CN106254519A - Picture starts its system of method for connecting network - Google Patents
Picture starts its system of method for connecting network Download PDFInfo
- Publication number
- CN106254519A CN106254519A CN201610801104.1A CN201610801104A CN106254519A CN 106254519 A CN106254519 A CN 106254519A CN 201610801104 A CN201610801104 A CN 201610801104A CN 106254519 A CN106254519 A CN 106254519A
- Authority
- CN
- China
- Prior art keywords
- data
- transmitted
- network
- network identity
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000005540 biological transmission Effects 0.000 claims abstract description 38
- 239000000284 extract Substances 0.000 claims abstract description 20
- 210000003128 head Anatomy 0.000 description 17
- 238000004364 calculation method Methods 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 2
- 150000001875 compounds Chemical class 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 229910052710 silicon Inorganic materials 0.000 description 2
- 239000010703 silicon Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00095—Systems or arrangements for the transmission of the picture signal
- H04N1/00103—Systems or arrangements for the transmission of the picture signal specially adapted for radio transmission, e.g. via satellites
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00095—Systems or arrangements for the transmission of the picture signal
- H04N1/00111—Systems or arrangements for the transmission of the picture signal specially adapted for optical transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/85—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression
- H04N19/89—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression involving methods or arrangements for detection of transmission errors at the decoder
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4363—Adapting the video stream to a specific local network, e.g. a Bluetooth® network
- H04N21/43637—Adapting the video stream to a specific local network, e.g. a Bluetooth® network involving a wireless protocol, e.g. Bluetooth, RF or wireless LAN [IEEE 802.11]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Astronomy & Astrophysics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Picture starts its system of method for connecting network and relates to data transmission technology.Picture starts method for connecting network, containing the network identity being associated with data to be transmitted in image, data input device obtains the image containing network identity, and therefrom extracts described network identity, then utilizes network identity to enter computer network and obtains described data to be transmitted.Data are carried out the most between devices, and the content of transmission is not data itself, but for obtaining the network identity of data to be transmitted.Two-dimensional bar starts the method for network data transmission, the first step, and the image that display is associated with data to be transmitted, containing the network identity being associated with data to be transmitted in image;Second step, data input device obtains the image of the network identity being associated with data to be transmitted;3rd step, data input device extracts network identity;4th step, data input device utilizes network identity to enter computer network and obtains described data to be transmitted.
Description
The filing date of the original application of this divisional application: on October 28th, 2010, Application No.: 2010105232844, name
It is referred to as: obtain, by image acquisition, data transfer mode and the system thereof that network connects.
Technical field
The present invention relates to electronic applications, be specifically related to data transmission technology.
Background technology
Along with the development of electronic technology, various intelligence tools are (such as mobile phone, MP3, MP4, panel computer, notebook computer, the palm
Computer, e-book etc.) become increasingly popular in the life of people.These equipment rooms generally require and carry out data transmission.
Although the transmission means of data is varied, still but transmission form is the most single at present.
Summary of the invention
It is an object of the invention to provide a kind of method that two-dimensional bar starts network data transmission, to solve above-mentioned skill
Art problem.
It is an object of the invention to provide a kind of picture and start method for connecting network, to solve above-mentioned technical problem.
The present invention also aims to provide a kind of two-dimensional bar to start the system that network connects, to solve above-mentioned technology
Problem.
The present invention can realize by the following technical solutions:
Two-dimensional bar starts the method for network data transmission, it is characterised in that:
The first step, the image that display is associated with data to be transmitted, containing the net being associated with data to be transmitted in image
Network identifies;
Second step, data input device obtains the image of the network identity being associated with data to be transmitted;
3rd step, data input device extracts network identity;
4th step, data input device utilizes network identity to enter computer network and obtains described data to be transmitted.
Data input device is directly entered computer network and obtains data to be transmitted.
Other server can also be utilized to enter computer network acquisition data to be transmitted, then by taking by data input device
Data to be transmitted is sent to data input device by business device.
The content that data are transmitted the most between devices is not data itself, but is used for obtaining to be passed
The network identity of transmission of data.
Computer network is the Internet.
Or, computer network is LAN.
Or, computer network is system for cloud computing.
Data to be transmitted can be webpage, picture, software, sound, video, numeral, word etc., it is also possible to encrypts
Data.
Network identity can be to use the forms such as word, code, picture.
Network identity can be to have the network address of identification, logo, key word etc. to data to be transmitted.
Data input device is opened the network identity being associated with data to be transmitted voluntarily and is obtained data to be transmitted.
Data input device utilizes the network address extracted, logo, key word etc. to enter computer network and obtains number to be transmitted
According to.
Computer network can pass through the network identities such as network address, logo, key word and find data to be transmitted fast and accurately.
Network identity can also is that the operational order obtaining data to be transmitted.
Operational order includes that at least two, for the operational order sent to computer network, is referred to by least two operation
Order obtains data to be transmitted from computer network.
At least two operational order in described operational order sends to computer network according to precedence.At least two
Operational order disposably can send to computer network according to precedence, it is also possible to sends to computer network by several times.
Such as data to be transmitted is the text document in public mailbox.The operational order contained in network identity includes: the
One step, opens mailbox and enters window, second step, input username and password, the 3rd step, open file acquisition data to be transmitted.
Three operational orders can disposably be sent to computer network, by counting by data input device according to precedence
Calculation machine network responds one by one.
Data input device can also first to computer network send " first step, open mailbox enter window " operation refer to
Order, after machine network to be calculated opens mailbox entrance window, then sends " second step inputs username and password " to computer network
Operational order, after machine network to be calculated has inputted username and password, then to computer network send " the 3rd step, opens literary composition
Part obtain data to be transmitted " operational order, wait computer network response.
The acquisition of the data for having encrypted is referred to the acquisition mode of the text document in public mailbox, if operation
Instruction is containing for opening the password needed for the data encrypted.
Compound mode is as follows:
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is numeral.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is numeral.
Network identity can be macroscopic image, it is also possible to be invisible but can by data input device collection also
The image extracted.When network identity use invisible but can be gathered by data input device and extract image time, can be right
Data input device is configured, and improves the accuracy rate of data transmission by only gathering invisible image.Such as, data are defeated
Go out equipment and include visible light source and an infrared light supply, shown the image being associated with data to be transmitted by visible light source, pass through
Infrared light supply shows the network identity being associated with data to be transmitted.Data input device can be provided with one and have infrared ray identification
The photographic head of function is used for gathering network identity.
Image capture module includes a photographic head, and photographic head has automatic focusing function.It is associated with data to be transmitted
Containing check code in image.
Data input device analyzes whether contain correct check code in image acquired in image capture module, if
The check code obtained is incorrect, then control photographic head and automatically focus.
At least three group check codes on can arranging around network code.When at least three group check codes are correct, data are defeated
Enter equipment and think that the network identity contained in this image is correct.
Such as when the image containing network identity is polygon layout, it is respectively provided with check code in multiple corner portions.
When the check code of multiple corner portions is correct, data input device thinks that the network identity contained in this image is correct.Otherwise may be used
To reject the image of check code mistake.
The image being associated with data to be transmitted refers to possibly together with to the network identity being associated with data to be transmitted
The indication code shown, is the network identity being associated with data to be transmitted for which is distinguished.Data input device is by searching
Indication code, finds the network identity being associated with data to be transmitted being instructed to code instruction.
Or when containing multiple network identity simultaneously, in order to improve the accuracy extracting content, attached at network identity
Closely it is provided with the indication code for the network identity being associated with data to be transmitted is indicated.It is for which is distinguished and treats
The network identity that transmission data are associated.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification
Shape, such as two-dimensional bar.
Picture starts method for connecting network, first data output apparatus and shows the image being associated with data to be transmitted, its
It is characterised by: containing the network identity being associated with data to be transmitted in described image, data input device obtains containing network
The image of mark, and therefrom extract described network identity, then utilize network identity to enter described in computer network acquisition and treat
Transmission data.Described computer network can be a Internet, LAN, system for cloud computing.
Data to be transmitted can be webpage, picture, sound, video, numeral, word, software etc., it is also possible to encrypts
Data.
Network identity can be to have the network address of identification, logo, key word etc. to data to be transmitted.Network identity also may be used
To be the operational order obtaining data to be transmitted.Described operational order includes that at least two is for the behaviour sent to computer network
Instruct, from computer network, obtain data to be transmitted by least two operational order.In described operational order at least
Two operational orders send to computer network according to precedence.Network identity can use the shapes such as word, code, picture
Formula.
The indication code for network identity is indicated it is additionally provided with, when image contains multiple nets near network identity
During network mark, it is the network identity being associated with data to be transmitted for which is distinguished, in order to make data input device accurate
The network identity that is associated with data to be transmitted of extraction, and then get required data to be transmitted.Described network identity, institute
State indication code and may each be macroscopic image, it is also possible to be invisible but can be gathered by data input device and identify
Image.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification
Shape, such as two-dimensional bar.
Two-dimensional bar starts the system that network connects, including a data output apparatus and a data input device, described
Data output apparatus includes that an image display, described data input device are provided with an image capture module;
Described data output apparatus shows the image being associated with data to be transmitted on described image display, in image
Containing the network identity being associated with data to be transmitted;Described data input device is contained by described image capture module collection
The image of network identity, then extracts the network identity being associated in image with data to be transmitted, utilizes network identity to enter meter
Data to be transmitted described in calculation machine Network Capture.Described computer network can be a Internet, LAN, system for cloud computing.
Described data input device stores described image capture module acquired image, and then is stored by pictorial form
Data.So can reduce the requirement of data-handling capacity to described data input device.At the number needing acquisition to be transmitted
According to time, more in good time from image, extract network identity.Described data input device can also extract in image and contain
The network identity relevant to data to be transmitted, the network identity that extracts of storage, and then stored by the form of network identity
Data.Data input device can also directly store by the network identity being associated with data to be transmitted get to be transmitted
Data.Directly store the data transmitted, it is simple to read later.
Described image display includes that a photomodulator, described image capture module directly gather on described photomodulator
Image.Photomodulator is generally used for projection display apparatus, directly uses photomodulator display image in above-mentioned design, it is possible to reduce
Projection lens, the equipment of projection screen, with cost-effective and saving space.Described photomodulator can use liquid crystal on silicon
(LCOS)。
Described image capture module includes that a photographic head, described photographic head have automatic focusing function.
Described image display includes that visible light source and does not see light source, by described visible light source as showing and treating
The light source of the image that transmission data are associated, described invisible light source is as the light of the network identity being associated with data to be transmitted
Source.The preferred infrared light supply of described invisible light source.Data input device extracts the network identity relevant to data to be transmitted, then
Utilize computer network to open network identity and obtain data to be transmitted.
Described image display can use LCD screen, containing an invisible light source in the back light of LCD screen.
Described image display can use scialyscope, containing invisible light source described in the projection light source of scialyscope.
Described image capture module is adopted by the image of a function with the light that the described invisible light source of identification is sent
Collection module.It can be such as a photographic head with infrared ray identification function.
The figure being associated with data to be transmitted containing network identity shown by changing continuously on described image display
Picture, to export data continuously, described image capture module is the network on image display described in continuous acquisition in the way of video recording
Mark.
Described data input device includes a display screen, and described display screen can show the progress of image transmitting.So that
Grasp data transmission schedule in user in good time.
Accompanying drawing explanation
Fig. 1 is the flow chart that picture starts method for connecting network;
Fig. 2 is a kind of structural representation that two-dimensional bar starts the system that network connects.
Detailed description of the invention
The technological means, the creation characteristic that realize for the present invention, reach purpose and be easy to understand with effect, below in conjunction with
It is specifically illustrating, the present invention is expanded on further.
Two-dimensional bar starts the method for network data transmission, the first step, shows the image being associated with data to be transmitted,
Containing the network identity being associated with data to be transmitted in image;Second step, data input device obtains and data to be transmitted phase
The image of the network identity of association;3rd step, data input device extracts network identity;4th step, data input device utilizes
Network identity enters computer network and obtains described data to be transmitted.
Data input device is directly entered computer network and obtains data to be transmitted.Can also be utilized it by data input device
Its server enters computer network and obtains data to be transmitted, then by server, data to be transmitted is sent to data input and sets
Standby.The content that data are transmitted the most between devices is not data itself, but is used for obtaining number to be transmitted
According to network identity.
Computer network is the Internet.Or, computer network is LAN.Or, computer network is system for cloud computing.Treat
Transmission data can be webpage, picture, software, sound, video, numeral, word etc., it is also possible to is the data encrypted.Network
Mark can be to use the forms such as word, code, picture.Network identity can be data to be transmitted is had identification network address,
Logo, key word etc..
Data input device is opened the network identity being associated with data to be transmitted voluntarily and is obtained data to be transmitted.
Data input device utilizes the network address extracted, logo, key word etc. to enter computer network and obtains number to be transmitted
According to.Computer network can pass through the network identities such as network address, logo, key word and find data to be transmitted fast and accurately.
Network identity can also is that the operational order obtaining data to be transmitted.Operational order include at least two by based on
The operational order that calculation machine network sends, obtains data to be transmitted by least two operational order from computer network.
At least two operational order in described operational order sends to computer network according to precedence.At least two
Operational order disposably can send to computer network according to precedence, it is also possible to sends to computer network by several times.
Such as data to be transmitted is the text document in public mailbox.The operational order contained in network identity includes: the
One step, opens mailbox and enters window, second step, input username and password, the 3rd step, open file acquisition data to be transmitted.
Three operational orders can disposably be sent to computer network, by counting by data input device according to precedence
Calculation machine network responds one by one.
Data input device can also first to computer network send " first step, open mailbox enter window " operation refer to
Order, after machine network to be calculated opens mailbox entrance window, then sends " second step inputs username and password " to computer network
Operational order, after machine network to be calculated has inputted username and password, then to computer network send " the 3rd step, opens literary composition
Part obtain data to be transmitted " operational order, wait computer network response.The acquisition of the data for having encrypted is referred to
The acquisition mode of the text document in public mailbox, as long as operational order contains close for open needed for the data encrypted
Code.
Compound mode is as follows:
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With code, data to be transmitted is numeral.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted
With word, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using code, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity
Using word, data to be transmitted is numeral.
Network identity can be macroscopic image, it is also possible to be invisible but can by data input device collection also
The image extracted.When network identity use invisible but can be gathered by data input device and extract image time, can be right
Data input device is configured, and improves the accuracy rate of data transmission by only gathering invisible image.Such as, data are defeated
Go out equipment and include visible light source and an infrared light supply, shown the image being associated with data to be transmitted by visible light source, pass through
Infrared light supply shows the network identity being associated with data to be transmitted.Data input device can be provided with one and have infrared ray identification
The photographic head of function is used for gathering network identity.
Image capture module includes a photographic head, and photographic head has automatic focusing function.It is associated with data to be transmitted
Containing check code in image.
Data input device analyzes whether contain correct check code in image acquired in image capture module, if
The check code obtained is incorrect, then control photographic head and automatically focus.
At least three group check codes on can arranging around network code.When at least three group check codes are correct, data are defeated
Enter equipment and think that the network identity contained in this image is correct.
Such as when the image containing network identity is polygon layout, it is respectively provided with check code in multiple corner portions.
When the check code of multiple corner portions is correct, data input device thinks that the network identity contained in this image is correct.Otherwise may be used
To reject the image of check code mistake.
The image being associated with data to be transmitted refers to possibly together with to the network identity being associated with data to be transmitted
The indication code shown, is the network identity being associated with data to be transmitted for which is distinguished.Data input device is by searching
Indication code, finds the network identity being associated with data to be transmitted being instructed to code instruction.
Or when containing multiple network identity simultaneously, in order to improve the accuracy extracting content, attached at network identity
Closely it is provided with the indication code for the network identity being associated with data to be transmitted is indicated.It is for which is distinguished and treats
The network identity that transmission data are associated.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification
Shape, such as two-dimensional bar.
With reference to Fig. 1, picture starts method for connecting network, and the first step, data output apparatus shows relevant to data to be transmitted
The image of connection, containing the network identity being associated with data to be transmitted in image.Second step, data input device obtains with to be passed
The image of the network identity that transmission of data is associated.3rd step, data input device extracts network identity.4th step, data input
Equipment utilization network identity enters computer network and obtains described data to be transmitted.Data input device can be directly entered calculating
Machine Network Capture data to be transmitted, it is also possible to utilize other server enter computer network obtain data to be transmitted, then by
Data to be transmitted is sent to data input device by server.Data are carried out the most between devices, transmission interior
Holding is not data itself, but for obtaining the network identity of data to be transmitted.Computer network can be a Internet, local
Net, system for cloud computing.
Network identity can be to have the network address of identification, logo, key word etc. to data to be transmitted.Computer network can
To find data to be transmitted fast and accurately by network identities such as network address, logo, key words.Data input device can utilize
The network address that extracts, logo, key word etc. enter computer network and obtain data to be transmitted.Network identity can also is that acquisition is treated
The operational order of transmission data.Operational order include at least two for the operational order sent to computer network, by extremely
Few two operational orders obtain data to be transmitted from computer network.At least two operational order in described operational order is pressed
Send to computer network according to precedence.At least two operational order can be according to precedence disposably to computer network
Send, it is also possible to send to computer network by several times.Such as data to be transmitted is the text document in public mailbox.Network identity
In the operational order that contains include: the first step, open mailbox and enter window, second step, input username and password, the 3rd step,
Open file acquisition data to be transmitted.Data input device can by three operational orders according to precedence disposably to calculating
Machine network sends, computer network respond one by one.Data input device can also first to computer network send " first step,
Open mailbox and enter window " operational order, machine network to be calculated is opened mailbox and is entered after window, then sends to computer network
The operational order of " second step inputs username and password ", after machine network to be calculated has inputted username and password, then to calculating
Machine network sends the operational order of " the 3rd step opens file acquisition data to be transmitted ", waits computer network response.Network mark
Knowledge can be to use the forms such as word, code, picture.Data to be transmitted can be webpage, picture, software, sound, video, numeral,
Word etc., it is also possible to be the data encrypted.The a literary composition that the acquisition of the data for having encrypted is referred in public mailbox
The acquisition mode of part, as long as operational order contains for opening the password needed for the data encrypted.
Network identity can be macroscopic image, it is also possible to be invisible but can by data input device collection also
The image extracted.When network identity use invisible but can be gathered by data input device and extract image time, can be right
Data input device is configured, and improves the accuracy rate of data transmission by only gathering invisible image.Such as, data are defeated
Go out equipment and include visible light source and an infrared light supply, shown the image being associated with data to be transmitted by visible light source, pass through
Infrared light supply shows the network identity being associated with data to be transmitted.Data input device can be provided with one and have infrared ray identification
The photographic head of function is used for gathering network identity.When network identity use macroscopic image time, in order to network identity with
Content regions in the image being associated with data to be transmitted that data output apparatus shows separates, or ought contain multiple simultaneously
During network identity, in order to improve the accuracy extracting content, it is provided with near network identity for relevant to data to be transmitted
The network identity of connection carries out the indication code indicated, and is the network identity being associated with data to be transmitted for which is distinguished.Refer to
Show that code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to be that other has the figure of identification, such as two dimension
Bar code.Indication code can also be image that is invisible but that can be gathered by data input device and extract.
With reference to Fig. 2, two-dimensional bar starts the system that network connects, and inputs including a data output apparatus 1 and data
Equipment 2.Data output apparatus 1 includes an image display 11, and data output apparatus 1 shows with to be passed on image display 11
The image that transmission of data is associated, containing the network identity being associated with data to be transmitted in image.Data input device 2 is provided with
One image capture module 21, data input device 2 gathers the image being associated with data to be transmitted by image capture module 21,
Then extract the network identity being associated with data to be transmitted in image, utilize network identity to enter computer network and obtain to be passed
Transmission of data.Computer network can be a Internet, LAN, system for cloud computing.
Image display 11 includes a photomodulator, and image capture module 21 directly gathers the image on photomodulator.Light
Manipulator is generally used for projection display apparatus, directly uses photomodulator display image, it is possible to reduce projection lens in above-mentioned design
Head, the equipment of projection screen, with cost-effective and saving space.Photomodulator can use liquid crystal on silicon (LCOS).This knot
The suitable short range transmission of structure.
Image capture module 21 includes a photographic head, and photographic head has automatic focusing function.Show on image display 11
The image being associated with data to be transmitted in containing check code.Data input device 2 is analyzed acquired in image capture module 21
Image in whether contain correct check code, if obtain check code incorrect, then control photographic head automatically adjust
Burnt.At least three group check codes on can arranging around the network code shown by image display 11.Verify at least three groups
When code is correct, data input device 2 thinks that the network identity contained in this image is correct.Such as at the image containing network identity
During for polygon layout, it is respectively provided with check code in multiple corner portions.When the check code of multiple corner portions is correct, data are defeated
Enter equipment 2 and think that the network identity contained in this image is correct.Otherwise can reject the image of check code mistake.Such as tetragon
Four angles on check code can be set.The image being associated with data to be transmitted is associated possibly together with to data to be transmitted
Network identity carry out the indication code that indicates, be the network identity being associated with data to be transmitted for which is distinguished.Data
Input equipment 2, by searching indication code, finds the network identity being associated with data to be transmitted being instructed to code instruction.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification
Shape, such as two-dimensional bar.
Data output apparatus 1 can also include that visible light source and does not see light source, is shown with to be passed by visible light source
The image that transmission of data is associated, the network identity being associated with data to be transmitted by not seeing light source show.Invisible light source
Preferably infrared light supply.In specifically used, do not see that light source can be directly with reference to the use of the visible light source in existing display device
Method uses.In theory simply " color " of this black light is shown over the display, and naked eyes cannot be seen, enters
And do not affect people's vision.In display, this black light can mix with other visible rays.So draw in display normal visible
While face, the sightless network identity of naked eyes can be shown, it might even be possible to whole screen display network identity.Image display 11 can
To use LCD screen, containing an invisible light source in the back light of LCD screen.Image display 11 can also use throwing
Shadow machine, containing an invisible light source in the projection light source of scialyscope.Image capture module 21 is one to have identification invisible light source
The image capture module 21 of the function of the light sent.It can be such as a photographic head with infrared ray identification function.Figure
As acquisition module 21 can only gather the black light part of the network identity being associated for display, data with data to be transmitted
Black light part in the image that image capture module 21 is absorbed by input equipment 2, if infrared part is in the display of itself
Screen is converted into visual picture, in order to user Information.
The image being associated with data to be transmitted containing network identity shown by changing continuously on image display 11,
To export data continuously, image capture module 21 is the network identity on continuous acquisition image display 11 in the way of video recording.
Data input device 2 includes a display screen 22, and display screen 22 can show the progress of image transmitting.So that making
User grasps data transmission schedule in good time.
Data input device 2 can be opened the network identity being associated with data to be transmitted voluntarily and obtain data to be transmitted.
Two-dimensional bar starts the system of network connection can also connect a computer network, and data input device 2 utilizes computer network
Network is opened the network identity being associated with data to be transmitted and is obtained data to be transmitted.Computer network can be a Internet, office
Territory net, system for cloud computing etc..
Data input device 2 stores the mode of data: one, storage image capture module 21 acquired image, Jin Ertong
Crossing pictorial form storage data, when needing to obtain the data transmitted then in good time extracts network identity i.e. from image
Can.Two, store the network identity extracted, and then by the form storage data of network identity, transmitted needing acquisition
During data, in the data that acquisition is transmitted.Three, the data transmitted got directly are stored.
Ultimate principle and the principal character advantages of the present invention of the present invention are more than shown and described.The technical staff of the industry
It should be recognized that the present invention is not limited by above-mentioned using method, described in above-mentioned using method and description, simply say the present invention
Principle, the present invention also has various changes and modifications without departing from the spirit and scope of the present invention, these change and
Improvement in both falling within the claimed scope of the invention claimed scope by appending claims and equivalent thereof
Define.
Claims (10)
1. the method that two-dimensional bar starts network data transmission, it is characterised in that:
The first step, the image that display is associated with data to be transmitted, containing the network mark being associated with data to be transmitted in image
Know;
Second step, data input device obtains the image of the network identity being associated with data to be transmitted;
3rd step, data input device extracts network identity;
4th step, data input device utilizes network identity to enter computer network and obtains described data to be transmitted.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data input
Equipment is directly entered computer network and obtains data to be transmitted.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data input
Other server of equipment utilization enters computer network and obtains data to be transmitted, then data to be transmitted is sent to by server
Data input device.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data are to scheme
The content that the form of picture is transmitted between devices is not data itself, but for obtaining the network mark of data to be transmitted
Know.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: computer network
Network is the Internet, and data to be transmitted is word, and network identity uses code form.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: network identity
It it is the operational order obtaining data to be transmitted.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: image acquisition
Module includes a photographic head, and photographic head has automatic focusing function;Containing check code in the image being associated with data to be transmitted;
Data input device analyzes whether contain correct check code in image acquired in image capture module, if acquisition
Check code incorrect, then control photographic head automatically focus.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: with to be transmitted
Possibly together with the indication code that the network identity being associated with data to be transmitted is indicated in the image that data are associated, for district
Which separates is the network identity being associated with data to be transmitted;Data input device, by searching indication code, finds and is instructed to
The network identity being associated with data to be transmitted of code instruction;
Indication code is two-dimensional bar.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data input
Network address, logo or the key word that equipment utilization extracts enters computer network and obtains data to be transmitted.
Two-dimensional bar the most as claimed in any of claims 1 to 9 starts the method for network data transmission, and it is special
Levy and be: data input device is opened the network identity being associated with data to be transmitted voluntarily and obtained data to be transmitted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610801104.1A CN106254519A (en) | 2010-10-28 | 2010-10-28 | Picture starts its system of method for connecting network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010523284.4A CN102457551B (en) | 2010-10-28 | Data transfer mode and the system thereof that network connects is obtained by image acquisition | |
CN201610801104.1A CN106254519A (en) | 2010-10-28 | 2010-10-28 | Picture starts its system of method for connecting network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010523284.4A Division CN102457551B (en) | 2010-10-28 | 2010-10-28 | Data transfer mode and the system thereof that network connects is obtained by image acquisition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106254519A true CN106254519A (en) | 2016-12-21 |
Family
ID=46040202
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610864827.6A Withdrawn CN106534256A (en) | 2010-10-28 | 2010-10-28 | Method for downloading software through image acquisition and system thereof |
CN201610872519.8A Withdrawn CN106506895A (en) | 2010-10-28 | 2010-10-28 | The method and its system that webpage is opened by IMAQ |
CN201610801123.4A Withdrawn CN106412022A (en) | 2010-10-28 | 2010-10-28 | Software for performing data transmission through network identity |
CN201610861222.1A Withdrawn CN106358002A (en) | 2010-10-28 | 2010-10-28 | System for storing to-be-transmitted data in image form |
CN201610801104.1A Pending CN106254519A (en) | 2010-10-28 | 2010-10-28 | Picture starts its system of method for connecting network |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610864827.6A Withdrawn CN106534256A (en) | 2010-10-28 | 2010-10-28 | Method for downloading software through image acquisition and system thereof |
CN201610872519.8A Withdrawn CN106506895A (en) | 2010-10-28 | 2010-10-28 | The method and its system that webpage is opened by IMAQ |
CN201610801123.4A Withdrawn CN106412022A (en) | 2010-10-28 | 2010-10-28 | Software for performing data transmission through network identity |
CN201610861222.1A Withdrawn CN106358002A (en) | 2010-10-28 | 2010-10-28 | System for storing to-be-transmitted data in image form |
Country Status (1)
Country | Link |
---|---|
CN (5) | CN106534256A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1464480A (en) * | 2002-06-19 | 2003-12-31 | 松翰科技股份有限公司 | Process for making image index and a system using the image index |
CN101051341A (en) * | 2007-02-07 | 2007-10-10 | 钟杨 | Identifying and reading method and device for automatic symbol image |
JP2008182570A (en) * | 2007-01-25 | 2008-08-07 | Nec Electronics Corp | Transmitter, receiver, and transceiving system |
CN101855861A (en) * | 2007-11-16 | 2010-10-06 | 富士通天株式会社 | Authentication method, authentication system, on-vehicle device, and authentication device |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7016532B2 (en) * | 2000-11-06 | 2006-03-21 | Evryx Technologies | Image capture and identification system and process |
US7340767B2 (en) * | 2003-06-26 | 2008-03-04 | Matsushita Electric Industrial Co, Ltd. | Camera apparatus, image server and image server system |
CN101043643A (en) * | 2006-04-27 | 2007-09-26 | 陈龙军 | Method for operating automatically mobile terminal using two-dimensional code |
CN101005485A (en) * | 2006-12-14 | 2007-07-25 | 钟杨 | Method and system for compression coding information resource address |
CN101022489A (en) * | 2007-03-16 | 2007-08-22 | 北京意锐新创科技有限公司 | Two-dimensional code charging card and application method thereof |
CN101281588A (en) * | 2007-04-03 | 2008-10-08 | 报联新动力(北京)科技有限公司 | Two-dimension bar code system being suitable for mobile application as well as encoding-decoding method thereof |
JP2010041564A (en) * | 2008-08-07 | 2010-02-18 | Sharp Corp | Data transmission apparatus and method |
-
2010
- 2010-10-28 CN CN201610864827.6A patent/CN106534256A/en not_active Withdrawn
- 2010-10-28 CN CN201610872519.8A patent/CN106506895A/en not_active Withdrawn
- 2010-10-28 CN CN201610801123.4A patent/CN106412022A/en not_active Withdrawn
- 2010-10-28 CN CN201610861222.1A patent/CN106358002A/en not_active Withdrawn
- 2010-10-28 CN CN201610801104.1A patent/CN106254519A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1464480A (en) * | 2002-06-19 | 2003-12-31 | 松翰科技股份有限公司 | Process for making image index and a system using the image index |
JP2008182570A (en) * | 2007-01-25 | 2008-08-07 | Nec Electronics Corp | Transmitter, receiver, and transceiving system |
CN101051341A (en) * | 2007-02-07 | 2007-10-10 | 钟杨 | Identifying and reading method and device for automatic symbol image |
CN101855861A (en) * | 2007-11-16 | 2010-10-06 | 富士通天株式会社 | Authentication method, authentication system, on-vehicle device, and authentication device |
Non-Patent Citations (1)
Title |
---|
国家质量技术监督局: "《中华人民共和国国家标准》", 1 July 2001 * |
Also Published As
Publication number | Publication date |
---|---|
CN106506895A (en) | 2017-03-15 |
CN102457551A (en) | 2012-05-16 |
CN106412022A (en) | 2017-02-15 |
CN106358002A (en) | 2017-01-25 |
CN106534256A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105141899B (en) | A kind of exchange method and system of service robot of supporting parents | |
CN104008678B (en) | The intelligent network terminal of multimedia messages Real-time Collection and encryption and method of work | |
CN105303632B (en) | A kind of mobile monitor is registered system and method for work | |
Paterson et al. | The world through Glass: developing novel methods with wearable computing for urban videographic research | |
CN108415558A (en) | Intelligent glasses and intelligent search method | |
CN110222567A (en) | A kind of image processing method and equipment | |
CN107526162A (en) | Virtual glasses | |
CN102457551B (en) | Data transfer mode and the system thereof that network connects is obtained by image acquisition | |
CN106254519A (en) | Picture starts its system of method for connecting network | |
CN107862746A (en) | A kind of AR technology application systems for library | |
CN201917947U (en) | Terminal for attendance service management | |
CN106550168A (en) | The system that webpage is automatically opened up by two-dimensional code scanning | |
Sun et al. | Computational intelligence and applications of virtual reality technology in martial arts teaching system | |
CN105700840A (en) | Data input device and matched data output device | |
KR102406624B1 (en) | Apparatus of display for integrated mode transformation | |
CN210119872U (en) | VR uses supervise device based on operation function | |
CN105677278A (en) | Data output equipment | |
García Freile | IoT Sensor Development | |
CN102377487A (en) | Data receiving device supporting data transmission in image form | |
CN206363553U (en) | A kind of learning machine box for supporting that large-size screen monitors are shown and keyboard and mouse is operated | |
CN104053068B (en) | A kind of information cuing method and infrared projection device, intelligent television | |
CN105681618A (en) | Equipment for getting data based on image capture and matched equipment thereof | |
CN104537493A (en) | Intelligent information management system and method | |
CN105681617A (en) | Image type data carrier and transmission mode thereof | |
Liu et al. | Monitoring system based on virtual reality technology and video processing technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |
|
RJ01 | Rejection of invention patent application after publication |