CN106341731B - Remote control key response method and device for smart television - Google Patents

Remote control key response method and device for smart television Download PDF

Info

Publication number
CN106341731B
CN106341731B CN201510412635.7A CN201510412635A CN106341731B CN 106341731 B CN106341731 B CN 106341731B CN 201510412635 A CN201510412635 A CN 201510412635A CN 106341731 B CN106341731 B CN 106341731B
Authority
CN
China
Prior art keywords
application
key value
key
foreground
foreground application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510412635.7A
Other languages
Chinese (zh)
Other versions
CN106341731A (en
Inventor
曹霄
乔百玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201510412635.7A priority Critical patent/CN106341731B/en
Publication of CN106341731A publication Critical patent/CN106341731A/en
Application granted granted Critical
Publication of CN106341731B publication Critical patent/CN106341731B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/422Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
    • H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
    • H04N21/42206User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor characterized by hardware details
    • H04N21/4221Dedicated function buttons, e.g. for the control of an EPG, subtitles, aspect ratio, picture-in-picture or teletext
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/438Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving MPEG packets from an IP network
    • H04N21/4383Accessing a communication channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44213Monitoring of end-user related data
    • H04N21/44218Detecting physical presence or behaviour of the user, e.g. using sensors to detect if the user is leaving the room or changes his face expression during a TV program
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44213Monitoring of end-user related data
    • H04N21/44222Analytics of user selections, e.g. selection of programs or purchase activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • H04N21/4433Implementing client middleware, e.g. Multimedia Home Platform [MHP]

Abstract

The invention is suitable for the technical field of intelligent televisions, and provides a remote control key response method and a remote control key response device of an intelligent television, wherein the method comprises the following steps: detecting a key value of a key clicked by a user; acquiring foreground application of the current smart television operating system; judging whether the key value is shielded by the foreground application; if the key value is shielded by the foreground application, stopping executing the action of reporting the key value to the operating system application layer; and if the key value is not shielded by the foreground application, reporting the key value to the application layer of the operating system so that the foreground application responds to the key. In the invention, the key value is compared with the key value which needs to be shielded by the current foreground application to determine whether to report the key value to the foreground application for responding, so that the application does not need to respond to the key which does not need to be used, the running stability of the application and the operating system is improved, and the operating efficiency of the smart television is improved.

