历史交互信息的机器人与用户之间的距离不在 预设范围内, 例如, 距离最近且存在历史交互信息的机器人与用户之间的距离 在 5米以外, 此时会根据用户的位置信息即用户在三维地图中的坐标位置, 以及 多个机器人的位置信息, 直接从多个机器人中筛选出在预设范围内距离用户最 近的机器人, 并将筛选出的机器人作为具有安全威胁的机器人。 [0040] For example, when the control information acquired by the server includes the user's location information and the user's identity information, the server will first search the historical interaction database according to the user's identity information to determine the existence of historical interaction information with the user Robot. For example, it can be determined that the robot has historical interaction information within a preset time. For example, if the preset time is set to 5 seconds, then it can be determined that the robot is stored with the user within 5 seconds. Robot with interactive information in history. Then, according to the user's position information, that is, the user's coordinate position in the three-dimensional map, the robots with the closest historical interaction information are selected from the robots with historical interaction information. Whether the distance between them is within a preset range, and if it is within a preset range, the robot with the closest distance and historical interaction information is regarded as a robot with security threats. For example, the preset range is set to 5 meters, and assuming that the distance between the selected robot and the user is within 5 meters, the selected robot is regarded as a robot with security threats. However, when the distance between the robot with the closest distance and historical interaction information and the user is not within the preset range, for example, the distance between the robot with the closest distance and historical interaction information and the user is more than 5 meters, according to the user The position information of the user is the coordinate position of the user in the three-dimensional map, and the position information of multiple robots. The robot closest to the user within the preset range is directly selected from the multiple robots, and the selected robot is regarded as a security threat. Robot.
[0041] 需要说明的是, 在本实施例中, 服务器还会根据用户的身份信息, 监控用户的 操作行为, 若发现用户存在恶意操作机器人的行为时, 会将用户的身份信息加 入黑名单, 例如, 发现某用户在预设时间内停止机器人的次数超过预设次数, 并且服务器通过检查用户所指定的机器人的信息, 确定机器人运行状态正常的 情况下, 会将该用户的身份信息加入黑名单, 当该用户的控制设备再次向服务 器发送信息时, 服务器会对该用户的终端设备所发送的信息进行屏蔽。 [0041] It should be noted that, in this embodiment, the server will also monitor the user's operation behavior based on the user's identity information, and if the user is found to maliciously manipulate the robot, the user's identity information will be added to the blacklist, For example, if it is found that a user stops the robot more than the preset number of times within a preset time, and the server checks the information of the robot specified by the user to determine that the robot is operating normally, it will add the user's identity information to the blacklist When the user's control device sends information to the server again, the server blocks the information sent by the user's terminal device.
[0042] 在另一个实施例中, 当服务器获取到的控制信息包括用户的位置信息和控制设 备指向的绝对方向。 此时服务器会在三维地图中根据用户的位置信息和控制设 备指向的绝对方向确定出存在威胁的区域, 并根据用户的位置信息确定出在存 在威胁的区域内, 距离用户最近的机器人, 将距离最近的机器人作为具有安全 威胁的机器人。 如图 3所示, 为存在威胁的区域确定方式示意图, 其中, 在三维 地图已经构建的坐标系中, 确定出用户在三维地图坐标系中的位置, 图中 A点为 用户的位置, 实线为控制设备指向的绝对方向, 则以用户的位置 A点为顶点, 控 制设备指向的绝对方向为轴线, 预设角度 a为顶角构建锥形空间, a的具体数值可 以根据精度的要求由用户自行进行确定, 例如, 可以为 5度或 10度, 并将最终所 确定出的锥形空间作为存在威胁的区域。 [0042] In another embodiment, the control information acquired by the server includes the location information of the user and the absolute direction pointed by the control device. At this time, the server will determine the threat zone in the three-dimensional map according to the user's position information and the absolute direction pointed by the control device, and determine the robot closest to the user in the threat zone according to the user's position information. The most recent robot is a robot with security threats. As shown in FIG. 3, it is a schematic diagram of a method for determining a threatened area. In the coordinate system where the three-dimensional map has been constructed, the user's position in the three-dimensional map coordinate system is determined. Point A in the figure is the user's position. The solid line To control the absolute direction pointed by the device, the user's position A is taken as the apex, the absolute direction pointed by the control device is the axis, and the preset angle a is the apex angle to construct a tapered space. The specific value of a can be determined by the user according to the accuracy requirements Make your own determination, for example, it can be 5 degrees or 10 degrees, and use the conical space finally determined as a threatened area.
[0043] 需要说明的是, 在本实施例中, 在将距离最近的机器人作为具有安全威胁的机 器人之后, 如果根据预存的三维地图信息, 确定具有安全威胁的机器人不在用 户的视觉范围内, 则重新执行控制方法。 [0043] It should be noted that in this embodiment, the robot with the shortest distance is regarded as a machine with security threats After the robot, if it is determined that the robot with a security threat is not within the user's visual range based on the pre-stored three-dimensional map information, the control method is re-executed.
[0044] 例如, 最终确定出的具有安全威胁的机器人为 B, 但根据三维地图信息确定在 用户与机器人 B之间存在一堵墙, 此时机器人 B是不在用户的视觉范围内的, 所 以此时的判定结果是不满足实际需要的, 在这种情况下会重新执行控制方法以 获得满足要求的具有安全威胁的机器人。 [0044] For example, the finally determined robot with a security threat is B, but it is determined according to the three-dimensional map information that there is a wall between the user and the robot B. At this time, the robot B is not within the user's visual range, so this The judgment result at the time does not meet the actual needs. In this case, the control method will be re-executed to obtain a robot with safety threats that meets the requirements.
[0045] 步骤 104, 控制具有安全威胁的机器人停止。 [0045] Step 104: Control the robot with a security threat to stop.
[0046] 具体的说, 在本实施例中, 在确定出具有安全威胁的机器人之后, 服务器会向 具有安全威胁的机器人发送暂停指令, 控制具有安全威胁的机器人根据暂停指 令在预设时间内停止。 通过控制具有安全威胁的机器人停止, 可以有效的规避 机器人对用户可能造成的安全威胁。 [0046] Specifically, in this embodiment, after a robot with a security threat is determined, the server sends a suspension instruction to the robot with a security threat, and controls the robot with a security threat to stop within a preset time according to the suspension instruction . By controlling the stopping of robots with security threats, it is possible to effectively avoid the security threats that robots may pose to users.
[0047] 其中, 本实施例中的预设时间可以根据用户的需求进行设定, 例如, 可以设定 为 1秒或 2秒, 本实施例中并不限定预设时间的具体数值。 [0047] Wherein, the preset time in this embodiment can be set according to user needs, for example, can be set to 1 second or 2 seconds, in this embodiment does not limit the specific value of the preset time.
[0048] 与现有技术相比, 本实施例提供的控制方法, 通过获取多个机器人的位置信息 以及控制设备发送的控制信息, 能够准确的确定出多个机器人中具有安全威胁 的机器人, 通过控制具有安全威胁的机器人停止, 可以有效规避具有安全威胁 的机器人对用户造成的伤害, 从而提高了机器人应用的安全性和可靠性。 [0048] Compared with the prior art, the control method provided in this embodiment can accurately determine the robots with security threats among the multiple robots by acquiring the position information of multiple robots and the control information sent by the control device, by Controlling the stop of robots with security threats can effectively avoid the harm caused by robots with security threats to users, thereby improving the safety and reliability of robot applications.
[0049] 本申请的第二实施例涉及一种控制方法。 本实施例在第一实施例的基础上做了 进一步改进, 具体改进之处为: 在获取多个机器人的位置信息之后增加了对指 定的机器人进行标记操作, 并将被标记的机器人进行排除。 本实施例中的控制 方法的流程如图 4所示。 具体的说, 在本实施例中, 包括步骤 201至步骤 206 , 其 中步骤 201与第一实施例中的步骤 101大致相同, 步骤 204至 206与第一实施例中 的步骤 102至 104大致相同, 此处不再赘述, 下面主要介绍不同之处, 未在本实 施例中详尽描述的技术细节, 可参见第一实施例所提供的控制方法, 此处不再 赘述。 [0049] The second embodiment of the present application relates to a control method. This embodiment is further improved on the basis of the first embodiment, and the specific improvement is that: after acquiring position information of a plurality of robots, a marking operation is added to the designated robot, and the marked robot is excluded. The flow of the control method in this embodiment is shown in FIG. 4. Specifically, in this embodiment, steps 201 to 206 are included, where step 201 is substantially the same as step 101 in the first embodiment, and steps 204 to 206 are substantially the same as steps 102 to 104 in the first embodiment. The details will not be repeated here, and the differences are mainly introduced below. For technical details not described in detail in this embodiment, reference may be made to the control method provided in the first embodiment, and details are not described here.
[0050] 在步骤 201之后, 执行步骤 202。 [0050] After step 201, step 202 is executed.
[0051] 步骤 202, 对指定的机器人进行标记操作。 [0051] Step 202: Perform a marking operation on the designated robot.
[0052] 具体的说, 在本实施例中, 服务器可以对用户指定的机器人进行标记操作, 实 际应用中, 用户将认为比较安全的机器人的身份代码通过指令发送给服务器, 服务器接收到指令后将指令所指示的机器人进行编号。 [0052] Specifically, in this embodiment, the server may perform a marking operation on the robot specified by the user. In an international application, the user sends the identity code of a robot that is considered safer to the server through an instruction, and the server numbers the robot indicated by the instruction after receiving the instruction.
[0053] 例如, 服务器接收到用户指定的身份代码为 001a的机器人和 006c的机器人, 则 将身份代码为 001a的机器人编码为 1, 将身份代码为 006c的机器人编码为 2。 本实 施例中是以按照数字由小到大的顺序进行编码为例进行说明, 当然标记方式还 可以采用按照字母由小到大的顺序进行编码。 本实施例并不限定具体的标记方 式。 [0053] For example, if the server receives the robot specified by the user with the identity code 001a and the robot 006c, it encodes the robot with the identity code 001a as 1, and the robot with the identity code 006c as 2. In this embodiment, the coding is performed in the order of the numbers from small to large as an example. Of course, the labeling method may also be encoded in the order of the letters from small to large. This embodiment does not limit the specific marking method.
[0054] 步骤 203, 将被标记的机器人进行排除。 [0054] Step 203: Exclude the marked robot.
[0055] 具体的说, 在本实施例中, 服务器将被标记的机器人进行排除, 即将多个机器 人中将用户认为比较安全的机器人不进行安全威胁的判定, 具体实现方式可以 是将多个机器人中进行编码的机器人按照编码顺序由小到大的顺序进行排除。 从而减少了服务器进行安全威胁判定的机器人数量, 提高了查找具有安全威胁 的机器人的速度。 [0055] Specifically, in this embodiment, the server excludes the marked robot, that is, among the multiple robots, the robot that the user considers to be safe is not subject to a security threat determination, and the specific implementation manner may be multiple robots. Robots coded in are excluded from the coding order from small to large. This reduces the number of robots that the server uses to determine security threats, and increases the speed of finding robots with security threats.
[0056] 与现有技术相比, 本实施例提供的控制方法, 通过获取多个机器人的位置信息 以及控制设备发送的控制信息, 能够准确的确定出多个机器人中具有安全威胁 的机器人, 通过控制具有安全威胁的机器人停止, 可以有效规避具有安全威胁 的机器人对用户造成的伤害, 从而提高了机器人应用的安全性和可靠性。 通过 将用户认为比较安全的机器人进行标记并进行排除, 进一步提高了查找具有安 全威胁的机器人的速度。 [0056] Compared with the prior art, the control method provided in this embodiment can accurately determine the robots with security threats among the multiple robots by acquiring the position information of multiple robots and the control information sent by the control device, by Controlling the stop of robots with security threats can effectively avoid the harm caused by robots with security threats to users, thereby improving the safety and reliability of robot applications. By marking and excluding robots that users believe are safer, the speed of finding robots with security threats is further improved.
[0057] 上面各种方法的步骤划分, 只是为了描述清楚, 实现时可以合并为一个步骤或 者对某些步骤进行拆分, 分解为多个步骤, 只要包括相同的逻辑关系, 都在本 专利的保护范围内; 对算法中或者流程中添加无关紧要的修改或者引入无关紧 要的设计, 但不改变其算法和流程的核心设计都在该专利的保护范围内。 [0057] The step division of the above various methods is just for clarity of description, and can be combined into one step or split into some steps during implementation, and decomposed into multiple steps, as long as they include the same logical relationship, all of them are in this patent. Within the scope of protection; adding insignificant modifications to the algorithm or process or introducing insignificant designs, but not changing the core design of its algorithm and process are within the scope of protection of the patent.
[0058] 本申请第三实施例涉及一种控制装置, 具体结构如图 5所示。 [0058] The third embodiment of the present application relates to a control device, and the specific structure is shown in FIG. 5.
[0059] 如图 5所示, 控制装置包括: 第一获取模块 301、 第二获取模块 302、 确定模块 3 03和控制模块 304。 As shown in FIG. 5, the control device includes: a first acquisition module 301, a second acquisition module 302, a determination module 303, and a control module 304.
[0060] 其中, 第一获取模块 301, 用于获取多个机器人的位置信息。 [0060] Wherein, the first obtaining module 301 is used to obtain position information of multiple robots.
[0061] 第二获取模块 302, 用于获取用户的控制设备发送的控制信息。 [0062] 确定模块 303 , 用于根据多个机器人的位置信息和控制信息, 确定出具有安全 威胁的机器人。 [0061] The second obtaining module 302 is configured to obtain control information sent by the user's control device. [0062] The determining module 303 is configured to determine a robot with a security threat based on the position information and control information of multiple robots.
[0063] 控制模块 304, 用于控制具有安全威胁的机器人停止。 [0063] The control module 304 is used to control the robot with a security threat to stop.
[0064] 不难发现, 本实施例为与第一实施例相对应的装置实施例, 本实施例可与第一 实施例互相配合实施。 第一实施例中提到的相关技术细节在本实施例中依然有 效, 为了减少重复, 这里不再赘述。 相应地, 本实施例中提到的相关技术细节 也可应用在第一实施例中。 [0064] It is not difficult to find that this embodiment is a device embodiment corresponding to the first embodiment, and this embodiment can be implemented in cooperation with the first embodiment. The relevant technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the relevant technical details mentioned in this embodiment can also be applied in the first embodiment.
[0065] 本申请第四实施例涉及一种控制装置。 该实施例与第三实施例大致相同, 具体 结构如图 6所示。 其中, 主要改进之处在于: 第四实施例在第三实施例结构的基 础上增加了标记模块 305和排除模块 306。 [0065] The fourth embodiment of the present application relates to a control device. This embodiment is substantially the same as the third embodiment, and the specific structure is shown in FIG. 6. Among them, the main improvement is that: the fourth embodiment adds a marking module 305 and an exclusion module 306 on the basis of the structure of the third embodiment.
[0066] 其中, 第一获取模块 301, 用于获取多个机器人的位置信息。 [0066] Wherein, the first acquisition module 301 is used to acquire position information of multiple robots.
[0067] 第二获取模块 302, 用于获取用户的控制设备发送的控制信息。 [0067] The second acquiring module 302 is configured to acquire control information sent by the user's control device.
[0068] 确定模块 303 , 用于根据多个机器人的位置信息和控制信息, 确定出具有安全 威胁的机器人。 [0068] The determination module 303 is used to determine a robot with a security threat based on the position information and control information of multiple robots.
[0069] 控制模块 304, 用于控制具有安全威胁的机器人停止。 [0069] The control module 304 is used to control the robot with a security threat to stop.
[0070] 标记模块 305, 用于对指定的机器人进行标记操作。 [0070] The marking module 305 is used to mark the designated robot.
[0071] 排除模块 306, 用于将被标记的机器人进行排除。 [0071] The exclusion module 306 is used to exclude the marked robot.
[0072] 不难发现, 本实施例为与第二实施例相对应的装置实施例, 本实施例可与第二 实施例互相配合实施。 第二实施例中提到的相关技术细节在本实施例中依然有 效, 为了减少重复, 这里不再赘述。 相应地, 本实施例中提到的相关技术细节 也可应用在第二实施例中。 [0072] It is not difficult to find that this embodiment is a device embodiment corresponding to the second embodiment, and this embodiment can be implemented in cooperation with the second embodiment. The relevant technical details mentioned in the second embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the relevant technical details mentioned in this embodiment can also be applied in the second embodiment.
[0073] 值得一提的是, 本实施例中所涉及到的各模块均为逻辑模块, 在实际应用中, 一个逻辑单元可以是一个物理单元, 也可以是一个物理单元的一部分, 还可以 以多个物理单元的组合实现。 此外, 为了突出本申请的创新部分, 本实施例中 并没有将与解决本申请所提出的技术问题关系不太密切的单元引入, 但这并不 表明本实施例中不存在其它的单元。 [0073] It is worth mentioning that the modules involved in this embodiment are all logical modules. In practical applications, a logical unit may be a physical unit or a part of a physical unit, or Combination of multiple physical units. In addition, in order to highlight the innovative part of this application, this embodiment does not introduce units that are not closely related to solving the technical problems proposed in this application, but this does not mean that there are no other units in this embodiment.
[0074] 本申请第五实施例涉及一种服务器, 如图 7所示, 包括至少一个处理器 501 ; 以 及, 与至少一个处理器 501通信连接的存储器 502; 其中, 存储器 502存储有可被 至少一个处理器 501执行的指令, 指令被至少一个处理器 501执行, 以使至少一 个处理器 501能够执行上述实施例中的控制方法。 [0074] A fifth embodiment of the present application relates to a server, as shown in FIG. 7, including at least one processor 501; and, a memory 502 in communication connection with at least one processor 501; wherein, the memory 502 stores Instructions executed by at least one processor 501, the instructions are executed by the at least one processor 501, so that the at least one processor 501 can execute the control method in the foregoing embodiment.
[0075] 本实施例中, 处理器 501以中央处理器 (Central Processing Unit, CPU) 为例, 存储器 502以可读写存储器 (Random Access Memory, RAM) 为例。 处理器 501 、 存储器 502可以通过总线或者其他方式连接, 图 7中以通过总线连接为例。 存 储器 502作为一种非易失性计算机可读存储介质, 可用于存储非易失性软件程序 、 非易失性计算机可执行程序以及模块, 如本申请实施例中实现控制方法的程 序就存储于存储器 502中。 处理器 501通过运行存储在存储器 502中的非易失性软 件程序、 指令以及模块, 从而执行设备的各种功能应用以及数据处理, 即实现 上述控制方法。 [0075] In this embodiment, the processor 501 takes a central processing unit (Central Processing Unit, CPU) as an example, and the memory 502 takes a readable and writable memory (Random Access Memory, RAM) as an example. The processor 501 and the memory 502 may be connected through a bus or in other ways. In FIG. 7, the connection through a bus is used as an example. The memory 502 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer executable programs, and modules. For example, the program for implementing the control method in the embodiment of the present application is stored Memory 502. The processor 501 executes various functional applications and data processing of the device by running non-volatile software programs, instructions, and modules stored in the memory 502, that is, implementing the above control method.
[0076] 存储器 502可以包括存储程序区和存储数据区, 其中, 存储程序区可存储操作 系统、 至少一个功能所需要的应用程序; 存储数据区可存储选项列表等。 此外 , 存储器可以包括高速随机存取存储器, 还可以包括非易失性存储器, 例如至 少一个磁盘存储器件、 闪存器件、 或其他非易失性固态存储器件。 在一些实施 例中, 存储器 502可选包括相对于处理器 501远程设置的存储器, 这些远程存储 器可以通过网络连接至外接设备。 上述网络的实例包括但不限于互联网、 企业 内部网、 局域网、 移动通信网及其组合。 [0076] The memory 502 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required by at least one function; the storage data area may store a list of options, and the like. In addition, the memory may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some embodiments, the memory 502 may optionally include a memory remotely set relative to the processor 501, and these remote memories may be connected to an external device through a network. Examples of the above network include but are not limited to the Internet, intranet, local area network, mobile communication network, and combinations thereof.
[0077] 一个或者多个程序模块存储在存储器 502中, 当被一个或者多个处理器 501执行 时, 执行上述任意方法实施例中的控制方法。 [0077] One or more program modules are stored in the memory 502, and when executed by one or more processors 501, execute the control method in any of the above method embodiments.
[0078] 上述产品可执行本申请实施例所提供的方法, 具备执行方法相应的功能模块和 有益效果, 未在本实施例中详尽描述的技术细节, 可参见本申请实施例所提供 的方法。 [0078] The above products can perform the method provided in the embodiments of the present application, and have the corresponding functional modules and beneficial effects of the execution method. For technical details not described in detail in this embodiment, please refer to the methods provided in the embodiments of the present application.
[0079] 本申请的第六实施例涉及一种计算机可读存储介质, 该计算机可读存储介质中 存储有计算机程序, 该计算机程序被处理器执行时能够实现本申请任意方法实 施例中涉及的控制方法。 [0079] The sixth embodiment of the present application relates to a computer readable storage medium, the computer readable storage medium stores a computer program, the computer program when executed by the processor can implement any method embodiment of the present application involved Control Method.
[0080] 本领域技术人员可以理解, 实现上述实施例方法中的全部或部分步骤是可以通 过程序来指令相关的硬件来完成, 该程序存储在一个存储介质中, 包括若干指 令用以使得一个设备 (可以是单片机, 芯片等) 或处理器 (processor) 执行本申 请各个实施例所述方法的全部或部分步骤。 而前述的存储介质包括: U盘、 移动 硬盘、 只读存储器 (ROM, Read-Only [0080] Those skilled in the art can understand that all or part of the steps in the method of the above embodiments can be completed by instructing relevant hardware through a program, which is stored in a storage medium and includes several instructions to make a device (Can be a microcontroller, chip, etc.) or a processor (processor) to execute this application All or part of the steps of the method described in each embodiment. The aforementioned storage media include: U disk, removable hard disk, read-only memory (ROM, Read-Only
Memory) 、 随机存取存储器 (RAM, Random Access Memory) 、 磁碟或者光盘 等各种可以存储程序代码的介质。 Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or CD-ROM and other media that can store program code.
[0081] 本领域的普通技术人员可以理解, 上述各实施例是实现本申请的具体实施例, 而在实际应用中, 可以在形式上和细节上对其作各种改变, 而不偏离本申请的 精神和范围。 [0081] Persons of ordinary skill in the art may understand that the above embodiments are specific embodiments for implementing the present application, and in practical applications, various changes may be made in form and details without departing from the present application Spirit and scope.

Claims

权利要求书 Claims
[权利要求 1] 一种控制方法, 其中, 应用于服务器, 包括: [Claim 1] A control method, wherein the application to the server includes:
获取多个机器人的位置信息; Obtain the position information of multiple robots;
获取用户的控制设备发送的控制信息; Obtain the control information sent by the user's control device;
根据所述多个机器人的位置信息和所述控制信息, 确定出具有安全威 胁的机器人; According to the position information of the plurality of robots and the control information, determine a robot with a security threat;
控制所述具有安全威胁的机器人停止。 Control the robot with a security threat to stop.
[权利要求 2] 如权利要求 1所述的控制方法, 其中, 所述控制信息包括所述用户的 位置信息。 [Claim 2] The control method according to claim 1, wherein the control information includes location information of the user.
[权利要求 3] 如权利要求 2所述的控制方法, 其中, 所述根据所述多个机器人的位 置信息和所述控制信息, 确定出具有安全隐患的机器人, 具体包括: 根据所述用户的位置信息和所述多个机器人的位置信息, 从所述多个 机器人中筛选出在预设范围内且距离所述用户最近的机器人, 并将筛 选出的机器人作为所述具有安全威胁的机器人。 [Claim 3] The control method according to claim 2, wherein the determining a robot with a safety hazard based on the position information of the plurality of robots and the control information specifically includes: according to the user’s The position information and the position information of the plurality of robots are selected from the plurality of robots within a preset range and closest to the user, and the selected robot is regarded as the robot with security threats.
[权利要求 4] 如权利要求 2所述的控制方法, 其中, 所述控制信息还包括所述用户 的身份信息。 [Claim 4] The control method according to claim 2, wherein the control information further includes identity information of the user.
[权利要求 5] 如权利要求 4所述的控制方法, 其中, 所述根据所述多个机器人的位 置信息和所述控制信息, 确定出具有安全隐患的机器人, 具体包括: 根据所述用户的身份信息从历史交互数据库中进行查找, 确定出与所 述用户存在历史交互信息的机器人; [Claim 5] The control method according to claim 4, wherein the determining a robot with a safety hazard based on the position information of the plurality of robots and the control information specifically includes: according to the user’s The identity information is searched from the historical interaction database to determine the robot that has historical interaction information with the user;
根据所述用户的位置信息从所述存在历史交互信息的机器人中筛选出 距离最近且存在历史交互信息的机器人; According to the user's location information, select the robot with the closest historical interaction information from the robots with historical interaction information;
判断所述距离最近且存在历史交互信息的机器人, 与所述用户之间的 距离是否在所述预设范围内, 若是, 则将所述距离最近且存在历史交 互信息的机器人作为所述具有安全威胁的机器人, 否则, 根据所述用户的位置信息和所述多个机器人的位置信息, 直接 从所述多个机器人中筛选出在所述预设范围内且距离所述用户最近的 机器人, 并将筛选出的机器人作为所述具有安全威胁的机器人。 Judging whether the robot with the shortest distance and having historical interaction information is within the preset range, and if so, then the robot with the shortest distance and having historical interaction information is regarded as the safe Threatened robots, otherwise, according to the location information of the user and the location information of the multiple robots, directly select the robots within the preset range and closest to the user from the multiple robots, and Use the selected robot as the robot with security threats.
[权利要求 6] 如权利要求 1所述的控制方法, 其中, 所述控制信息包括: 所述用户 的位置信息和所述控制设备指向的绝对方向。 [Claim 6] The control method according to claim 1, wherein the control information includes: position information of the user and an absolute direction pointed by the control device.
[权利要求 7] 如权利要求 6所述的控制方法, 其中, 所述根据所述多个机器人的位 置信息和所述控制信息, 确定出具有安全隐患的机器人, 具体包括: 根据所述用户的位置信息和所述控制设备指向的绝对方向确定出存在 威胁的区域; [Claim 7] The control method according to claim 6, wherein the determining a robot with a potential safety hazard based on the position information of the plurality of robots and the control information specifically includes: according to the user’s The location information and the absolute direction pointed by the control device determine the threatened area;
根据所述用户的位置信息确定出在所述存在威胁的区域内, 距离所述 用户距离最近的机器人; Determine the robot that is closest to the user in the threatened area according to the user's location information;
将所述距离最近的机器人作为所述具有安全威胁的机器人。 The robot with the closest distance is regarded as the robot with security threats.
[权利要求 8] 如权利要求 7所述的控制方法, 其中, 所述根据所述用户的位置信息 和所述控制设备指向的绝对方向确定出存在威胁的区域, 具体包括: 以所述用户的位置为顶点, 所述控制设备指向的绝对方向为轴线, 预 设角度为顶角构建锥形空间; [Claim 8] The control method according to claim 7, wherein the determining a threatened area according to the user’s position information and the absolute direction pointed by the control device specifically includes: using the user’s The position is a vertex, the absolute direction pointed by the control device is an axis, and the preset angle is a vertex angle to construct a tapered space;
将所述锥形空间作为所述存在威胁的区域。 Use the tapered space as the threatened area.
[权利要求 9] 如权利要求 7或 8所述的控制方法, 其中, 所述将所述距离最近的机器 人作为具有安全威胁的机器人之后, 还包括: [Claim 9] The control method according to claim 7 or 8, wherein after the robot with the closest distance is regarded as a robot with a security threat, the method further includes:
若根据预存的三维地图信息, 确定所述具有安全威胁的机器人不在用 户的视觉范围内, 则重新执行所述控制方法。 If it is determined that the robot with a security threat is not within the user's visual range based on the pre-stored three-dimensional map information, the control method is re-executed.
[权利要求 10] 如权利要求 2或 6所述的控制方法, 其中, 所述用户的位置信息还包括 [Claim 10] The control method according to claim 2 or 6, wherein the location information of the user further includes
: 所述用户的经纬度信息和海拔高度信息。 : Longitude and latitude information and altitude information of the user.
[权利要求 11] 如权利要求 1至 10中任一项所述的控制方法, 其中, 所述获取多个机 器人的位置信息之后, 还包括: [Claim 11] The control method according to any one of claims 1 to 10, wherein, after acquiring position information of a plurality of robots, the method further includes:
对指定的机器人进行标记操作; Mark the designated robot;
将被标记的机器人进行排除, 其中, 所述被标记的机器人为安全性符 合预设要求的机器人。 The marked robot is excluded, wherein the marked robot is a robot whose safety meets the preset requirements.
[权利要求 12] 如权利要求 1至 11中任一项所述的控制方法, 其中, 所述控制所述具 有安全威胁的机器人停止, 具体包括: [Claim 12] The control method according to any one of claims 1 to 11, wherein the controlling the stop of the robot with a security threat specifically includes:
向所述具有安全威胁的机器人发送暂停指令; 控制所述具有安全威胁的机器人根据所述暂停指令在在预设时间内停 止。 Send a suspension instruction to the robot with a security threat; Controlling the robot with a security threat to stop within a preset time according to the suspension instruction.
[权利要求 13] 一种控制装置, 其中, 包括: 第一获取模块、 第二获取模块、 确定模 块和控制模块, [Claim 13] A control device, comprising: a first acquisition module, a second acquisition module, a determination module and a control module,
所述第一获取模块, 用于获取多个机器人的位置信息; The first obtaining module is used to obtain position information of multiple robots;
所述第二获取模块, 用于获取用户的控制设备发送的控制信息; 所述确定模块, 用于根据所述多个机器人的位置信息和所述控制信息 , 确定出具有安全威胁的机器人; The second obtaining module is used to obtain control information sent by a user's control device; the determining module is used to determine a robot with a security threat based on the position information of the multiple robots and the control information;
所述控制模块, 用于控制所述具有安全威胁的机器人停止。 The control module is configured to control the robot with a security threat to stop.
[权利要求 14] 一种服务器, 其中, 包括 [Claim 14] A server, which includes
至少一个处理器; 以及, 与所述至少一个处理器通信连接的存储器; 其中, 所述存储器存储有可被所述至少一个处理器执行的指令, 所述指令被 所述至少一个处理器执行, 以使所述至少一个处理器能够执行如权利 要求 1至 12任一项所述的控制方法。 At least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, In order to enable the at least one processor to execute the control method according to any one of claims 1 to 12.
[权利要求 15] 一种计算机可读存储介质, 存储有计算机程序, 其中, 所述计算机程 序被处理器执行时实现权利要求 1至 12任一项所述的控制方法。 [Claim 15] A computer-readable storage medium storing a computer program, wherein when the computer program is executed by a processor, the control method according to any one of claims 1 to 12 is realized.
PCT/CN2019/117623 2018-11-29 2019-11-12 Control method, related apparatus, and storage medium WO2020108293A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811442609.9A CN109352657B (en) 2018-11-29 2018-11-29 Control method, related device and storage medium
CN201811442609.9 2018-11-29

Publications (1)

Publication Number Publication Date
WO2020108293A1 true WO2020108293A1 (en) 2020-06-04

Family

ID=65343271

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117623 WO2020108293A1 (en) 2018-11-29 2019-11-12 Control method, related apparatus, and storage medium

Country Status (2)

Country Link
CN (1) CN109352657B (en)
WO (1) WO2020108293A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109352657B (en) * 2018-11-29 2020-11-17 深圳前海达闼云端智能科技有限公司 Control method, related device and storage medium
TWI762006B (en) * 2020-10-27 2022-04-21 達明機器人股份有限公司 Control system and method for a safety state of a robot

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102099614A (en) * 2008-06-26 2011-06-15 Abb股份公司 System for safety protection of human beings against hazardous incidents with robots
CN103433925A (en) * 2013-07-31 2013-12-11 北京配天大富精密机械有限公司 Method for returning robot to starting point, robot running method, robot and robot control device
KR101489298B1 (en) * 2013-11-08 2015-02-04 충북대학교 산학협력단 Force feedback system and method for remote control of mobile robot
CN105751216A (en) * 2016-04-14 2016-07-13 中南大学 Method for determining security and feasibility of instruction of mobile robot
CN106182008A (en) * 2016-08-12 2016-12-07 上海新时达电气股份有限公司 The control system of multirobot and method
CN107219766A (en) * 2016-03-21 2017-09-29 阿里巴巴集团控股有限公司 The control method and device of intelligent home device
CN107820607A (en) * 2017-08-23 2018-03-20 深圳前海达闼云端智能科技有限公司 Method, apparatus, server and the terminal device of supervisory-controlled robot
CN108334071A (en) * 2017-12-26 2018-07-27 中国科学院自动化研究所 The method that multi-robot system collisionless reaches target location
US10071481B2 (en) * 2015-11-30 2018-09-11 Denso Wave Incorporated Safety system for industrial robots
CN109352657A (en) * 2018-11-29 2019-02-19 深圳前海达闼云端智能科技有限公司 Control method, related device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105459117B (en) * 2016-01-04 2017-05-03 杭州亚美利嘉科技有限公司 Method and device for controlling lots of robots to stop emergently
CN106656712A (en) * 2016-12-30 2017-05-10 深圳市优必选科技有限公司 Bus abnormality processing method and robot controller
CN107273944A (en) * 2017-05-16 2017-10-20 北京元视觉科技有限公司 Autonomous social smart machine, autonomous exchange method and storage medium
CN107168333A (en) * 2017-06-26 2017-09-15 上海与德通讯技术有限公司 The management method and server of a kind of robot
CN108153602B (en) * 2017-12-01 2021-04-06 深圳市今天国际智能机器人有限公司 Robot control method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102099614A (en) * 2008-06-26 2011-06-15 Abb股份公司 System for safety protection of human beings against hazardous incidents with robots
CN103433925A (en) * 2013-07-31 2013-12-11 北京配天大富精密机械有限公司 Method for returning robot to starting point, robot running method, robot and robot control device
KR101489298B1 (en) * 2013-11-08 2015-02-04 충북대학교 산학협력단 Force feedback system and method for remote control of mobile robot
US10071481B2 (en) * 2015-11-30 2018-09-11 Denso Wave Incorporated Safety system for industrial robots
CN107219766A (en) * 2016-03-21 2017-09-29 阿里巴巴集团控股有限公司 The control method and device of intelligent home device
CN105751216A (en) * 2016-04-14 2016-07-13 中南大学 Method for determining security and feasibility of instruction of mobile robot
CN106182008A (en) * 2016-08-12 2016-12-07 上海新时达电气股份有限公司 The control system of multirobot and method
CN107820607A (en) * 2017-08-23 2018-03-20 深圳前海达闼云端智能科技有限公司 Method, apparatus, server and the terminal device of supervisory-controlled robot
CN108334071A (en) * 2017-12-26 2018-07-27 中国科学院自动化研究所 The method that multi-robot system collisionless reaches target location
CN109352657A (en) * 2018-11-29 2019-02-19 深圳前海达闼云端智能科技有限公司 Control method, related device and storage medium

Also Published As

Publication number Publication date
CN109352657A (en) 2019-02-19
CN109352657B (en) 2020-11-17

Similar Documents

Publication Publication Date Title
US20200349715A1 (en) Three-dimensional mapping system
EP2996360B1 (en) System for matching signatures on the basis of motion signature information
JP6685539B2 (en) Method, apparatus, and storage medium for controlling interaction with a virtual target
US11144340B2 (en) Placement of container workloads triggered by network traffic for efficient computing at network edge devices
US10701075B2 (en) Method and system for securely connecting to field devices in an industrial plant using Li-Fi and augmented reality
CN108211349B (en) Information processing method in game, electronic device and storage medium
US11039280B2 (en) Methods and systems for service transfer
WO2020108293A1 (en) Control method, related apparatus, and storage medium
US10136257B2 (en) Mobile device in-motion proximity guidance system
US11652768B2 (en) Systems, devices, and methods for determining a non-ephemeral message status in a communication system
CN109145601A (en) Malware detection system attack prevents
CN112416323A (en) Control code generation method, control code running device, control code equipment and storage medium
US10972462B2 (en) Electronic account recovery through account connections
CN108809654B (en) Dynamic verification code generation method, verification method and device based on dynamic verification code
EP3049925B1 (en) Systems and methods for session state transfer to a mobile device
CN114567506B (en) File uploading method and device, computer equipment and storage medium
US20210374240A1 (en) Systems, methods, and media for identifying and responding to malicious files having similar features
US11288347B2 (en) Login from an alternate electronic device
JP2022548090A (en) Target identifier acquisition method, service entity, application entity, electronic device and storage medium
US20140130162A1 (en) Phishing preventing system and operating method thereof
CN112751799A (en) Verification method and device based on picture verification code
CN113811925A (en) Dynamic partitioning of a security system
US20190121355A1 (en) Public deactivation of autonomous vehicles
CN113721621B (en) Vehicle control method, device, electronic equipment and storage medium
US11127273B1 (en) Acoustic event detection using coordinated data dissemination, retrieval, and fusion for a distributed array of sensors

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19888286

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19888286

Country of ref document: EP

Kind code of ref document: A1