CN106254519A - Picture starts its system of method for connecting network - Google Patents

Picture starts its system of method for connecting network Download PDF

Info

Publication number
CN106254519A
CN106254519A CN201610801104.1A CN201610801104A CN106254519A CN 106254519 A CN106254519 A CN 106254519A CN 201610801104 A CN201610801104 A CN 201610801104A CN 106254519 A CN106254519 A CN 106254519A
Authority
CN
China
Prior art keywords
data
transmitted
network
network identity
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610801104.1A
Other languages
Chinese (zh)
Inventor
李兴文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Butterfly Industrial Co Ltd
Original Assignee
Shanghai Butterfly Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=46040202&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN106254519(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Shanghai Butterfly Industrial Co Ltd filed Critical Shanghai Butterfly Industrial Co Ltd
Priority to CN201610801104.1A priority Critical patent/CN106254519A/en
Priority claimed from CN201010523284.4A external-priority patent/CN102457551B/en
Publication of CN106254519A publication Critical patent/CN106254519A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00095Systems or arrangements for the transmission of the picture signal
    • H04N1/00103Systems or arrangements for the transmission of the picture signal specially adapted for radio transmission, e.g. via satellites
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00095Systems or arrangements for the transmission of the picture signal
    • H04N1/00111Systems or arrangements for the transmission of the picture signal specially adapted for optical transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/85Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression
    • H04N19/89Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression involving methods or arrangements for detection of transmission errors at the decoder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4363Adapting the video stream to a specific local network, e.g. a Bluetooth® network
    • H04N21/43637Adapting the video stream to a specific local network, e.g. a Bluetooth® network involving a wireless protocol, e.g. Bluetooth, RF or wireless LAN [IEEE 802.11]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Astronomy & Astrophysics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Picture starts its system of method for connecting network and relates to data transmission technology.Picture starts method for connecting network, containing the network identity being associated with data to be transmitted in image, data input device obtains the image containing network identity, and therefrom extracts described network identity, then utilizes network identity to enter computer network and obtains described data to be transmitted.Data are carried out the most between devices, and the content of transmission is not data itself, but for obtaining the network identity of data to be transmitted.Two-dimensional bar starts the method for network data transmission, the first step, and the image that display is associated with data to be transmitted, containing the network identity being associated with data to be transmitted in image;Second step, data input device obtains the image of the network identity being associated with data to be transmitted;3rd step, data input device extracts network identity;4th step, data input device utilizes network identity to enter computer network and obtains described data to be transmitted.

Description

Picture starts its system of method for connecting network
The filing date of the original application of this divisional application: on October 28th, 2010, Application No.: 2010105232844, name It is referred to as: obtain, by image acquisition, data transfer mode and the system thereof that network connects.
Technical field
The present invention relates to electronic applications, be specifically related to data transmission technology.
Background technology
Along with the development of electronic technology, various intelligence tools are (such as mobile phone, MP3, MP4, panel computer, notebook computer, the palm Computer, e-book etc.) become increasingly popular in the life of people.These equipment rooms generally require and carry out data transmission.
Although the transmission means of data is varied, still but transmission form is the most single at present.
Summary of the invention
It is an object of the invention to provide a kind of method that two-dimensional bar starts network data transmission, to solve above-mentioned skill Art problem.
It is an object of the invention to provide a kind of picture and start method for connecting network, to solve above-mentioned technical problem.
The present invention also aims to provide a kind of two-dimensional bar to start the system that network connects, to solve above-mentioned technology Problem.
The present invention can realize by the following technical solutions:
Two-dimensional bar starts the method for network data transmission, it is characterised in that:
The first step, the image that display is associated with data to be transmitted, containing the net being associated with data to be transmitted in image Network identifies;
Second step, data input device obtains the image of the network identity being associated with data to be transmitted;
3rd step, data input device extracts network identity;
4th step, data input device utilizes network identity to enter computer network and obtains described data to be transmitted.
Data input device is directly entered computer network and obtains data to be transmitted.
Other server can also be utilized to enter computer network acquisition data to be transmitted, then by taking by data input device Data to be transmitted is sent to data input device by business device.
The content that data are transmitted the most between devices is not data itself, but is used for obtaining to be passed The network identity of transmission of data.
Computer network is the Internet.
Or, computer network is LAN.
Or, computer network is system for cloud computing.
Data to be transmitted can be webpage, picture, software, sound, video, numeral, word etc., it is also possible to encrypts Data.
Network identity can be to use the forms such as word, code, picture.
Network identity can be to have the network address of identification, logo, key word etc. to data to be transmitted.
Data input device is opened the network identity being associated with data to be transmitted voluntarily and is obtained data to be transmitted.
Data input device utilizes the network address extracted, logo, key word etc. to enter computer network and obtains number to be transmitted According to.
Computer network can pass through the network identities such as network address, logo, key word and find data to be transmitted fast and accurately.
Network identity can also is that the operational order obtaining data to be transmitted.
Operational order includes that at least two, for the operational order sent to computer network, is referred to by least two operation Order obtains data to be transmitted from computer network.
At least two operational order in described operational order sends to computer network according to precedence.At least two Operational order disposably can send to computer network according to precedence, it is also possible to sends to computer network by several times.
Such as data to be transmitted is the text document in public mailbox.The operational order contained in network identity includes: the One step, opens mailbox and enters window, second step, input username and password, the 3rd step, open file acquisition data to be transmitted.
Three operational orders can disposably be sent to computer network, by counting by data input device according to precedence Calculation machine network responds one by one.
Data input device can also first to computer network send " first step, open mailbox enter window " operation refer to Order, after machine network to be calculated opens mailbox entrance window, then sends " second step inputs username and password " to computer network Operational order, after machine network to be calculated has inputted username and password, then to computer network send " the 3rd step, opens literary composition Part obtain data to be transmitted " operational order, wait computer network response.
The acquisition of the data for having encrypted is referred to the acquisition mode of the text document in public mailbox, if operation Instruction is containing for opening the password needed for the data encrypted.
Compound mode is as follows:
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is numeral.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is numeral.
Network identity can be macroscopic image, it is also possible to be invisible but can by data input device collection also The image extracted.When network identity use invisible but can be gathered by data input device and extract image time, can be right Data input device is configured, and improves the accuracy rate of data transmission by only gathering invisible image.Such as, data are defeated Go out equipment and include visible light source and an infrared light supply, shown the image being associated with data to be transmitted by visible light source, pass through Infrared light supply shows the network identity being associated with data to be transmitted.Data input device can be provided with one and have infrared ray identification The photographic head of function is used for gathering network identity.
Image capture module includes a photographic head, and photographic head has automatic focusing function.It is associated with data to be transmitted Containing check code in image.
Data input device analyzes whether contain correct check code in image acquired in image capture module, if The check code obtained is incorrect, then control photographic head and automatically focus.
At least three group check codes on can arranging around network code.When at least three group check codes are correct, data are defeated Enter equipment and think that the network identity contained in this image is correct.
Such as when the image containing network identity is polygon layout, it is respectively provided with check code in multiple corner portions. When the check code of multiple corner portions is correct, data input device thinks that the network identity contained in this image is correct.Otherwise may be used To reject the image of check code mistake.
The image being associated with data to be transmitted refers to possibly together with to the network identity being associated with data to be transmitted The indication code shown, is the network identity being associated with data to be transmitted for which is distinguished.Data input device is by searching Indication code, finds the network identity being associated with data to be transmitted being instructed to code instruction.
Or when containing multiple network identity simultaneously, in order to improve the accuracy extracting content, attached at network identity Closely it is provided with the indication code for the network identity being associated with data to be transmitted is indicated.It is for which is distinguished and treats The network identity that transmission data are associated.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification Shape, such as two-dimensional bar.
Picture starts method for connecting network, first data output apparatus and shows the image being associated with data to be transmitted, its It is characterised by: containing the network identity being associated with data to be transmitted in described image, data input device obtains containing network The image of mark, and therefrom extract described network identity, then utilize network identity to enter described in computer network acquisition and treat Transmission data.Described computer network can be a Internet, LAN, system for cloud computing.
Data to be transmitted can be webpage, picture, sound, video, numeral, word, software etc., it is also possible to encrypts Data.
Network identity can be to have the network address of identification, logo, key word etc. to data to be transmitted.Network identity also may be used To be the operational order obtaining data to be transmitted.Described operational order includes that at least two is for the behaviour sent to computer network Instruct, from computer network, obtain data to be transmitted by least two operational order.In described operational order at least Two operational orders send to computer network according to precedence.Network identity can use the shapes such as word, code, picture Formula.
The indication code for network identity is indicated it is additionally provided with, when image contains multiple nets near network identity During network mark, it is the network identity being associated with data to be transmitted for which is distinguished, in order to make data input device accurate The network identity that is associated with data to be transmitted of extraction, and then get required data to be transmitted.Described network identity, institute State indication code and may each be macroscopic image, it is also possible to be invisible but can be gathered by data input device and identify Image.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification Shape, such as two-dimensional bar.
Two-dimensional bar starts the system that network connects, including a data output apparatus and a data input device, described Data output apparatus includes that an image display, described data input device are provided with an image capture module;
Described data output apparatus shows the image being associated with data to be transmitted on described image display, in image Containing the network identity being associated with data to be transmitted;Described data input device is contained by described image capture module collection The image of network identity, then extracts the network identity being associated in image with data to be transmitted, utilizes network identity to enter meter Data to be transmitted described in calculation machine Network Capture.Described computer network can be a Internet, LAN, system for cloud computing.
Described data input device stores described image capture module acquired image, and then is stored by pictorial form Data.So can reduce the requirement of data-handling capacity to described data input device.At the number needing acquisition to be transmitted According to time, more in good time from image, extract network identity.Described data input device can also extract in image and contain The network identity relevant to data to be transmitted, the network identity that extracts of storage, and then stored by the form of network identity Data.Data input device can also directly store by the network identity being associated with data to be transmitted get to be transmitted Data.Directly store the data transmitted, it is simple to read later.
Described image display includes that a photomodulator, described image capture module directly gather on described photomodulator Image.Photomodulator is generally used for projection display apparatus, directly uses photomodulator display image in above-mentioned design, it is possible to reduce Projection lens, the equipment of projection screen, with cost-effective and saving space.Described photomodulator can use liquid crystal on silicon (LCOS)。
Described image capture module includes that a photographic head, described photographic head have automatic focusing function.
Described image display includes that visible light source and does not see light source, by described visible light source as showing and treating The light source of the image that transmission data are associated, described invisible light source is as the light of the network identity being associated with data to be transmitted Source.The preferred infrared light supply of described invisible light source.Data input device extracts the network identity relevant to data to be transmitted, then Utilize computer network to open network identity and obtain data to be transmitted.
Described image display can use LCD screen, containing an invisible light source in the back light of LCD screen.
Described image display can use scialyscope, containing invisible light source described in the projection light source of scialyscope.
Described image capture module is adopted by the image of a function with the light that the described invisible light source of identification is sent Collection module.It can be such as a photographic head with infrared ray identification function.
The figure being associated with data to be transmitted containing network identity shown by changing continuously on described image display Picture, to export data continuously, described image capture module is the network on image display described in continuous acquisition in the way of video recording Mark.
Described data input device includes a display screen, and described display screen can show the progress of image transmitting.So that Grasp data transmission schedule in user in good time.
Accompanying drawing explanation
Fig. 1 is the flow chart that picture starts method for connecting network;
Fig. 2 is a kind of structural representation that two-dimensional bar starts the system that network connects.
Detailed description of the invention
The technological means, the creation characteristic that realize for the present invention, reach purpose and be easy to understand with effect, below in conjunction with It is specifically illustrating, the present invention is expanded on further.
Two-dimensional bar starts the method for network data transmission, the first step, shows the image being associated with data to be transmitted, Containing the network identity being associated with data to be transmitted in image;Second step, data input device obtains and data to be transmitted phase The image of the network identity of association;3rd step, data input device extracts network identity;4th step, data input device utilizes Network identity enters computer network and obtains described data to be transmitted.
Data input device is directly entered computer network and obtains data to be transmitted.Can also be utilized it by data input device Its server enters computer network and obtains data to be transmitted, then by server, data to be transmitted is sent to data input and sets Standby.The content that data are transmitted the most between devices is not data itself, but is used for obtaining number to be transmitted According to network identity.
Computer network is the Internet.Or, computer network is LAN.Or, computer network is system for cloud computing.Treat Transmission data can be webpage, picture, software, sound, video, numeral, word etc., it is also possible to is the data encrypted.Network Mark can be to use the forms such as word, code, picture.Network identity can be data to be transmitted is had identification network address, Logo, key word etc..
Data input device is opened the network identity being associated with data to be transmitted voluntarily and is obtained data to be transmitted.
Data input device utilizes the network address extracted, logo, key word etc. to enter computer network and obtains number to be transmitted According to.Computer network can pass through the network identities such as network address, logo, key word and find data to be transmitted fast and accurately.
Network identity can also is that the operational order obtaining data to be transmitted.Operational order include at least two by based on The operational order that calculation machine network sends, obtains data to be transmitted by least two operational order from computer network.
At least two operational order in described operational order sends to computer network according to precedence.At least two Operational order disposably can send to computer network according to precedence, it is also possible to sends to computer network by several times.
Such as data to be transmitted is the text document in public mailbox.The operational order contained in network identity includes: the One step, opens mailbox and enters window, second step, input username and password, the 3rd step, open file acquisition data to be transmitted.
Three operational orders can disposably be sent to computer network, by counting by data input device according to precedence Calculation machine network responds one by one.
Data input device can also first to computer network send " first step, open mailbox enter window " operation refer to Order, after machine network to be calculated opens mailbox entrance window, then sends " second step inputs username and password " to computer network Operational order, after machine network to be calculated has inputted username and password, then to computer network send " the 3rd step, opens literary composition Part obtain data to be transmitted " operational order, wait computer network response.The acquisition of the data for having encrypted is referred to The acquisition mode of the text document in public mailbox, as long as operational order contains close for open needed for the data encrypted Code.
Compound mode is as follows:
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With code, data to be transmitted is numeral.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is webpage.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is word.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is picture.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is software.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is sound.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is video.
Computer network is the Internet, and network identity is the network address to data to be transmitted with identification, and network identity is adopted With word, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using code, data to be transmitted is numeral.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is webpage.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is word.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is picture.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is software.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is sound.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is video.
Computer network is the Internet, and network identity can also is that the operational order obtaining data to be transmitted, network identity Using word, data to be transmitted is numeral.
Network identity can be macroscopic image, it is also possible to be invisible but can by data input device collection also The image extracted.When network identity use invisible but can be gathered by data input device and extract image time, can be right Data input device is configured, and improves the accuracy rate of data transmission by only gathering invisible image.Such as, data are defeated Go out equipment and include visible light source and an infrared light supply, shown the image being associated with data to be transmitted by visible light source, pass through Infrared light supply shows the network identity being associated with data to be transmitted.Data input device can be provided with one and have infrared ray identification The photographic head of function is used for gathering network identity.
Image capture module includes a photographic head, and photographic head has automatic focusing function.It is associated with data to be transmitted Containing check code in image.
Data input device analyzes whether contain correct check code in image acquired in image capture module, if The check code obtained is incorrect, then control photographic head and automatically focus.
At least three group check codes on can arranging around network code.When at least three group check codes are correct, data are defeated Enter equipment and think that the network identity contained in this image is correct.
Such as when the image containing network identity is polygon layout, it is respectively provided with check code in multiple corner portions. When the check code of multiple corner portions is correct, data input device thinks that the network identity contained in this image is correct.Otherwise may be used To reject the image of check code mistake.
The image being associated with data to be transmitted refers to possibly together with to the network identity being associated with data to be transmitted The indication code shown, is the network identity being associated with data to be transmitted for which is distinguished.Data input device is by searching Indication code, finds the network identity being associated with data to be transmitted being instructed to code instruction.
Or when containing multiple network identity simultaneously, in order to improve the accuracy extracting content, attached at network identity Closely it is provided with the indication code for the network identity being associated with data to be transmitted is indicated.It is for which is distinguished and treats The network identity that transmission data are associated.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification Shape, such as two-dimensional bar.
With reference to Fig. 1, picture starts method for connecting network, and the first step, data output apparatus shows relevant to data to be transmitted The image of connection, containing the network identity being associated with data to be transmitted in image.Second step, data input device obtains with to be passed The image of the network identity that transmission of data is associated.3rd step, data input device extracts network identity.4th step, data input Equipment utilization network identity enters computer network and obtains described data to be transmitted.Data input device can be directly entered calculating Machine Network Capture data to be transmitted, it is also possible to utilize other server enter computer network obtain data to be transmitted, then by Data to be transmitted is sent to data input device by server.Data are carried out the most between devices, transmission interior Holding is not data itself, but for obtaining the network identity of data to be transmitted.Computer network can be a Internet, local Net, system for cloud computing.
Network identity can be to have the network address of identification, logo, key word etc. to data to be transmitted.Computer network can To find data to be transmitted fast and accurately by network identities such as network address, logo, key words.Data input device can utilize The network address that extracts, logo, key word etc. enter computer network and obtain data to be transmitted.Network identity can also is that acquisition is treated The operational order of transmission data.Operational order include at least two for the operational order sent to computer network, by extremely Few two operational orders obtain data to be transmitted from computer network.At least two operational order in described operational order is pressed Send to computer network according to precedence.At least two operational order can be according to precedence disposably to computer network Send, it is also possible to send to computer network by several times.Such as data to be transmitted is the text document in public mailbox.Network identity In the operational order that contains include: the first step, open mailbox and enter window, second step, input username and password, the 3rd step, Open file acquisition data to be transmitted.Data input device can by three operational orders according to precedence disposably to calculating Machine network sends, computer network respond one by one.Data input device can also first to computer network send " first step, Open mailbox and enter window " operational order, machine network to be calculated is opened mailbox and is entered after window, then sends to computer network The operational order of " second step inputs username and password ", after machine network to be calculated has inputted username and password, then to calculating Machine network sends the operational order of " the 3rd step opens file acquisition data to be transmitted ", waits computer network response.Network mark Knowledge can be to use the forms such as word, code, picture.Data to be transmitted can be webpage, picture, software, sound, video, numeral, Word etc., it is also possible to be the data encrypted.The a literary composition that the acquisition of the data for having encrypted is referred in public mailbox The acquisition mode of part, as long as operational order contains for opening the password needed for the data encrypted.
Network identity can be macroscopic image, it is also possible to be invisible but can by data input device collection also The image extracted.When network identity use invisible but can be gathered by data input device and extract image time, can be right Data input device is configured, and improves the accuracy rate of data transmission by only gathering invisible image.Such as, data are defeated Go out equipment and include visible light source and an infrared light supply, shown the image being associated with data to be transmitted by visible light source, pass through Infrared light supply shows the network identity being associated with data to be transmitted.Data input device can be provided with one and have infrared ray identification The photographic head of function is used for gathering network identity.When network identity use macroscopic image time, in order to network identity with Content regions in the image being associated with data to be transmitted that data output apparatus shows separates, or ought contain multiple simultaneously During network identity, in order to improve the accuracy extracting content, it is provided with near network identity for relevant to data to be transmitted The network identity of connection carries out the indication code indicated, and is the network identity being associated with data to be transmitted for which is distinguished.Refer to Show that code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to be that other has the figure of identification, such as two dimension Bar code.Indication code can also be image that is invisible but that can be gathered by data input device and extract.
With reference to Fig. 2, two-dimensional bar starts the system that network connects, and inputs including a data output apparatus 1 and data Equipment 2.Data output apparatus 1 includes an image display 11, and data output apparatus 1 shows with to be passed on image display 11 The image that transmission of data is associated, containing the network identity being associated with data to be transmitted in image.Data input device 2 is provided with One image capture module 21, data input device 2 gathers the image being associated with data to be transmitted by image capture module 21, Then extract the network identity being associated with data to be transmitted in image, utilize network identity to enter computer network and obtain to be passed Transmission of data.Computer network can be a Internet, LAN, system for cloud computing.
Image display 11 includes a photomodulator, and image capture module 21 directly gathers the image on photomodulator.Light Manipulator is generally used for projection display apparatus, directly uses photomodulator display image, it is possible to reduce projection lens in above-mentioned design Head, the equipment of projection screen, with cost-effective and saving space.Photomodulator can use liquid crystal on silicon (LCOS).This knot The suitable short range transmission of structure.
Image capture module 21 includes a photographic head, and photographic head has automatic focusing function.Show on image display 11 The image being associated with data to be transmitted in containing check code.Data input device 2 is analyzed acquired in image capture module 21 Image in whether contain correct check code, if obtain check code incorrect, then control photographic head automatically adjust Burnt.At least three group check codes on can arranging around the network code shown by image display 11.Verify at least three groups When code is correct, data input device 2 thinks that the network identity contained in this image is correct.Such as at the image containing network identity During for polygon layout, it is respectively provided with check code in multiple corner portions.When the check code of multiple corner portions is correct, data are defeated Enter equipment 2 and think that the network identity contained in this image is correct.Otherwise can reject the image of check code mistake.Such as tetragon Four angles on check code can be set.The image being associated with data to be transmitted is associated possibly together with to data to be transmitted Network identity carry out the indication code that indicates, be the network identity being associated with data to be transmitted for which is distinguished.Data Input equipment 2, by searching indication code, finds the network identity being associated with data to be transmitted being instructed to code instruction.
Indication code can be the fundamental figures such as point, line, square, triangle, circle, it is also possible to is that other has the figure of identification Shape, such as two-dimensional bar.
Data output apparatus 1 can also include that visible light source and does not see light source, is shown with to be passed by visible light source The image that transmission of data is associated, the network identity being associated with data to be transmitted by not seeing light source show.Invisible light source Preferably infrared light supply.In specifically used, do not see that light source can be directly with reference to the use of the visible light source in existing display device Method uses.In theory simply " color " of this black light is shown over the display, and naked eyes cannot be seen, enters And do not affect people's vision.In display, this black light can mix with other visible rays.So draw in display normal visible While face, the sightless network identity of naked eyes can be shown, it might even be possible to whole screen display network identity.Image display 11 can To use LCD screen, containing an invisible light source in the back light of LCD screen.Image display 11 can also use throwing Shadow machine, containing an invisible light source in the projection light source of scialyscope.Image capture module 21 is one to have identification invisible light source The image capture module 21 of the function of the light sent.It can be such as a photographic head with infrared ray identification function.Figure As acquisition module 21 can only gather the black light part of the network identity being associated for display, data with data to be transmitted Black light part in the image that image capture module 21 is absorbed by input equipment 2, if infrared part is in the display of itself Screen is converted into visual picture, in order to user Information.
The image being associated with data to be transmitted containing network identity shown by changing continuously on image display 11, To export data continuously, image capture module 21 is the network identity on continuous acquisition image display 11 in the way of video recording.
Data input device 2 includes a display screen 22, and display screen 22 can show the progress of image transmitting.So that making User grasps data transmission schedule in good time.
Data input device 2 can be opened the network identity being associated with data to be transmitted voluntarily and obtain data to be transmitted. Two-dimensional bar starts the system of network connection can also connect a computer network, and data input device 2 utilizes computer network Network is opened the network identity being associated with data to be transmitted and is obtained data to be transmitted.Computer network can be a Internet, office Territory net, system for cloud computing etc..
Data input device 2 stores the mode of data: one, storage image capture module 21 acquired image, Jin Ertong Crossing pictorial form storage data, when needing to obtain the data transmitted then in good time extracts network identity i.e. from image Can.Two, store the network identity extracted, and then by the form storage data of network identity, transmitted needing acquisition During data, in the data that acquisition is transmitted.Three, the data transmitted got directly are stored.
Ultimate principle and the principal character advantages of the present invention of the present invention are more than shown and described.The technical staff of the industry It should be recognized that the present invention is not limited by above-mentioned using method, described in above-mentioned using method and description, simply say the present invention Principle, the present invention also has various changes and modifications without departing from the spirit and scope of the present invention, these change and Improvement in both falling within the claimed scope of the invention claimed scope by appending claims and equivalent thereof Define.

Claims (10)

1. the method that two-dimensional bar starts network data transmission, it is characterised in that:
The first step, the image that display is associated with data to be transmitted, containing the network mark being associated with data to be transmitted in image Know;
Second step, data input device obtains the image of the network identity being associated with data to be transmitted;
3rd step, data input device extracts network identity;
4th step, data input device utilizes network identity to enter computer network and obtains described data to be transmitted.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data input Equipment is directly entered computer network and obtains data to be transmitted.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data input Other server of equipment utilization enters computer network and obtains data to be transmitted, then data to be transmitted is sent to by server Data input device.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data are to scheme The content that the form of picture is transmitted between devices is not data itself, but for obtaining the network mark of data to be transmitted Know.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: computer network Network is the Internet, and data to be transmitted is word, and network identity uses code form.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: network identity It it is the operational order obtaining data to be transmitted.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: image acquisition Module includes a photographic head, and photographic head has automatic focusing function;Containing check code in the image being associated with data to be transmitted;
Data input device analyzes whether contain correct check code in image acquired in image capture module, if acquisition Check code incorrect, then control photographic head automatically focus.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: with to be transmitted Possibly together with the indication code that the network identity being associated with data to be transmitted is indicated in the image that data are associated, for district Which separates is the network identity being associated with data to be transmitted;Data input device, by searching indication code, finds and is instructed to The network identity being associated with data to be transmitted of code instruction;
Indication code is two-dimensional bar.
Two-dimensional bar the most according to claim 1 starts the method for network data transmission, it is characterised in that: data input Network address, logo or the key word that equipment utilization extracts enters computer network and obtains data to be transmitted.
Two-dimensional bar the most as claimed in any of claims 1 to 9 starts the method for network data transmission, and it is special Levy and be: data input device is opened the network identity being associated with data to be transmitted voluntarily and obtained data to be transmitted.
CN201610801104.1A 2010-10-28 2010-10-28 Picture starts its system of method for connecting network Pending CN106254519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610801104.1A CN106254519A (en) 2010-10-28 2010-10-28 Picture starts its system of method for connecting network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010523284.4A CN102457551B (en) 2010-10-28 Data transfer mode and the system thereof that network connects is obtained by image acquisition
CN201610801104.1A CN106254519A (en) 2010-10-28 2010-10-28 Picture starts its system of method for connecting network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201010523284.4A Division CN102457551B (en) 2010-10-28 2010-10-28 Data transfer mode and the system thereof that network connects is obtained by image acquisition

Publications (1)

Publication Number Publication Date
CN106254519A true CN106254519A (en) 2016-12-21

Family

ID=46040202

Family Applications (5)

Application Number Title Priority Date Filing Date
CN201610864827.6A Withdrawn CN106534256A (en) 2010-10-28 2010-10-28 Method for downloading software through image acquisition and system thereof
CN201610872519.8A Withdrawn CN106506895A (en) 2010-10-28 2010-10-28 The method and its system that webpage is opened by IMAQ
CN201610801123.4A Withdrawn CN106412022A (en) 2010-10-28 2010-10-28 Software for performing data transmission through network identity
CN201610861222.1A Withdrawn CN106358002A (en) 2010-10-28 2010-10-28 System for storing to-be-transmitted data in image form
CN201610801104.1A Pending CN106254519A (en) 2010-10-28 2010-10-28 Picture starts its system of method for connecting network

Family Applications Before (4)

Application Number Title Priority Date Filing Date
CN201610864827.6A Withdrawn CN106534256A (en) 2010-10-28 2010-10-28 Method for downloading software through image acquisition and system thereof
CN201610872519.8A Withdrawn CN106506895A (en) 2010-10-28 2010-10-28 The method and its system that webpage is opened by IMAQ
CN201610801123.4A Withdrawn CN106412022A (en) 2010-10-28 2010-10-28 Software for performing data transmission through network identity
CN201610861222.1A Withdrawn CN106358002A (en) 2010-10-28 2010-10-28 System for storing to-be-transmitted data in image form

Country Status (1)

Country Link
CN (5) CN106534256A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1464480A (en) * 2002-06-19 2003-12-31 松翰科技股份有限公司 Process for making image index and a system using the image index
CN101051341A (en) * 2007-02-07 2007-10-10 钟杨 Identifying and reading method and device for automatic symbol image
JP2008182570A (en) * 2007-01-25 2008-08-07 Nec Electronics Corp Transmitter, receiver, and transceiving system
CN101855861A (en) * 2007-11-16 2010-10-06 富士通天株式会社 Authentication method, authentication system, on-vehicle device, and authentication device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7016532B2 (en) * 2000-11-06 2006-03-21 Evryx Technologies Image capture and identification system and process
US7340767B2 (en) * 2003-06-26 2008-03-04 Matsushita Electric Industrial Co, Ltd. Camera apparatus, image server and image server system
CN101043643A (en) * 2006-04-27 2007-09-26 陈龙军 Method for operating automatically mobile terminal using two-dimensional code
CN101005485A (en) * 2006-12-14 2007-07-25 钟杨 Method and system for compression coding information resource address
CN101022489A (en) * 2007-03-16 2007-08-22 北京意锐新创科技有限公司 Two-dimensional code charging card and application method thereof
CN101281588A (en) * 2007-04-03 2008-10-08 报联新动力(北京)科技有限公司 Two-dimension bar code system being suitable for mobile application as well as encoding-decoding method thereof
JP2010041564A (en) * 2008-08-07 2010-02-18 Sharp Corp Data transmission apparatus and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1464480A (en) * 2002-06-19 2003-12-31 松翰科技股份有限公司 Process for making image index and a system using the image index
JP2008182570A (en) * 2007-01-25 2008-08-07 Nec Electronics Corp Transmitter, receiver, and transceiving system
CN101051341A (en) * 2007-02-07 2007-10-10 钟杨 Identifying and reading method and device for automatic symbol image
CN101855861A (en) * 2007-11-16 2010-10-06 富士通天株式会社 Authentication method, authentication system, on-vehicle device, and authentication device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
国家质量技术监督局: "《中华人民共和国国家标准》", 1 July 2001 *

Also Published As

Publication number Publication date
CN106506895A (en) 2017-03-15
CN102457551A (en) 2012-05-16
CN106412022A (en) 2017-02-15
CN106358002A (en) 2017-01-25
CN106534256A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN105141899B (en) A kind of exchange method and system of service robot of supporting parents
CN104008678B (en) The intelligent network terminal of multimedia messages Real-time Collection and encryption and method of work
CN105303632B (en) A kind of mobile monitor is registered system and method for work
Paterson et al. The world through Glass: developing novel methods with wearable computing for urban videographic research
CN108415558A (en) Intelligent glasses and intelligent search method
CN110222567A (en) A kind of image processing method and equipment
CN107526162A (en) Virtual glasses
CN102457551B (en) Data transfer mode and the system thereof that network connects is obtained by image acquisition
CN106254519A (en) Picture starts its system of method for connecting network
CN107862746A (en) A kind of AR technology application systems for library
CN201917947U (en) Terminal for attendance service management
CN106550168A (en) The system that webpage is automatically opened up by two-dimensional code scanning
Sun et al. Computational intelligence and applications of virtual reality technology in martial arts teaching system
CN105700840A (en) Data input device and matched data output device
KR102406624B1 (en) Apparatus of display for integrated mode transformation
CN210119872U (en) VR uses supervise device based on operation function
CN105677278A (en) Data output equipment
García Freile IoT Sensor Development
CN102377487A (en) Data receiving device supporting data transmission in image form
CN206363553U (en) A kind of learning machine box for supporting that large-size screen monitors are shown and keyboard and mouse is operated
CN104053068B (en) A kind of information cuing method and infrared projection device, intelligent television
CN105681618A (en) Equipment for getting data based on image capture and matched equipment thereof
CN104537493A (en) Intelligent information management system and method
CN105681617A (en) Image type data carrier and transmission mode thereof
Liu et al. Monitoring system based on virtual reality technology and video processing technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161221

RJ01 Rejection of invention patent application after publication