Description

Remote control key response method and device for smart television
Technical Field
The invention belongs to the technical field of smart televisions, and particularly relates to a remote control key response method and device of a smart television.
Background
With the advent of smart televisions, remote controllers matched with smart televisions also have great changes compared with traditional television remote controllers, keys on the remote controllers are more and more, besides a direction key, a volume key, a channel change key, a power key and the like on the traditional television remote controllers, a series of function keys such as a main page key, an information window key, a history key, a voice key, a play control key, a guide key, a setting key and the like are added, and the remote controllers are used for operating various kinds of rich applications built in the smart televisions.
However, not every application in the smart television may use all the keys, and when a certain application runs or under a certain running scene of a certain application, a response is made to a key that is not used in the remote controller, which may cause a software exception to occur to the application, or even terminate the software exception, resulting in instability of the application and even the entire smart television operating system.
Disclosure of Invention
The embodiment of the invention aims to provide a remote control key response method and device for an intelligent television, and aims to solve the problem that the prior art can cause unstable operation of an application and an intelligent television operating system in the intelligent television.
The embodiment of the invention is realized in such a way that a remote control key response method of an intelligent television comprises the following steps:
detecting a key value of a key clicked by a user;
acquiring foreground application of the current smart television operating system;
judging whether the key value is shielded by the foreground application;
if the key value is shielded by the foreground application, stopping executing the action of reporting the key value to the operating system application layer;
and if the key value is not shielded by the foreground application, reporting the key value to the application layer of the operating system so that the foreground application responds to the key.
Another object of an embodiment of the present invention is to provide a remote control key response apparatus for a smart television, including:
the detection unit is used for detecting key values of keys clicked by a user;
the acquisition unit is used for acquiring foreground application of the current smart television operating system;
the judging unit is used for judging whether the key value is shielded by the foreground application;
a stopping unit, configured to stop executing an action of reporting the key value to the operating system application layer if the key value is shielded by the foreground application;
and a reporting unit, configured to report the key value to the operating system application layer if the key value is not shielded by the foreground application, so that the foreground application responds to the key.
In the embodiment of the invention, before the detected key value of the remote controller key is distributed to the application layer, the key value is compared with the key value which needs to be shielded by the current foreground application to determine whether to report the key value to the foreground application for responding, so that the application does not need to respond to the key which does not need to be used, the stability of application operation and operation system operation is improved, and the operation efficiency of the intelligent television is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating an implementation of a remote key response method of a smart television according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a remote control key response of a smart television according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating an implementation of a remote key response method of a smart television according to another embodiment of the present invention;
fig. 4 is a flowchart illustrating an implementation of a remote key response method of a smart television according to still another embodiment of the present invention;
fig. 5 is a block diagram of a remote control key response apparatus of a smart television according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 shows an implementation flow of a remote control key response method of a smart television according to an embodiment of the present invention, which is detailed as follows:
in S101, a key value of a key clicked by a user is detected.
In this embodiment, the keys are keys on a remote controller that is configured for the smart television, in most cases, the keys are physical keys on the remote controller, and meanwhile, in the case that the remote controller has a touch input function, the keys may also refer to virtual keys or gestures that are input through touch operations on the remote controller, and the specific key form is not limited herein.
When a user clicks a key on the remote controller, a key value corresponding to the key is obtained according to electric information generated when the key is pressed.
In S102, a foreground application of the current smart television operating system is obtained.
Because the application currently running in the foreground of the operating system needs to respond to the key clicked by the user, in S102, the foreground application of the current smart television operating system is obtained for further determining whether the foreground application needs to respond to the key clicked by the user.
Taking the Android operating system as an example, in the Android system, each running application is stored in an application stack (application stack), and an application displayed at the forefront (namely, a foreground application) is placed at the top of the application stack, and each time a new application is started or a background application is activated to the foreground for running, the previous foreground application is pressed into the stack, so that in S102, the application stack of the operating system is accessed first, the first application at the top of the application stack is found, and the first application is determined as the foreground application of the current operating system; further, a first application page of the foreground application may also be accessed to further determine a current application context of the foreground application.
In S103, it is determined whether the key value is masked by the foreground application.
In this embodiment, it may be determined whether the foreground application is recorded in the key-value mask list by reading the key-value mask list pre-stored by the operating system, and if the foreground application is recorded in the key-value mask list, it is further determined whether the key value is masked by the foreground application according to the key-value mask list. The specific determination process will be described in detail in the following embodiments, and will not be described herein again.
In S104, if the key value is masked by the foreground application, the operation of reporting the key value to the application layer of the operating system is stopped.
In S105, if the key value is not shielded by the foreground application, the key value is reported to the operating system application layer, so that the foreground application responds to the key.
Based on the determination result of S103, if it is determined that the key value of the key pressed by the user is masked by the foreground application, the operation of reporting the key value to the application layer of the operating system is stopped. Taking the Android system as an example, as shown in fig. 2, key value detection occurs in a Kernel layer of the Android system, the Kernel layer reports the detected key value to a framework layer of the Android system, and the step of determining S103 is performed in the framework layer, and for a determination result that the key value is shielded by a foreground application, the detected key value stays in the framework layer and cannot be reported to an application layer any more, so that the foreground application cannot receive the key value and naturally cannot respond to the key value, thereby completing shielding of the key; as for the result of determining that the key value is not masked by the foreground application, as shown in fig. 2, the key value is reported to the application layer, and the foreground application receives the key value and responds to the key value according to the program setting.
Further, as an embodiment of the present invention, if the key value is masked by the foreground application, while stopping the action of reporting the key value to the application layer of the operating system, the method may also pop up a prompt message that the foreground application does not support the key, where the content of the prompt message may be set by the application itself and described in a description field of an application configuration file, so as to feed back the message that the key is masked by the application to the user in time, thereby preventing the user from making repeated meaningless operations, and improving the operating efficiency of the smart television.
In this embodiment, before the detected key value of the remote control key is distributed to the application layer, the key value is compared with the key value which needs to be shielded by the current foreground application, so that whether the key value is reported to the foreground application for responding is determined, the application does not need to respond to the key which does not need to be used, the running stability of the application and the running stability of the operating system are improved, and the operating efficiency of the smart television is improved.
Next, the determination process of S103 will be explained in detail by a specific example:
as another embodiment of the present invention, as shown in fig. 3, before the steps shown in fig. 1 are executed, the creation of the key-value mask list is completed in the operating system:
s301, key value shielding information of each application installed in the operating system is respectively extracted, and the key value shielding information is used for explaining a key value which is required to be shielded and corresponds to the application.
In this embodiment, in the development process of an application, corresponding key value mask information needs to be written in a configuration file of the application. Taking an application of an Android system as an example, key value information which needs to be shielded by the application needs to be written in an Android manifest.
Figure BDA0000759436690000051
Figure BDA0000759436690000061
The above codes are used to indicate that under the "channel search" application scenario of the "TV" application, the keys with mask keys being HOME, SOURCE and setup are used.
S302, a key value shielding list is created according to the extracted key value shielding information, and the key value shielding list records the application shielding the key value corresponding to each key value.
In the process of analyzing and installing the application by the operating system, the key value shielding information can be extracted by the operating system and stored in a key value shielding list in an inductive way. The created key value mask list may be as shown in table 1, and in the key value mask list, application page names and key values of masked keys corresponding to different application scenes of different applications are recorded.
TABLE 1
Figure BDA0000759436690000062
S303, detecting the key value of the key clicked by the user.
S304, acquiring the foreground application of the current intelligent television operating system.
Accordingly, S103 of fig. 1 can be implemented by the following S305 to S307:
s305, judging whether the foreground application is in the key value shielding list.
S306, if the foreground application is in the key value shielding list, judging whether the key value is shielded by the foreground application.
S307, if the key value is shielded by the foreground application, stopping executing the action of reporting the key value to the operating system application layer.
In S308, if the key value is not shielded by the foreground application, the key value is reported to the operating system application layer, so that the foreground application responds to the key.
The following examples in conjunction with Table 1 further illustrate S303-307:
if the fact that the 3D key on the remote controller is pressed is detected, and the foreground application of the current smart television operating system is obtained as a main interface at the moment, judging whether the main interface application is located in the table 1 or not through the history table 1; if the primary interface application is located in table 1, the key values corresponding to the shielding are read as the "source key" and the "3D key" through the key name "primary interface" in table 1, so that it is determined that the key value of the pressed 3D key is shielded by the primary interface application, and the action of reporting the key value to the operating system application layer is stopped.
The embodiment shown in fig. 3 is suitable for a situation where the whole application completely shields a certain key, and further, since different application scenes may be in different application scenes in the process of running one application, for example, the main interface application may be in the application scene of the main interface, or may be in the scene of the pop-up application menu of the main interface, and shielding requirements of the different application scenes on the key are different, as shown in fig. 4, an implementation flow of the remote control key response method for the smart television provided for another embodiment of the present invention may further determine whether the key value of the key pressed by the user is shielded by the current application scene of the foreground application:
in S401, key value mask information of each application installed in the operating system is respectively extracted, where the key value mask information is used to describe a key value to be masked corresponding to each application scenario in the application.
In S402, a key-value shielding list is created according to the extracted key-value shielding information, where the key-value shielding list records an application and an application scenario thereof for shielding each key value corresponding to the key value.
In S403, a key value of a key clicked by the user is detected.
In S404, a foreground application of the current smart television operating system is obtained.
In S405, a current application scene of the foreground application is acquired;
in S406, it is determined whether the current application scene of the foreground application is located in the key value mask list.
In S407, if the current application scene of the foreground application is located in the key-value shielding list, determining whether the key value is shielded by the current application scene of the foreground application;
in S408, if the key value is masked by the current application scenario of the foreground application, the operation of reporting the key value to the application layer of the operating system is stopped.
In S409, if the key value is not masked by the current application scenario of the foreground application, the key value is reported to the operating system application layer, so that the foreground application responds to the key.
The following examples in conjunction with Table 1 further illustrate S403-408:
if it is detected that a 3D key on a remote controller is pressed, and it is acquired that a foreground application of a current smart television operating system is a TV application at the moment, and it is further acquired that the current TV application is under a channel searching application scene, first judging whether the channel searching application scene of the TV application is in table 1 through a history table 1; if the channel searching application scene of the TV application is located in table 1, the key values "home key", "source key" and "3D key" which are correspondingly shielded are read through the key name "TV" and the key name "channel searching" in table 1, so that it is determined that the key value of the pressed 3D key is shielded by the channel searching application scene of the TV application, and the action of reporting the key value to the operating system application layer is stopped.
Compared with the embodiment shown in fig. 3, the embodiment shown in fig. 4 adds a step of acquiring the current application scene of the foreground application, and further determines whether the current application scene of the foreground application shields the key value of the key pressed by the user, so that the application is divided into more detailed key scenes.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Corresponding to the method for responding to the remote control key of the smart television in the foregoing embodiment, fig. 5 shows a block diagram of a remote control key responding apparatus of the smart television according to an embodiment of the present invention, where the remote control key responding apparatus of the smart television may be a software unit, a hardware unit or a combination of software and hardware unit that is built in an application system of the smart television or the smart television. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 5, the apparatus includes:
a detection unit 51 that detects a key value of a key clicked by a user;
the obtaining unit 52 is configured to obtain a foreground application of the current smart television operating system;
a judging unit 53, which judges whether the key value is shielded by the foreground application;
a stopping unit 54, configured to stop executing the action of reporting the key value to the application layer of the operating system if the key value is shielded by the foreground application;
a reporting unit 55, configured to report the key value to the operating system application layer if the key value is not shielded by the foreground application, so that the foreground application responds to the key.
On the basis of the apparatus shown in the embodiment of fig. 5, optionally, the apparatus further includes:
the first extraction unit is used for respectively extracting key value shielding information of each application installed in the operating system, wherein the key value shielding information is used for explaining a key value which is required to be shielded and corresponds to the application;
the first creating unit is used for creating a key value shielding list according to the extracted key value shielding information, and the key value shielding list records the application which shields the key value and corresponds to each key value;
the judgment unit 53 includes:
the first judgment subunit judges whether the foreground application is positioned in the key value shielding list or not;
and a second judging subunit, configured to judge whether the key value is masked by the foreground application if the foreground application is in the key value masking list.
On the basis of the apparatus shown in the embodiment of fig. 5, optionally, the apparatus further includes:
the second extraction unit is used for respectively extracting key value shielding information of each application installed in the operating system, wherein the key value shielding information is used for explaining a key value to be shielded corresponding to each application scene under the application;
the second creating unit is used for creating a key value shielding list according to the extracted key value shielding information, and the key value shielding list records the application and the application scene of shielding the key value corresponding to each key value;
the judgment unit 53 includes:
a third judging subunit, configured to judge whether the current application scene of the foreground application is located in the key value mask list;
a fourth determining subunit, configured to determine whether the key value is masked by the current application scene of the foreground application if the current application scene of the foreground application is located in the key value masking list.
On the basis of the apparatus shown in the embodiment of fig. 5, optionally, the apparatus further includes:
and the pop-up unit pops up the prompt message that the foreground application does not support the key.
On the basis of the apparatus shown in the embodiment of fig. 5, optionally, the obtaining unit 52 includes:
an access subunit accessing an application stack of the operating system;
a first determining subunit that determines a first application on the top of the application stack as the foreground application;
and the second determining subunit determines the first application page of the first application at the top of the application program stack as the current application scene of the foreground application.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present invention may be implemented in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A remote control key response method of an intelligent television is characterized by comprising the following steps:
detecting a key value of a key clicked by a user;
acquiring foreground application of the current smart television operating system;
judging whether the key value is shielded by the foreground application;
if the key value is shielded by the foreground application, stopping executing the action of reporting the key value to the operating system application layer;
if the key value is not shielded by the foreground application, reporting the key value to the operating system application layer so that the foreground application responds to the key;
before detecting a key value of a key clicked by a user, the method further comprises:
respectively extracting key value shielding information of each application installed in the operating system; the key value shielding information is written into a configuration file of each application in the development process of each application.
2. The method of claim 1, wherein prior to the detecting the key value of the key clicked by the user, the method further comprises:
key value shielding information of each application installed in the operating system is respectively extracted, wherein the key value shielding information is used for explaining a key value which is required to be shielded and corresponds to the application;
creating a key value shielding list according to the extracted key value shielding information, wherein the key value shielding list records the application of shielding the key value corresponding to each key value;
the determining whether the key value is masked by the foreground application includes:
judging whether the foreground application is located in the key value shielding list or not;
and if the foreground application is positioned in the key value shielding list, judging whether the key value is shielded by the foreground application.
3. The method of claim 1, wherein prior to the detecting the key value of the key clicked by the user, the method further comprises:
key value shielding information of each application installed in the operating system is respectively extracted, wherein the key value shielding information is used for explaining a key value to be shielded corresponding to each application scene under the application;
creating a key value shielding list according to the extracted key value shielding information, wherein the key value shielding list records the application and the application scene of each key value for shielding the key value;
the determining whether the key value is masked by the foreground application includes:
acquiring a current application scene of the foreground application;
judging whether the current application scene of the foreground application is located in the key value shielding list or not;
if the current application scene of the foreground application is located in the key value shielding list, judging whether the key value is shielded by the current application scene of the foreground application.
4. The method of claim 1, wherein if the key value is masked by the foreground application, the method further comprises:
and popping up prompt information that the foreground application does not support the key.
5. The method of claim 1, wherein the obtaining the current foreground application of the smart television operating system comprises:
accessing an application stack of the operating system;
determining a first application at the top of the application stack as the foreground application;
and determining a first application page of a first application at the top of the application program stack as a current application scene of the foreground application.
6. A remote control key response device of an intelligent television is characterized by comprising:
the detection unit is used for detecting key values of keys clicked by a user;
the acquisition unit is used for acquiring foreground application of the current smart television operating system;
the judging unit is used for judging whether the key value is shielded by the foreground application;
a stopping unit, configured to stop executing an action of reporting the key value to the operating system application layer if the key value is shielded by the foreground application;
a reporting unit, configured to report the key value to the operating system application layer if the key value is not masked by the foreground application, so that the foreground application responds to the key;
the first extraction unit or the second extraction unit is used for respectively extracting the key value shielding information of each application installed in the operating system, wherein the key value shielding information is written into a configuration file of each application in the development process of each application.
7. The apparatus of claim 6, wherein the apparatus further comprises:
a first extracting unit, configured to respectively extract key value mask information of each application installed in the operating system, where the key value mask information is used to describe a key value to be masked corresponding to the application;
a first creating unit, configured to create a key-value shielding list according to the extracted key-value shielding information, where the key-value shielding list records an application, corresponding to each key value, that shields the key value;
the judging unit includes:
the first judging subunit is configured to judge whether the foreground application is located in the key value shielding list;
a second determining subunit, configured to determine whether the key value is masked by the foreground application if the foreground application is located in the key value masking list.
8. The apparatus of claim 6, wherein the apparatus further comprises:
a second extracting unit, configured to respectively extract key value mask information of each application installed in the operating system, where the key value mask information is used to describe a key value to be masked corresponding to each application scenario in the application;
the second creating unit is used for creating a key value shielding list according to the extracted key value shielding information, and the key value shielding list records the application and the application scene of shielding the key value corresponding to each key value;
the judging unit includes:
the obtaining subunit is configured to obtain a current application scene of the foreground application;
a third judging subunit, configured to judge whether a current application scene of the foreground application is located in the key value mask list;
a fourth determining subunit, configured to determine whether the key value is masked by the current application scene of the foreground application if the current application scene of the foreground application is located in the key value masking list.
9. The apparatus of claim 6, wherein the apparatus further comprises:
and the popup unit is used for popping out prompt information that the foreground application does not support the key.
10. The apparatus of claim 6, wherein the obtaining unit comprises:
an access subunit for accessing an application stack of the operating system;
a first determining subunit, configured to determine a first application on the top of the application stack as the foreground application;
a second determining subunit, configured to determine a first application page of a first application on the top of the application stack as a current application scenario of the foreground application.
CN201510412635.7A 2015-07-14 2015-07-14 Remote control key response method and device for smart television Active CN106341731B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510412635.7A CN106341731B (en) 2015-07-14 2015-07-14 Remote control key response method and device for smart television

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510412635.7A CN106341731B (en) 2015-07-14 2015-07-14 Remote control key response method and device for smart television

Publications (2)

Publication Number Publication Date
CN106341731A CN106341731A (en) 2017-01-18
CN106341731B true CN106341731B (en) 2020-01-03

Family

ID=57826385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510412635.7A Active CN106341731B (en) 2015-07-14 2015-07-14 Remote control key response method and device for smart television

Country Status (1)

Country Link
CN (1) CN106341731B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135423A (en) * 2017-05-04 2017-09-05 山东浪潮商用系统有限公司 The method and device of application program in a kind of startup set top box
CN109246457B (en) * 2018-08-10 2021-08-24 深圳Tcl数字技术有限公司 Key processing method, device, equipment and readable storage medium
CN109979180B (en) * 2019-03-25 2021-12-10 深圳创维数字技术有限公司 Remote controller key multiplexing method and device, storage medium and remote controller
CN112019903B (en) * 2020-08-27 2023-01-20 深圳创维-Rgb电子有限公司 Television remote control key response method and device
CN113533953A (en) * 2021-07-09 2021-10-22 深圳创维-Rgb电子有限公司 Key control board automatic detection method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009765A (en) * 2006-12-29 2007-08-01 深圳创维-Rgb电子有限公司 A setting method and system of the function key state of remote controller
CN101771894A (en) * 2008-12-31 2010-07-07 深圳市同洲电子股份有限公司 Testing system and method for recording track of remote controller and digital television receiving terminal
CN102215432A (en) * 2011-06-02 2011-10-12 Tcl集团股份有限公司 Television system, television system starting method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009765A (en) * 2006-12-29 2007-08-01 深圳创维-Rgb电子有限公司 A setting method and system of the function key state of remote controller
CN101771894A (en) * 2008-12-31 2010-07-07 深圳市同洲电子股份有限公司 Testing system and method for recording track of remote controller and digital television receiving terminal
CN102215432A (en) * 2011-06-02 2011-10-12 Tcl集团股份有限公司 Television system, television system starting method and device

Also Published As

Publication number Publication date
CN106341731A (en) 2017-01-18

Similar Documents

Publication Publication Date Title
CN106341731B (en) Remote control key response method and device for smart television
US10554805B2 (en) Information processing method, terminal, and computer-readable storage medium
US10838838B2 (en) Method and apparatus for dealing with abnormality of application program and storage medium
CN104866770B (en) Sensitive data scanning method and system
US9513784B2 (en) Method and device of controlling input for input boxes
CN102857629A (en) Calling-out method of mobile phone desktop search box
US11436188B2 (en) Resource optimization and update method, server, and device
WO2017156983A1 (en) List callup method and device
CN104778031A (en) Method and device for closing processes
CN105335045A (en) Desktop icon change method and system
US8416345B2 (en) Host computer with TV module and subtitle displaying method
US20170046044A1 (en) Display control method and electronic device
CN108460259B (en) Information processing method and device and terminal
CN106227483B (en) Display control method and mobile terminal
CN105354138A (en) Method for determining specific control attribute of mobile phone page
CN104537005A (en) Data processing method and device for webpage crawling
CN106789973B (en) Page security detection method and terminal equipment
CN104808975A (en) Filter realizing method and device of camera application
CN111338628A (en) Component rendering method and device
CN106155870B (en) Terminal optimization processing method and device and terminal
CN110351432A (en) Communicate the display methods and mobile terminal of card information
EP3108400B1 (en) Virus signature matching method and apparatus
CN105824631A (en) Control method of application program and terminal
CN105657564B (en) The method for processing video frequency and processing system for video of browser
CN103631872A (en) Method for playing multimedia files and electronic terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant