CN105118285B - Anti-interference infrared remote control decoding method and system - Google Patents
Anti-interference infrared remote control decoding method and system Download PDFInfo
- Publication number
- CN105118285B CN105118285B CN201510627693.1A CN201510627693A CN105118285B CN 105118285 B CN105118285 B CN 105118285B CN 201510627693 A CN201510627693 A CN 201510627693A CN 105118285 B CN105118285 B CN 105118285B
- Authority
- CN
- China
- Prior art keywords
- data
- pulse
- effective
- segment
- remote control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000001208 nuclear magnetic resonance pulse sequence Methods 0.000 claims abstract description 36
- 230000008439 repair process Effects 0.000 claims abstract description 27
- 230000000295 complement effect Effects 0.000 claims description 39
- 238000012795 verification Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 13
- 238000012937 correction Methods 0.000 abstract description 4
- 230000000630 rising effect Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000001514 detection method Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000003139 buffering effect Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000003708 edge detection Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000011218 segmentation Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C23/00—Non-electrical signal transmission systems, e.g. optical systems
- G08C23/04—Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Selective Calling Equipment (AREA)
- Optical Communication System (AREA)
Abstract
The invention relates to an anti-interference infrared remote control decoding method and system. The existing infrared remote control decoding method generally considers the problem of external interference resistance less, and the existing infrared remote control decoding is generally instant decoding, namely instant decoding is carried out when each pulse arrives, so that the method is difficult to carry out anti-interference error correction, and the error correction can be carried out only by comparing front and rear pulses, so that the decoding anti-interference performance is poor. The invention intercepts the effective infrared remote control data pulse segment from the pulse sequence containing the infrared remote control data, repairs the effective infrared remote control data pulse segment, obtains the decoded data and then decodes the decoded data, wherein the influence of external interference is considered, and the infrared remote control data is repaired by using a data repair algorithm, so that the interfered infrared remote control data can be correctly repaired and decoded with higher probability.
Description
Technical Field
The invention relates to the technical field of infrared remote control, in particular to an anti-interference infrared remote control decoding method and system.
Background
Currently, in infrared remote control products, infrared remote control is easily interfered by the outside world, mainly by infrared interference from an infrared touch frame. The scheme in the prior art can not well identify and correct the infrared interference, and the infrared remote control cannot be correctly decoded under the condition of the infrared interference.
The existing infrared remote control decoding method generally considers the problem of external interference resistance less, and the existing infrared remote control decoding generally adopts instant decoding, namely instant decoding is carried out when each pulse arrives, the mode is difficult to carry out anti-interference error correction, because the error correction can be carried out only by comparing front and back pulses, the decoding anti-interference performance is poor, in addition, partial products adopt an edge triggering interruption mode to carry out decoding, triggering can be carried out on a rising edge and a falling edge, the data volume is large under the interference condition, the data is too complex, the anti-interference processing is complex, and the performance is poor.
Disclosure of Invention
Based on this, it is necessary to provide a method and a system for anti-interference infrared remote control decoding, aiming at the problem that the infrared remote control is susceptible to interference.
An anti-interference infrared remote control decoding method comprises the following steps:
acquiring a pulse sequence containing infrared remote control data, wherein the pulse sequence comprises an identification pulse and a valid data pulse segment, and the valid data pulse segment is behind the identification pulse;
detecting the identification pulse in the pulse sequence, and intercepting the effective data pulse segment after the identification pulse;
restoring the data of the effective data pulse segment to obtain decoded data;
and decoding the decoded data.
An anti-interference infrared remote control decoding system comprises the following units:
the device comprises an acquisition unit, a processing unit and a control unit, wherein the acquisition unit is used for acquiring a pulse sequence containing infrared remote control data, the pulse sequence comprises an identification pulse and a valid data pulse segment, and the valid data pulse segment is behind the identification pulse;
the intercepting unit is used for detecting the identification pulse in the pulse sequence and intercepting the effective data pulse segment after the identification pulse;
the repair unit is used for repairing the data of the effective data pulse segment to obtain decoded data;
a decoding unit for decoding the decoded data.
According to the scheme of the invention, the effective infrared remote control data pulse segment is intercepted from the pulse sequence containing the infrared remote control data, the effective infrared remote control data pulse segment is repaired, and the decoded data is decoded.
Drawings
FIG. 1 is a flow diagram of a method for tamper resistant infrared remote control decoding in one embodiment;
FIG. 2 is a flow chart of detection of an identification pulse in one embodiment;
FIG. 3 is a flow diagram of a valid data burst after an identification pulse is truncated in one embodiment;
FIG. 4 is a schematic diagram of a repeating code pulse in one embodiment;
FIG. 5 is a diagram of a pulse sequence including a repeating code sequence in one embodiment;
FIG. 6 is a schematic of logic "1" and logic "0" pulses in one embodiment;
FIG. 7 is a schematic diagram of an identification pulse and a valid data pulse in one embodiment;
FIG. 8 is a schematic diagram of a system for tamper resistant infrared remote control decoding in one embodiment;
FIG. 9 is a partially schematic illustration of a system for tamper-resistant IR remote decoding in one embodiment;
FIG. 10 is a partially schematic illustration of a system for tamper-resistant IR remote decoding in one embodiment;
FIG. 11 is a schematic diagram of a system for tamper resistant infrared remote control decoding in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the scope of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, an embodiment of the method for anti-jamming infrared remote control decoding according to the present invention is shown. The anti-interference infrared remote control decoding method in the embodiment comprises the following steps:
step S101: acquiring a pulse sequence containing infrared remote control data, wherein the pulse sequence comprises an identification pulse and a valid data pulse segment, and the valid data pulse segment is behind the identification pulse;
step S102: detecting the identification pulse in the pulse sequence, and intercepting the effective data pulse segment after the identification pulse;
in this embodiment the valid data pulse segment immediately follows the identification pulse with no further pulses in between.
Step S103: restoring the data of the effective data pulse segment to obtain decoded data;
in this embodiment, the valid data burst includes valid data and interference data, and the data repair algorithm is used to repair the interference data, so that the data in the valid data burst becomes decoded data that can be decoded correctly.
Step S104: and decoding the decoded data.
The method for anti-interference infrared remote control decoding comprises the steps of intercepting an effective infrared remote control data pulse segment from a pulse sequence containing infrared remote control data, restoring the effective infrared remote control data pulse segment, obtaining decoded data and then decoding the decoded data.
In one embodiment, the step of repairing the data of the valid data burst comprises the steps of:
if the data length of the effective data pulse segment is a preset fixed length, repairing the data of the effective data pulse segment by using a complementary verification algorithm; if the data length of the effective data burst is larger than a preset fixed length, repairing the data of the effective data burst by utilizing a merged data algorithm; if the data length of the effective data burst is smaller than a preset fixed length, repairing the data of the effective data burst by using a data splitting algorithm;
or, the data of the effective data burst is repaired by comprehensively using the three algorithms of the complementary check algorithm, the merged data algorithm and the data splitting algorithm.
In the embodiment, the three types of data length are mainly repaired by respectively using the three algorithms of the complementary check algorithm, the merged data algorithm and the data splitting algorithm, and in practical application, the three algorithms are often used comprehensively, so that the data can be better repaired.
Preferably, the data of the infrared remote control effective data burst includes an address code and a command code, which have fixed lengths, and under the condition of interference, the length of the data may not be changed and still is the fixed length, but error data exists in the data, and at this time, the data of the effective data burst needs to be repaired by adopting a complementary verification algorithm;
under the condition of interference, the length of data is possibly longer than the fixed length, the original correct data has data which is subjected to interference segmentation, and at the moment, a data merging algorithm is adopted to repair the data of the effective data pulse segment;
under the condition of interference, the length of data is possibly shorter than the fixed length, the original correct data has data which is interfered and combined, and at the moment, the data of the effective data pulse segment needs to be repaired by adopting a data splitting algorithm;
there are also many interference situations where the three algorithms are mixed, so that the data of the valid data burst needs to be repaired by using the three algorithms in combination.
In one embodiment, the data of the effective data pulse segment is pulse time, the data comprises a positive code and a negative code, and the positive code and the negative code correspond to each other one by one under the condition of no interference;
the step of repairing the data of the valid data burst using a complementary verification algorithm comprises the steps of:
detecting whether the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic 0;
and if the positive code in the data of the effective data pulse section is not in the effective interval range of the pulse time of logic1 or logic0, repairing the positive code by using the reverse code corresponding to the positive code which is not in the effective interval range of the pulse time of logic1 or logic0 according to the one-to-one correspondence relationship of the positive code and the reverse code.
In the embodiment, the data with normal length but interfered numerical value can be better repaired by using the complementary check algorithm.
Preferably, the correct address code and command code are 32 bits in total according to the NEC protocol. The bits 0 to 7 are positive codes of address codes, the bits 8 to 15 are negative codes of address codes, the bits 16 to 23 are positive codes of command codes, the bits 24 to 31 are negative codes of command codes, the positive codes and the negative codes correspond one by one, the positive codes and the negative codes are logic0 or logic1, the pulse time of the logic0 is 1120us, and the pulse time of the logic1 is 2250 us;
the data in table 1 is a pulse time sequence calculated by using an MCU timer, the unit is 10us, due to the error problem of the timer, the logic0 measures that the normal value is 103, i.e. 1030us (103 × 10us ═ 1030us), the logic1 is 205, i.e. 2050us (205 × 10us ═ 2050us), and the timer error is a fixed system error, and the normal logic judgment is not affected. Setting the fault tolerance to be 100us, the identification range of Logic0 is 93-113 (Logic0_ Min is 93, Logic0_ Max is 113), and the identification range of Logic1 is 195-215 (Logic1_ Min is 195, Logic1_ Max is 215);
when an error is detected in a bit, as shown in Table 1, the 5 th bit 175 is not in the identification range of Logic1 (195-215), and the 6 th bit 133 is not in the identification range of Logic0 (93-113), so that the 13 th bit 103 can be identified as Logic0, and thus the 5 th bit is known to be Logic1 from the bar code; similarly, from position 14, position 6 can be repaired and identified as Logic 0.
TABLE 1
In one embodiment, the data of the valid data burst is a burst length;
the step of repairing the data of the valid data burst using a merged data algorithm comprises the steps of:
detecting whether the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic 0;
if the adjacent data which are not in the effective interval range of the pulse time of logic1 or logic0 exist, the adjacent data are merged;
and if the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic0, respectively merging the data of the two adjacent pulse times of logic0 in the effective data pulse segment, verifying by the complementary verification algorithm, and selecting the merging processing which accords with the verification.
In this embodiment, the data with a large length after being interfered can be better repaired by using the merged data algorithm.
Preferably, according to the NEC protocol, when the data length is greater than 32, it is indicated that data is interference split. The split data generally has two situations, one is that the split data is not in the range of Logic0 and Logic1, in this case, adjacent split data are directly merged, for example, in table 2, 206 is split into 130 and 76 by interference data, and then the two adjacent data of 130 and 76 are directly merged to obtain 206, which is correct data; the other is that the split Logic1 data can be just identified as two Logic0 data, in such a case, the condition that all the two data before and after being merged are Logic0 needs to be verified respectively, and a group of data which accords with complementary check is selected to be correctly merged by combining a complementary check algorithm.
TABLE 2
In one embodiment, the data of the valid data burst is a burst length;
the step of repairing the data of the valid data burst using a data splitting algorithm comprises the steps of:
detecting whether the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 and logic 0;
if the data is the sum of the pulse time of logic1 and logic0, splitting the data into the pulse time of logic1 and logic0, verifying the front and back sequence of the split pulse time of logic1 and logic0 by the complementary verification algorithm, and selecting the front and back sequence which accords with the verification;
if the data is the sum of the pulse time of logic1 and logic1, splitting the data into two pulse times of logic 1;
and if the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic0, respectively splitting all the data of the pulse time of logic1 in the effective data pulse segment, verifying the data by using a complementary verification algorithm, and selecting the splitting processing which is in accordance with the verification.
In this embodiment, the data with a smaller length after being interfered can be better repaired by using a data splitting algorithm.
Preferably, according to the NEC protocol, when the data length is less than 32, it is indicated that at least 2 data are interference combined. In this case, the size of data merging is considered, that is, if the merged data is equal to the sum of Logic0 and Logic1, the merged data is directly divided into two data, i.e., Logic0 and Logic1, but the sequence of Logic0 and Logic1 after the data are divided needs to be confirmed by a complementary check algorithm, as shown in table 3, 206 and 103 are merged into 309, the merged data is divided into Logic0 and Logic1, and after the 309 is divided by corresponding anti-codes 103 and 206, Logic1 is before and Logic0 after the data are divided; if the combined data is equal to the sum of Logic1 and Logic1, the combined data is directly divided into two Logic1 data; if the merged data is equal to the sum of Logic0 and Logic0 (the sum of two Logic0 is equal to one Logic1), all Logic1 need to be split and verified, and the correct group is selected by a complementary verification algorithm for splitting, and the rest remain as it is.
TABLE 3
In one embodiment, the step of detecting the identification pulse in the pulse train comprises the steps of:
detecting the time length of each pulse in the pulse sequence, and if the time length of a certain pulse is within the effective interval range of the time length of the identification pulse, judging the pulse as the identification pulse;
or,
and calculating the sum of the time lengths of a plurality of continuous pulses in the pulse sequence, and if the sum of the length values is within the effective interval range of the time length of the identification pulse, judging the pulses to be the identification pulse.
In the present embodiment, the identification pulse can be detected efficiently and without omission by the above-described method.
Preferably, the following is a common NEC protocol (similar to other infrared remote control protocols), the identification pulse may be AGC Burst (automatic gain control high level pulse) by using rising edge triggering, and according to the NEC protocol, the AGC Burst is theoretically 13500us, and the fault tolerance is set to 200us, that is, the AGC Burst is identified by detecting that the pulse time length is in the interval a (13300us-13700us, a _ Min is 13300us, and a _ Max is 13700us), where the AGC Burst needs to be identified by using the buffer queue FIFO _ a, and then according to the NEC protocol, the theoretical total time length 53920us of the address code and the command code, the fault tolerance is set to 400us, and then the pulse segment containing the address code and the command code is intercepted according to the theoretical value and the fault tolerance and put into the buffer queue FIFO _ B for subsequent repair processing.
Specifically, without interference, AGC Burst is a 13500us long full pulse. Through actual data analysis, when the AGC Burst is interfered, the AGC Burst is divided into a plurality of small pulses, but the time lengths of the small pulses are added up to be in an interval A (13300us-13700 us). Therefore, the AGC Burst cannot be judged and identified only by detecting that a certain pulse length is in the interval a, but a buffer queue FIFO _ a with the length of N (N is set to be 3 in the case of general interference) is set to specially detect the AGC Burst, and when the total length of N (1 ═ N < ═ N) pulses in the buffer queue is in the interval a, the AGC Burst is considered to be identified. A specific flow for detecting AGC Burst using the buffer queue FIFO _ a is shown in fig. 2.
When the method is started, initializing a buffer queue FIFO _ A, wherein the queue data are all 0; when a rising edge comes, calculating a time interval x between the rising edge of the time and the rising edge of the last time as original infrared data, enabling the head data of the FIFO _ A to be dequeued, inputting the x to the tail of the FIFO _ A, simultaneously recording the number n of the original infrared data, and calculating the sum S of n values of the tail of the FIFO _ A; if the sum value S is in the range of the effective interval A of the AGC Burst, the n pulses can be identified as the AGC Burst as a whole; if the sum S is smaller than the minimum value A _ Min of the effective interval A and N is smaller than N, continuing inputting subsequent original infrared data until AGC Burst is detected and identified, or if the condition that the sum S is smaller than the minimum value A _ Min of the effective interval A and N is smaller than N is not met, indicating that AGC Burst is not detected and identified, and reselecting the original infrared data for identification.
Pulse data are acquired by adopting a mode of triggering at a rising edge and not triggering at a falling edge, and the mode is half less than that of data acquired by triggering at an edge, so that the repairing treatment is more convenient and efficient. In addition, only if the AGC Burst is correctly detected, the following valid data Burst can be intercepted, and the repair step can be entered. The value of N is an empirical value, and for general interference, the AGC Burst can be basically identified without omission by taking 3 as N through waveform analysis and algorithm debugging of the oscilloscope.
In one embodiment, the step of truncating the valid data burst following the identification pulse comprises the steps of:
and intercepting the effective data pulse section after the identification pulse according to the preset time length of the effective data pulse section.
In this embodiment, the valid data burst after the identification pulse can be effectively intercepted by the above method.
Preferably, the following is a common NEC protocol (similar to other infrared remote control protocols), the identification pulse may be AGC Burst (automatic gain control high level pulse) by using rising edge trigger, according to the NEC protocol, after detecting AGCBurst, the following pulse segment containing address code and command code may be buffered in the valid data queue FIFO _ B, the total length of the pulse time of the address code and command code of one frame of valid infrared remote control data is constant, and the boundary containing the address code and command code data may be divided according to the length. The theoretical total time length of the address code and command code pulses is (2250+1120) × 8 × 2 ═ 53920us, and the fault tolerance is set to 400us, that is, the interval B (B _ Min ═ 53520us, B _ Max ═ 54320 us). The specific flow of the valid data burst after the identification pulse is truncated is shown in fig. 3.
Firstly, detecting AGC Burst; after AGC Burst is detected and identified, initializing an effective data queue FIFO _ B; and buffering the pulse segment data after AGC Burst into an effective data queue FIFO _ B one by one until the sum of the data in the effective data queue FIFO _ B is within the range of an effective interval B of an effective data pulse segment, and at the moment, both the address code and the command code in the effective data are buffered in the effective data queue FIFO _ B. According to the NEC protocol, the number of pulses of the address code and the command code is 32 without interference; in the case of interference, the address code and command code are shifted, sliced or combined, so the number of pulses n should be around 32 and S is used to calculate the total time of the pulse sequence.
After AGC Burst is detected, a pulse sequence (containing address codes, command codes and interference) with the total time length of the interval B is input into a buffer queue FIFO _ B and then can be repaired. The step is mainly to separate the pulse sequence containing effective address codes and command codes, so that the next step can more accurately repair.
In one embodiment, the step of truncating the valid data burst following the identification burst further comprises the steps of:
if more than one repetition code pulse is detected after the valid data burst, the data in each repetition code pulse is added after the data of the valid data burst.
In the embodiment, the generated repeated codes are processed, and the omission of infrared remote control data information is prevented.
Preferably, the following is given by way of example of a conventional NEC protocol (similar to other infrared remote control protocols), and there are two cases after detection of an address code and a command code: one is that the infrared remote control key is released, so that repeated codes cannot be generated in the case; secondly, when the infrared remote control key is pressed for a long time, repeated codes can be generated. According to the NEC protocol, as shown in fig. 4 and 5, the repetition code appears 1 time every 110ms, and the identification of two consecutive pulse lengths 11250us (9+2.25 equals 11.25ms) and 98750us (110-9-2.25 equals 98.75ms) by using a rising edge detection method indicates the identification of the repetition code. The situation of identifying the repeated codes needs to be identified through a similar identification method of AGC Burst because the situation of interference needs to be considered, the principle is the same, only the identification range is different, and the detailed description is omitted. The processing method after identifying the repeated codes is to place the repeated codes into an effective data queue FIFO _ B, the subsequent dequeue of the FIFO _ B repairs and decodes the address codes and the command codes, and if the repeated codes exist during decoding, the key decoded in the front is repeatedly pressed.
The above embodiments all take the NEC infrared remote control protocol as an example, and the NEC protocol is explained as follows:
the NEC protocol decodes according to the burst length. In fig. 6, each pulse is a 560us long 38KHz carrier (about 21 carrier cycles). The logic "1" pulse time is 2.25ms and the logic "0" pulse time is 1.12 ms.
Fig. 7 is a typical pulse train of the NEC protocol, including identification pulses and valid data. The protocol specifies that the lower bits are sent first, as in the case shown in fig. 7, the address code sent is "59" and the command code is "16". The information sent each time is firstly a high-level pulse of 9ms AGC (automatic gain control) for adjusting the gain of the infrared receiver, and then a low level of 4.5ms, and the whole of the two is the AGC Burst; followed by an address code and a command code. The address code and command code are transmitted twice, and the second time, the anticode (e.g., the anticode of 11110000 is 00001111) is transmitted, which is used to verify the accuracy of the received information. Since each bit transmits its complement once, the overall transmission time is constant (i.e., each time a 1 or 0 is transmitted, the transmission time is the sum of the transmission time of the bit and its complement), so that the address code and command code in the AGC Burst and its subsequent interval can be intercepted. This means of verifying authenticity by sending an anti-code will use this feature when repairing the interfering data.
After the infrared remote control key is pressed, the corresponding valid data information can be sent only once, if the infrared remote control key is pressed all the time, the sending is a repeated code with a period of 110ms, and the repeated code consists of an AGC high level of 9ms, a low level of 2.25ms and a high level of 560us, as shown in FIG. 5. In fig. 5, the pulse time from the rising edge of AGC Burst before valid data to the rising edge of AGC of the repetition code is also 110ms, which is the same as the cycle of the repetition code.
The invention provides an anti-interference infrared remote control decoding method, which can intercept an effective infrared remote control data pulse segment in a pulse sequence containing infrared remote control data, repair the effective infrared remote control data pulse segment, obtain decoded data and then decode the decoded data.
According to the anti-interference infrared remote control decoding method, the invention also provides an anti-interference infrared remote control decoding system, and the embodiment of the anti-interference infrared remote control decoding system is explained in detail below.
Referring to fig. 8, an embodiment of the system for anti-jamming infrared remote control decoding according to the present invention is shown. The anti-interference infrared remote control decoding system in this embodiment includes an obtaining unit 201, an intercepting unit 202, a repairing unit 203, and a decoding unit 204, in which:
an acquisition unit 201, configured to acquire a pulse sequence including infrared remote control data, where the pulse sequence includes an identification pulse and a valid data burst, and the valid data burst follows the identification pulse;
an intercepting unit 202, configured to detect the identification pulse in the pulse sequence, and intercept the valid data pulse segment after the identification pulse;
in this embodiment the valid data pulse segment immediately follows the identification pulse with no further pulses in between.
A repair unit 203, configured to repair the data of the valid data burst to obtain decoded data;
in this embodiment, the valid data burst includes valid data and interference data, and the data repair algorithm is used to repair the interference data, so that the data in the valid data burst becomes decoded data that can be decoded correctly.
A decoding unit 204, configured to decode the decoded data.
The anti-interference infrared remote control decoding system provided by the embodiment intercepts an effective infrared remote control data pulse segment from a pulse sequence containing infrared remote control data, repairs the effective infrared remote control data pulse segment, obtains decoded data and then decodes the decoded data.
In one embodiment, as shown in fig. 9, the repair unit 203 includes:
a complementary verifying unit 2031, configured to, if the data length of the valid data burst is a preset fixed length, repair the data of the valid data burst by using a complementary verifying algorithm;
a merged data unit 2032, configured to repair the data of the valid data burst by using a merged data algorithm if the data length of the valid data burst is greater than a preset fixed length;
a data splitting unit 2033, configured to repair the data of the valid data burst by using a data splitting algorithm if the data length of the valid data burst is smaller than a preset fixed length;
a comprehensive processing unit 2034, configured to comprehensively use the three units, i.e., the complementary checking unit, the merged data unit, and the data splitting unit, to repair the data of the valid data burst.
In the embodiment, the three types of data length are mainly repaired by respectively using the three algorithms of the complementary check algorithm, the merged data algorithm and the data splitting algorithm, and in practical application, the three algorithms are often used comprehensively, so that the data can be better repaired.
Preferably, the data of the infrared remote control effective data burst includes an address code and a command code, which have fixed lengths, and under the condition of interference, the length of the data may not be changed and still is the fixed length, but error data exists in the data, and at this time, the data of the effective data burst needs to be repaired by adopting a complementary verification algorithm;
under the condition of interference, the length of data is possibly longer than the fixed length, the original correct data has data which is subjected to interference segmentation, and at the moment, a data merging algorithm is adopted to repair the data of the effective data pulse segment;
under the condition of interference, the length of data is possibly shorter than the fixed length, the original correct data has data which is interfered and combined, and at the moment, the data of the effective data pulse segment needs to be repaired by adopting a data splitting algorithm;
there are also many interference situations where the three algorithms are mixed, so that the data of the valid data burst needs to be repaired by using the three algorithms in combination.
In one embodiment, the data of the effective data pulse segment is pulse time, and comprises a positive code and a negative code, and the positive code and the negative code correspond to each other one by one under the condition of no interference;
a complementary verifying unit 2031, configured to detect whether data of the valid data burst is within a valid interval range of a pulse time of a logic1 or a logic 0;
and if the positive code in the data of the effective data pulse section is not in the effective interval range of the pulse time of logic1 or logic0, repairing the positive code by using the reverse code corresponding to the positive code which is not in the effective interval range of the pulse time of logic1 or logic0 according to the one-to-one correspondence relationship of the positive code and the reverse code.
In the embodiment, the data with normal length but interfered numerical value can be better repaired by using the complementary check algorithm.
Preferably, the correct address code and command code are 32 bits in total according to the NEC protocol. The bits 0 to 7 are positive codes of address codes, the bits 8 to 15 are negative codes of address codes, the bits 16 to 23 are positive codes of command codes, the bits 24 to 31 are negative codes of command codes, the positive codes and the negative codes correspond one by one, the positive codes and the negative codes are logic0 or logic1, the pulse time of the logic0 is 1120us, and the pulse time of the logic1 is 2250 us;
the data in table 4 is a pulse time sequence calculated by using an MCU timer, the unit is 10us, due to the error problem of the timer, the logic0 measures that the normal value is 103, i.e. 1030us (103 × 10us ═ 1030us), the logic1 is 205, i.e. 2050us (205 × 10us ═ 2050us), and the timer error is a fixed system error, and the normal logic judgment is not affected. Setting the fault tolerance to be 100us, the identification range of Logic0 is 93-113 (Logic0_ Min is 93, Logic0_ Max is 113), and the identification range of Logic1 is 195-215 (Logic1_ Min is 195, Logic1_ Max is 215);
when an error is detected in a bit, as shown in Table 4, the 5 th bit 175 is not in the identification range of Logic1 (195-215), and the 6 th bit 133 is not in the identification range of Logic0 (93-113), so that the 13 th bit 103 can be identified as Logic0, and thus the 5 th bit is known to be Logic1 from the code reversal; similarly, from position 14, position 6 can be repaired and identified as Logic 0.
TABLE 4
In one embodiment, the data of the valid data burst is a burst length;
a merge data unit 2032, configured to detect whether data of the valid data burst is within a valid interval range of a pulse time of logic1 or logic 0;
if the adjacent data which are not in the effective interval range of the pulse time of logic1 or logic0 exist, the adjacent data are merged;
and if the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic0, respectively merging the data of the two adjacent pulse times of logic0 in the effective data pulse segment, verifying by the complementary verification algorithm, and selecting the merging processing which accords with the verification.
In this embodiment, the data with a large length after being interfered can be better repaired by using the merged data algorithm.
Preferably, according to the NEC protocol, when the data length is greater than 32, it is indicated that data is interference split. The split data generally has two situations, one is that the split data is not in the range of Logic0 and Logic1, in this case, adjacent split data are directly merged, for example, in table 5, 206 is split into 130 and 76 by interference data, and then the two adjacent data of 130 and 76 are directly merged to obtain 206, which is correct data; the other is that the split Logic1 data can be just identified as two Logic0 data, in such a case, the condition that all the two data before and after being merged are Logic0 needs to be verified respectively, and a group of data which accords with complementary check is selected to be correctly merged by combining a complementary check algorithm.
TABLE 5
In one embodiment, the data of the valid data burst is a burst length;
a data splitting unit 2033, configured to detect whether data of the valid data burst is within a valid interval range of a pulse time of logic1 and logic 0;
if the data is the sum of the pulse time of logic1 and logic0, splitting the data into the pulse time of logic1 and logic0, verifying the front and back sequence of the split pulse time of logic1 and logic0 by the complementary verification algorithm, and selecting the front and back sequence which accords with the verification;
if the data is the sum of the pulse time of logic1 and logic1, splitting the data into two pulse times of logic 1;
and if the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic0, respectively splitting all the data of the pulse time of logic1 in the effective data pulse segment, verifying the data by using a complementary verification algorithm, and selecting the splitting processing which is in accordance with the verification.
In this embodiment, the data with a smaller length after being interfered can be better repaired by using a data splitting algorithm.
Preferably, according to the NEC protocol, when the data length is less than 32, it is indicated that at least 2 data are interference combined. In this case, the size of data merging is considered, that is, if the merged data is equal to the sum of Logic0 and Logic1, the merged data is directly divided into two data, i.e., Logic0 and Logic1, but the sequence of Logic0 and Logic1 after the data are divided needs to be confirmed by a complementary check algorithm, as shown in table 6, 206 and 103 are merged into 309, the merged data is divided into Logic0 and Logic1, and after the splitting of 309 is determined by corresponding anti-codes 103 and 206, Logic1 is before and Logic0 is after; if the combined data is equal to the sum of Logic1 and Logic1, the combined data is directly divided into two Logic1 data; if the merged data is equal to the sum of Logic0 and Logic0 (the sum of two Logic0 is equal to one Logic1), all Logic1 need to be split and verified, and the correct group is selected by a complementary verification algorithm for splitting, and the rest remain as it is.
TABLE 6
In one embodiment, as shown in fig. 10, the intercepting unit 202 includes a detecting unit 2021;
the detecting unit 2021 is configured to detect a time length of each pulse in the pulse sequence, and if a time length of a certain pulse is within a valid interval range of the time length of the identification pulse, determine that the pulse is the identification pulse;
or,
and calculating the sum of the time lengths of a plurality of continuous pulses in the pulse sequence, and if the sum of the length values is within the effective interval range of the time length of the identification pulse, judging the pulses to be the identification pulse.
In the present embodiment, the identification pulse can be detected efficiently and without omission by the above-described method.
Preferably, the following is a common NEC protocol (similar to other infrared remote control protocols), the identification pulse may be AGC Burst (automatic gain control high level pulse) by using rising edge triggering, and according to the NEC protocol, the AGC Burst is theoretically 13500us, and the fault tolerance is set to 200us, that is, the AGC Burst is identified by detecting that the pulse time length is in the interval a (13300us-13700us, a _ Min is 13300us, and a _ Max is 13700us), where the AGC Burst needs to be identified by using the buffer queue FIFO _ a, and then according to the NEC protocol, the theoretical total time length 53920us of the address code and the command code, the fault tolerance is set to 400us, and then the pulse segment containing the address code and the command code is intercepted according to the theoretical value and the fault tolerance and put into the buffer queue FIFO _ B for subsequent repair processing.
Specifically, without interference, AGC Burst is a 13500us long full pulse. Through actual data analysis, when the AGC Burst is interfered, the AGC Burst is divided into a plurality of small pulses, but the time lengths of the small pulses are added up to be in an interval A (13300us-13700 us). Therefore, the AGC Burst cannot be judged and identified only by detecting that a certain pulse length is in the interval a, but a buffer queue FIFO _ a with the length of N (N is set to be 3 in the case of general interference) is set to specially detect the AGC Burst, and when the total length of N (1 ═ N < ═ N) pulses in the buffer queue is in the interval a, the AGC Burst is considered to be identified. A specific flow for detecting AGC Burst using the buffer queue FIFO _ a is shown in fig. 2.
When the method is started, initializing a buffer queue FIFO _ A, wherein the queue data are all 0; when a rising edge comes, calculating a time interval x between the rising edge of the time and the rising edge of the last time as original infrared data, enabling the head data of the FIFO _ A to be dequeued, inputting the x to the tail of the FIFO _ A, simultaneously recording the number n of the original infrared data, and calculating the sum S of n values of the tail of the FIFO _ A; if the sum value S is in the range of the effective interval A of the AGC Burst, the n pulses can be identified as the AGC Burst as a whole; if the sum S is smaller than the minimum value A _ Min of the effective interval A and N is smaller than N, continuing inputting subsequent original infrared data until AGC Burst is detected and identified, or if the condition that the sum S is smaller than the minimum value A _ Min of the effective interval A and N is smaller than N is not met, indicating that AGC Burst is not detected and identified, and reselecting the original infrared data for identification.
Pulse data are acquired by adopting a mode of triggering at a rising edge and not triggering at a falling edge, and the mode is half less than that of data acquired by triggering at an edge, so that the repairing treatment is more convenient and efficient. In addition, only if the AGC Burst is correctly detected, the following valid data Burst can be intercepted, and the repair step can be entered. The value of N is an empirical value, and for general interference, the AGC Burst can be basically identified without omission by taking 3 as N through waveform analysis and algorithm debugging of the oscilloscope.
In one embodiment, the truncating unit 202 is configured to truncate the valid data burst after the identification pulse according to a preset time length of the valid data burst.
In this embodiment, the valid data burst after the identification pulse can be effectively intercepted by the above method.
Preferably, the following is a common NEC protocol (similar to other infrared remote control protocols), the identification pulse may be AGC Burst (automatic gain control high level pulse) by using rising edge trigger, according to the NEC protocol, after detecting AGCBurst, the following pulse segment containing address code and command code may be buffered in the valid data queue FIFO _ B, the total length of the pulse time of the address code and command code of one frame of valid infrared remote control data is constant, and the boundary containing the address code and command code data may be divided according to the length. The theoretical total time length of the address code and command code pulses is (2250+1120) × 8 × 2 ═ 53920us, and the fault tolerance is set to 400us, that is, the interval B (B _ Min ═ 53520us, B _ Max ═ 54320 us). The specific flow of the valid data burst after the identification pulse is truncated is shown in fig. 3.
Firstly, detecting AGC Burst; after AGC Burst is detected and identified, initializing an effective data queue FIFO _ B; and buffering the pulse segment data after AGC Burst into an effective data queue FIFO _ B one by one until the sum of the data in the effective data queue FIFO _ B is within the range of an effective interval B of an effective data pulse segment, and at the moment, both the address code and the command code in the effective data are buffered in the effective data queue FIFO _ B. According to the NEC protocol, the number of pulses of the address code and the command code is 32 without interference; in the case of interference, the address code and command code are shifted, sliced or combined, so the number of pulses n should be around 32 and S is used to calculate the total time of the pulse sequence.
After AGC Burst is detected, a pulse sequence (containing address codes, command codes and interference) with the total time length of the interval B is input into a buffer queue FIFO _ B and then can be repaired. This step is mainly to separate the pulse sequence containing the effective address code and command code, so that the next unit can be repaired more accurately.
In one embodiment, as shown in fig. 11, the system for tamper-resistant ir remote decoding includes a repetition processing unit 205 for adding data in each repetition code pulse to data in the valid data burst if more than one repetition code pulse is detected after the valid data burst.
In the embodiment, the generated repeated codes are processed, and the omission of infrared remote control data information is prevented.
Preferably, the following is given by way of example of a conventional NEC protocol (similar to other infrared remote control protocols), and there are two cases after detection of an address code and a command code: one is that the infrared remote control key is released, so that repeated codes cannot be generated in the case; secondly, when the infrared remote control key is pressed for a long time, repeated codes can be generated. According to the NEC protocol, as shown in fig. 4 and 5, the repetition code appears 1 time every 110ms, and the identification of two consecutive pulse lengths 11250us (9+2.25 equals 11.25ms) and 98750us (110-9-2.25 equals 98.75ms) by using a rising edge detection method indicates the identification of the repetition code. The situation of identifying the repeated codes needs to be identified through a similar identification method of AGC Burst because the situation of interference needs to be considered, the principle is the same, only the identification range is different, and the detailed description is omitted. The processing method after identifying the repeated codes is to place the repeated codes into an effective data queue FIFO _ B, the subsequent dequeue of the FIFO _ B repairs and decodes the address codes and the command codes, and if the repeated codes exist during decoding, the key decoded in the front is repeatedly pressed.
The above embodiments all take the NEC infrared remote control protocol as an example, and the NEC protocol is explained as follows:
the NEC protocol decodes according to the burst length. In fig. 6, each pulse is a 560us long 38KHz carrier (about 21 carrier cycles). The logic "1" pulse time is 2.25ms and the logic "0" pulse time is 1.12 ms.
Fig. 7 is a typical pulse train for the NEC protocol. The protocol specifies that the lower bits are sent first, as in the case shown in fig. 7, the address code sent is "59" and the command code is "16". The information sent each time is firstly a high-level pulse of 9ms AGC (automatic gain control) for adjusting the gain of the infrared receiver, and then a low level of 4.5ms, and the whole of the two is the AGC Burst; followed by an address code and a command code. The address code and command code are transmitted twice, and the second time, the anticode (e.g., the anticode of 11110000 is 00001111) is transmitted, which is used to verify the accuracy of the received information. Since each bit transmits its complement once, the overall transmission time is constant (i.e., each time a 1 or 0 is transmitted, the transmission time is the sum of the transmission time of the bit and its complement), so that the address code and command code in the AGC Burst and its subsequent interval can be intercepted. This means of verifying authenticity by sending an anti-code will use this feature when repairing the interfering data.
After the infrared remote control key is pressed, the corresponding valid data information can be sent only once, if the infrared remote control key is pressed all the time, the sending is a repeated code with a period of 110ms, and the repeated code consists of an AGC high level of 9ms, a low level of 2.25ms and a high level of 560us, as shown in FIG. 7. In fig. 7, the pulse time from the rising edge of AGC Burst before valid data to the rising edge of AGC of the repetition code is also 110ms, which is the same as the cycle of the repetition code.
The anti-interference infrared remote control decoding system and the anti-interference infrared remote control decoding method are in one-to-one correspondence, and the technical characteristics and the beneficial effects described in the embodiment of the anti-interference infrared remote control decoding method are all suitable for the embodiment of the anti-interference infrared remote control decoding system.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (8)
1. An anti-interference infrared remote control decoding method is characterized by comprising the following steps:
acquiring a pulse sequence containing infrared remote control data, wherein the pulse sequence comprises an identification pulse and a valid data pulse segment, and the valid data pulse segment is behind the identification pulse;
detecting the identification pulse in the pulse sequence, and intercepting the effective data pulse segment after the identification pulse;
restoring the data of the effective data pulse segment to obtain decoded data;
decoding the decoded data;
the step of repairing the data of the valid data burst comprises the steps of:
if the data length of the effective data pulse segment is a preset fixed length, repairing the data of the effective data pulse segment by using a complementary verification algorithm; if the data length of the effective data burst is larger than a preset fixed length, repairing the data of the effective data burst by utilizing a merged data algorithm; and if the data length of the effective data burst is smaller than a preset fixed length, repairing the data of the effective data burst by using a data splitting algorithm.
2. The method of interference-resistant IR remote control decoding according to claim 1,
the data of the effective data pulse section is pulse time, the data comprises positive codes and negative codes, and the positive codes and the negative codes correspond to each other one by one under the condition of not being interfered;
the step of repairing the data of the valid data burst using a complementary checking algorithm comprises the steps of:
detecting whether the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic 0;
and if the positive code in the data of the effective data pulse section is not in the effective interval range of the pulse time of logic1 or logic0, repairing the positive code by using the reverse code corresponding to the positive code which is not in the effective interval range of the pulse time of logic1 or logic0 according to the one-to-one correspondence relationship of the positive code and the reverse code.
3. The method of interference-resistant IR remote control decoding according to claim 1,
the data of the effective data pulse segment is pulse time;
the step of repairing the data of the valid data burst using a merged data algorithm comprises the steps of:
detecting whether the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic 0;
if the adjacent data which are not in the effective interval range of the pulse time of logic1 or logic0 exist, the adjacent data are merged;
and if the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic0, respectively merging the data of the two adjacent pulse times of logic0 in the effective data pulse segment, verifying by the complementary verification algorithm, and selecting the merging processing which accords with the verification.
4. The method of interference-resistant IR remote control decoding according to claim 1,
the data of the effective data pulse segment is pulse time;
the step of repairing the data of the valid data burst using a data splitting algorithm comprises the steps of:
detecting whether the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 and logic 0;
if the data is the sum of the pulse time of logic1 and logic0, splitting the data into the pulse time of logic1 and logic0, verifying the front and back sequence of the split pulse time of logic1 and logic0 by the complementary verification algorithm, and selecting the front and back sequence which accords with the verification;
if the data is the sum of the pulse time of logic1 and logic1, splitting the data into two pulse times of logic 1;
and if the data of the effective data pulse segment is in the effective interval range of the pulse time of logic1 or logic0, respectively splitting all the data of the pulse time of logic1 in the effective data pulse segment, verifying the data by using a complementary verification algorithm, and selecting the splitting processing which is in accordance with the verification.
5. The method of interference-resistant IR remote control decoding according to any one of claims 1 to 4, wherein the step of detecting the identifying pulse in the pulse sequence comprises the steps of:
and detecting the time length of each pulse in the pulse sequence, and if the time length of a certain pulse is within the effective interval range of the time length of the identification pulse, judging the pulse as the identification pulse.
6. The method of claim 1 to 4, wherein said step of intercepting said valid data burst after said identification pulse comprises the steps of:
and intercepting the effective data pulse section after the identification pulse according to the preset time length of the effective data pulse section.
7. The method of claim 6, wherein said step of truncating the valid data burst following said identification pulse further comprises the steps of:
if more than one repetition code pulse is detected after the valid data burst, the data in each repetition code pulse is added after the data of the valid data burst.
8. An anti-interference infrared remote control decoding system is characterized by comprising the following units:
the device comprises an acquisition unit, a processing unit and a control unit, wherein the acquisition unit is used for acquiring a pulse sequence containing infrared remote control data, the pulse sequence comprises an identification pulse and a valid data pulse segment, and the valid data pulse segment is behind the identification pulse;
the intercepting unit is used for detecting the identification pulse in the pulse sequence and intercepting the effective data pulse segment after the identification pulse;
the repair unit is used for repairing the data of the effective data pulse segment to obtain decoded data;
a decoding unit configured to decode the decoded data;
the repair unit comprises a complementary check unit, a merged data unit or a data splitting unit;
the complementary checking unit is used for repairing the data of the effective data pulse segment by using a complementary checking algorithm if the data length of the effective data pulse segment is a preset fixed length;
the merged data unit is used for repairing the data of the effective data pulse segment by using a merged data algorithm if the data length of the effective data pulse segment is greater than a preset fixed length;
and the data splitting unit is used for repairing the data of the effective data pulse segment by using a data splitting algorithm if the data length of the effective data pulse segment is smaller than a preset fixed length.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510627693.1A CN105118285B (en) | 2015-09-25 | 2015-09-25 | Anti-interference infrared remote control decoding method and system |
PCT/CN2016/090732 WO2017050005A1 (en) | 2015-09-25 | 2016-07-20 | Anti-interference infrared remote control decoding method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510627693.1A CN105118285B (en) | 2015-09-25 | 2015-09-25 | Anti-interference infrared remote control decoding method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105118285A CN105118285A (en) | 2015-12-02 |
CN105118285B true CN105118285B (en) | 2018-09-25 |
Family
ID=54666253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510627693.1A Active CN105118285B (en) | 2015-09-25 | 2015-09-25 | Anti-interference infrared remote control decoding method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105118285B (en) |
WO (1) | WO2017050005A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105118285B (en) * | 2015-09-25 | 2018-09-25 | 广州视睿电子科技有限公司 | Anti-interference infrared remote control decoding method and system |
CN106448129A (en) * | 2016-10-26 | 2017-02-22 | 青岛海信电器股份有限公司 | Method and device for removing interference pulse in infrared remote control data |
CN108269392B (en) * | 2018-01-10 | 2020-12-04 | 海信视像科技股份有限公司 | Decoding method and device for infrared remote controller |
CN109272740B (en) * | 2018-11-29 | 2021-04-02 | 深圳创维数字技术有限公司 | Infrared remote control decoding processing method and device and computer readable storage medium |
CN111402570B (en) * | 2020-02-11 | 2021-08-17 | 广州创知科技有限公司 | Infrared remote control signal receiving method, receiving system, receiving device and storage medium |
CN111968361B (en) * | 2020-08-31 | 2022-04-19 | 成都埃克思智创科技有限公司 | Infrared repeated code learning method and infrared remote control system applied to Internet of things |
CN114627635A (en) * | 2020-12-14 | 2022-06-14 | 金卡智能集团股份有限公司 | Infrared communication method, gas meter and terminal equipment |
CN113850988B (en) * | 2020-12-24 | 2022-09-27 | 广东朝歌智慧互联科技有限公司 | Key value correction method, device, equipment and computer readable medium |
CN115065416B (en) * | 2022-04-26 | 2023-08-01 | 北京德为智慧科技有限公司 | Infrared signal anti-interference method and device and display equipment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1834410B1 (en) * | 2005-01-06 | 2009-12-30 | Infra-Com Ltd. | Error detection and correction for baseband wireless system |
US20080280586A1 (en) * | 2005-12-15 | 2008-11-13 | Koninklijke Philips Electronics, N.V. | Remote Control with Rf Protocol |
CN101404113B (en) * | 2008-11-06 | 2010-11-17 | 成都九洲电子信息系统有限责任公司 | Method for implementing infrared remote control decoding by software in embedded system |
CN101699533B (en) * | 2009-05-08 | 2012-02-29 | 四川和芯微电子股份有限公司 | Coding and decoding method applicable to remote controller |
CN102467816B (en) * | 2010-11-18 | 2015-12-16 | 深圳艾科创新微电子有限公司 | A kind of infrared remote control signal decoding method and device |
CN102779405B (en) * | 2012-07-10 | 2014-02-19 | 杭州海康威视数字技术股份有限公司 | Digital video recorder, infrared remote control receiving device and method |
CN102945599B (en) * | 2012-11-17 | 2014-03-26 | 福州大学 | Self-adaptive multi-system infrared decoding method, module and control circuit applying module |
CN103051417B (en) * | 2012-11-30 | 2015-09-09 | 浙江西盈科技有限公司 | A kind of fixing code length complementary type coding method for Infrared remote controller and coding/decoding method thereof |
CN203422641U (en) * | 2013-08-28 | 2014-02-05 | 成都信鑫信息技术有限公司 | Gear box intelligent monitoring system in industrial field |
CN105118285B (en) * | 2015-09-25 | 2018-09-25 | 广州视睿电子科技有限公司 | Anti-interference infrared remote control decoding method and system |
-
2015
- 2015-09-25 CN CN201510627693.1A patent/CN105118285B/en active Active
-
2016
- 2016-07-20 WO PCT/CN2016/090732 patent/WO2017050005A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CN105118285A (en) | 2015-12-02 |
WO2017050005A1 (en) | 2017-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105118285B (en) | Anti-interference infrared remote control decoding method and system | |
CN108009918B (en) | Accounting method of block chain consensus algorithm transaction system and electronic equipment | |
CN105680947B (en) | A kind of Serial data receiving method for filtering out burr | |
TW201134243A (en) | Detection of start frame delimiters in a wireless digital communication system | |
CN102651229B (en) | Semiconductor device and data processing method | |
EP3163777A1 (en) | Multi-channel synchronisation method, synchronisation device and system, and computer storage medium | |
CN101710857A (en) | Serial communication baud rate adaptive method and device thereof | |
CN101083513B (en) | Apparatus,method and system of communication signal decoding | |
CN102298565A (en) | Method for decoding and triggering asynchronous serial bus signals | |
CN107148760A (en) | Method by frame via bus system from transmitter serial transmission at least one receiver and the participation station for bus system | |
CN102128954B (en) | Blanking primitives masking circuit | |
US11477056B2 (en) | Method and apparatus for controlling communication compensation, and air conditioner | |
US8074004B2 (en) | Electronic device for contention detection of bidirectional bus and related method | |
CN111742324A (en) | Code printing method, code printing device, active pen and code printing system | |
US10462268B2 (en) | Data transmitting/receiving apparatus and data transmitting/receiving method | |
US9369314B2 (en) | Generation of Manchester-decoded binary values | |
CN101764669A (en) | CRC code check method in data receiving process | |
CN104639176A (en) | Asynchronous decoder and asynchronous decoding method for BMC (Biphase Mark Coding) signal | |
CN102932103B (en) | A kind of message transmission rate adaptive reception method based on digital transformer substation | |
CN106209116A (en) | A kind of data processing method and electronic equipment | |
CN103455461B (en) | For the method improving RS485 bus communication reliability | |
US11824761B1 (en) | Identifying alignment markers using partial correlators | |
CN114071202B (en) | Infrared identification device and method thereof | |
CN114614949B (en) | State machine state indication function verification method and device and electronic equipment | |
KR100311300B1 (en) | How to Receive Items of Teletext Data Sent in a Television Signal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |