CN1075221A - The detection method of keyboard monolithic computer ghost key and the arrangement method of special function keys - Google Patents
The detection method of keyboard monolithic computer ghost key and the arrangement method of special function keys Download PDFInfo
- Publication number
- CN1075221A CN1075221A CN 92105201 CN92105201A CN1075221A CN 1075221 A CN1075221 A CN 1075221A CN 92105201 CN92105201 CN 92105201 CN 92105201 A CN92105201 A CN 92105201A CN 1075221 A CN1075221 A CN 1075221A
- Authority
- CN
- China
- Prior art keywords
- key
- ghost
- terrible
- row
- working storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M11/00—Coding in connection with keyboards or like devices, i.e. coding of the position of operated keys
- H03M11/003—Phantom keys detection and prevention
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The invention provides the detection method of a kind of keyboard single-chip micro computer ghost key (GHOST) and the arrangement method of special function keys, it relates to uses special software processing mode, make it possible to find out apace the generation of terrible key (GHOST), and save the design tactics and the special keys unique arrangement method of program storage capacity.
Description
The invention provides a kind of keyboard single-chip micro computer, the detection method of ghost key (GHOST) and the arrangement method of special function keys, it relates to uses special software processing mode, make it possible to find out apace the generation of terrible key (GHOST), and save the design tactics and the special keys unique arrangement method of program storage capacity.
Present each key of all keyboard scans, all be to come each key of layout in the mode of matrix, and this arranged mode is pressed three above buttons at the same time, and when three keys occur in as the relative position of well word again, the situation that has so-called terrible key (GHOST) immediately occurs, as Fig. 1, and present technology addresses this is that dual mode is generally arranged.
One, on each key, adds a diode (as Fig. 2), so just, can remove because press three keys simultaneously, and each key that makes well word relevant position is responded to simultaneously and produce terrible key (GHOST), but this processing mode, all to add a diode on each key, material and processing cost will improve a lot, be eliminated gradually.
Two, utilize the processing mode of single-chip micro computer to judge whether that three keys are pressed simultaneously, if having the triple bond and terrible key (GHOST) screening that then will take place at last to smear, technical method is disclosed in down altogether:
1.US PAT NO:4420744 number
The method of its use is, selects two row in matrix, and key is pressed relatively to judge whether to show in two row each not, repeats each row of comparison, up to each combination mistake relatively all.
2. Taiwan PAT NO:77103440 number (Hongji Computer Co., Ltd)
The method of its use is: cross determination methods, promptly with each standard of behaviour, when judgement has two keys to be pressed, then may there's something fishy key (GHOST) take place, judge that more same listing has or not key to be pressed, then send bleep if having, after the state for the treatment of is removed, carry out new scanning more again.
First kind of mode: be terrible key (GHOST) tupe of a standard, but too many because of wherein judging, so institute is time-consuming oversize, if sweep trace a lot (being that bond number is too many) then has the anxiety of erroneous judgement, so extensively be not used.
The second way: comparatively save time, but judgment mode is different with the normal scan Program path, so waste program storage, general whose type keyboard of mark must have AT/XT, the function that PS2 is compatible, and each key three groups of different sign indicating numbers should be arranged is SET1, SET2, SET3, the 3rd group of (SET3) each key can be set separately again, and the keyboard of grand base, having partial function to omit, promptly is the not enough reason of program storage with 2KROM, and the also possibility of more nonelastic variation of this mode, (, two words only can occur) in the well block.
Therefore, the purpose of this invention is to provide a kind of fast, can save the situation that program storage has method that elasticity the changes key (GHOST) that detects whether there's something fishy in the signal that scrambler produces again concurrently, it can make right judgement in the short time, send serge serge sign indicating number, can continue to scan other key again, and if on the part key, added diode, can promote again function to simultaneously by three keys in territory, well block and there is not an ability of terrible key (GHOST) appearance.(three words can occur).
Just diagram detailed description function of the present invention and structure are as follows:
Fig. 1 is the pattern that general keyboard ghost key takes place,
Fig. 2 eliminates the keyboard hardware wiring diagram of terrible key for having keyboard now,
Fig. 3 is the hardware circuit figure of single-chip micro computer of the present invention,
Fig. 4 is the arrangement of special function keys of the present invention,
Fig. 5 is a single-chip micro computer keyboard software process flow diagram of the present invention (),
Fig. 6 is a single-chip micro computer keyboard software process flow diagram of the present invention (two),
Fig. 7 is a single-chip micro computer keyboard software process flow diagram of the present invention (three),
Fig. 8 is a single-chip micro computer keyboard software process flow diagram of the present invention (four),
Fig. 9 is a single-chip micro computer keyboard software process flow diagram of the present invention (five),
Figure 10 is a single-chip micro computer keyboard software process flow diagram of the present invention (six),
Figure 11 is a single-chip micro computer keyboard software process flow diagram of the present invention (seven),
Figure 12 is a single-chip micro computer keyboard software process flow diagram of the present invention (eight),
Figure 13 is a single-chip micro computer keyboard software process flow diagram of the present invention (nine).
See also Fig. 3, under normal condition, when promptly not having button, every row all are in high level state because of being connected to a lifting resistance on the circuit, as shown in Figure 3.Every sweep trace then allows in regular turn low level state, scanning in regular turn, and the cycle of scanning be decided to be every 4ms and sweep 8 lines, promptly 8 ms can scan and finish 16 lines, every row has 8 keys, and 16 (row) can form 128 keys (8 * 16=128 key), so a scan period is 8ms.
When key is pressed, read in capable state and will be " 0 ", all the other are " 1 ", and whenever show 8 keys, i.e. 8 bits, if have only a key to be pressed, then all be considered as not having the situation of terrible key (GHOST), withdraw from determining program, continue to carry out other program, if when the above situations generation of two keys is arranged, immediately current state is stored in the working storage, utilize original scanning subroutine, rescan each row, and do the logical processing with the data that are stored in the working storage, if judgment data is when having situation more than a key (promptly have two bits for " 1 ") again, then be considered as terrible key (GHOST), finish the back until each row of scanning and then do not withdraw from determining program, continue to carry out if all there is the situation that two keys are depressed.
If there is the key more than two to be pressed, during the situation of (promptly have more than two bit for " 1 "), then be called terrible key (GHOST), stop to repeat out the function of word immediately, the timer of setting-500ms, send serge serge sign indicating number (using original word timer work that repeats out) every 500ms, and continue scanning, if when the user presses other other key again, if not in the zone of well word, still send font, after the situation for the treatment of terrible key (GHOST) is removed, again will be with normal scanning flow process action.
The present invention has a special advantage in addition, when even using the less single-chip micro computer in I/O pin position to design keyboard, as long as use 14 sweep traces, can reach the effect of avoiding terrible key (GHOST), uses 14 sweep traces, can be controlled to 112 keys.
(being YO-YD) as shown in Figure 4, and general known technology will be avoided terrible key (GHOST), just must 16 sweep traces of use, but the present invention also can be used in 16 sweep trace work.CTRL(L shown in Fig. 4), CTRL(R), SHIFT(R), ALT(R), ALT(L) waiting 6 keys is special function keys, and according to the definition of keyboard, any two keys and other any one key are combined, all must not there's something fishy the generation of key (GHOST).And present technology uses 13 or 14 sweep traces all can't meet this requirement, reach just to use 16 sweep traces could not! Yet utilization the present invention clearly can reach requirement easily.
Fig. 5 to Figure 13 is the software flow pattern of keyboard of the present invention, is described as follows:
Fig. 5: judge which kind of pattern main frame is, and judge whether keyboard is forbidden, judge that impact damper has no datat during as permission, have data then to send sign indicating number, no datat is then carried out keyboard scan.
Fig. 6: system issues orders to keyboard, and judges the order pattern, determines each command job of back execution.
Fig. 7: keyboard scan is also set mark, after each key situation of judgement keyboard also compares, carries out jumping key handling procedure or execution and repeats out word processor.
Fig. 8: carry out to jump the key handling procedure and judge and have or not terrible key, key then judges heavily covers the word situation as there's something fishy, and cancellation repeats out word function setting 500ms bleep timer if having then, if no terrible key is then carried out female key subroutine, and the searching key.
Fig. 9: the determining program of terrible key, earlier current state is deposited in the working storage, cancellation main sweep mark, the scanning index refers to next line, then calls the scanning subroutine again, relatively the state of new state and working storage.
Figure 10: judge whether to be mode 3, judge whether in this way to send and remove sign indicating number,, call special keys in this way and handle subroutine as not judging whether to be special keys.
Figure 11: judge each key situation,,, then set and repeat out word mark as repeating out word as then calling the special keys handling procedure for special keys.
Figure 12: send key, then call the networking subroutine if any connecting the networking, then do not call the numeral program of sending as having, the coding mode that send that goes automatically to be judged as which kind of system is also carried out.
Figure 13: set female key and mark of correlation, judge whether female key and sub-key are pressed, and carry out the function of Macintosh.
By above disclosing, the work flow of program is used common former scanning pattern more as can be seen, so can save many program memory space; It uses a special working storage and a logical to handle again, the row judgement has or not two above keys to retain again, judge terrible key (GHOST), so according to " with " definition 0+0=0,0+1=0,1+0=0, so 1+1=1 is when only having four keys to exist simultaneously when judging, ghost key (GHOST) just can occur, so in the zone of matrix specific (special) requirements as shown in Figure 4, can add diode in territory, well block, pressing 3 keys continuously, also unlikely there's something fishy that key (GHOST) occurs, this is that prior art is beyond one's reach, the unique analog timer that uses of the present invention is controlled do the timing that bleep is sent in addition, makes keyboard when the terrible key of chance (GHOST) beeps, can remake the work of scanning again, the user can send font work normally if press other key again, and this also is to be beyond one's reach in the known technology.
In conjunction with the above, the method disclosed in the present can positively reach purpose of the present invention, and its application technology and known technology also have evident difference, and that advantage of the present invention also exceeds than known technology is a lot of, is one to possess initiative new invention.
Claims (2)
1, the detection method of a kind of keyboard single-chip micro computer ghost key (GHOST) and the arrangement method of special function keys is characterized in that comprising step:
At the beginning of the scanning, every row all connect high level through resistance, and every thereafter row in the mode of 8 of 4ms scannings, scans successively successively, and scanning result is stored in the working storage;
When having detected key and be pressed down, judge the state of working storage, be considered as not having terrible key if having only a bit to be zero, continue to carry out next action, to improve judging efficiency;
If when working storage is zero more than two bits, then utilize former scanning subroutine, rescan each row, and do with working storage " with " (AND) handle, judge the data of working storage inside again, be zero if having only a bit, then continue this action, all judge up to other row and finish;
Be terrible key if there is on two above bit be zero, scan former row again and do with working storage " with " (AND) handle, be zero if still have two above bits, then really be that terrible key occurs, if there is not then normally execution;
During there's something fishy key, stop to repeat out the function of word immediately,, sending serge serge sign indicating number, and after continuing scanning and treating that terrible key situation is eliminated, then normally carry out with former timer settings 500ms timing.
2, the method for claim 1, be characterised in that: it the zone of terrible key can not occur in particular requirement, adds diode, through the flow process of aforementioned software, can eliminate local terrible key, can accomplish that then only the sweep trace more than 13 or 14 can reach the purpose that particular key does not have terrible key generation.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US832,382 | 1977-09-12 | ||
US83238292A | 1992-02-07 | 1992-02-07 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1075221A true CN1075221A (en) | 1993-08-11 |
CN1030943C CN1030943C (en) | 1996-02-07 |
Family
ID=25261485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 92105201 Expired - Lifetime CN1030943C (en) | 1992-02-07 | 1992-06-25 | Detection method for GHOST of keyboard single chip microcomputer and arrangement method of special function key |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1030943C (en) |
GB (1) | GB2263990B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1075645C (en) * | 1996-08-28 | 2001-11-28 | 旭丽股份有限公司 | Method for extending functional key in keyboard |
CN101257309B (en) * | 2007-03-01 | 2011-11-30 | 达方电子股份有限公司 | Input device and control method |
CN101686060B (en) * | 2008-09-25 | 2013-06-19 | 旭丽电子(广州)有限公司 | Control circuit and configuration method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8159372B2 (en) | 2007-10-16 | 2012-04-17 | Microsoft Corporation | Keyboard with plural key switch matrices to detect ghosting |
-
1992
- 1992-06-25 CN CN 92105201 patent/CN1030943C/en not_active Expired - Lifetime
-
1993
- 1993-01-20 GB GB9301046A patent/GB2263990B/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1075645C (en) * | 1996-08-28 | 2001-11-28 | 旭丽股份有限公司 | Method for extending functional key in keyboard |
CN101257309B (en) * | 2007-03-01 | 2011-11-30 | 达方电子股份有限公司 | Input device and control method |
CN101686060B (en) * | 2008-09-25 | 2013-06-19 | 旭丽电子(广州)有限公司 | Control circuit and configuration method |
Also Published As
Publication number | Publication date |
---|---|
GB2263990B (en) | 1995-05-03 |
GB9301046D0 (en) | 1993-03-10 |
CN1030943C (en) | 1996-02-07 |
GB2263990A (en) | 1993-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0072471B1 (en) | Keyboard unit control system | |
CN1732509A (en) | Method and system for providing a disambiguated keypad | |
EP0077658A3 (en) | Keyboard scanning and interface method and circuit | |
CN1030943C (en) | Detection method for GHOST of keyboard single chip microcomputer and arrangement method of special function key | |
CN1286419A (en) | Method for processing multiple keys in key input apparatus | |
CN2669264Y (en) | Keyboard scanning circuit | |
CA2006230A1 (en) | Method and apparatus for validating character strings | |
GB2263991A (en) | Computer keyboard | |
CN1335549A (en) | Intuitive nine-check option input method for intelligent terminal | |
CN1285660A (en) | Multi-contact switch and portable data terminal using same | |
US6642858B1 (en) | Apparatus for inputting opening and closing parentheses simultaneously by single keystroke and method for the same | |
CN206863547U (en) | A kind of button scan round circuit | |
CN1517860A (en) | System and method of self-defined keyboard functional key execuable by computer | |
CN1434361A (en) | Data processor | |
CN1289996C (en) | Software type keyboard input converting method | |
CN1222860C (en) | Character input method and system suitable for multiple input methods | |
CN1501237A (en) | Computer instantaneous starting system and method | |
CN2390234Y (en) | Programmable keyboard | |
CN2209352Y (en) | Chinese-English computer learning machine keyboard | |
CN1369762A (en) | Dual-purpose computer keyboard and its method for automatically detecting interface state | |
CN1082205C (en) | Method and device for simulating keyboard key on controller | |
AU609448B2 (en) | Keyboard crosspoint encoder having pseudo-n-key rollover | |
CN2643389Y (en) | Keyboard group | |
CN1087450C (en) | Method and apparatus for keyboard and diode selecting interface circuit | |
CN1258133C (en) | Keyboard control device capable of changing keyboard code promptly |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C15 | Extension of patent right duration from 15 to 20 years for appl. with date before 31.12.1992 and still valid on 11.12.2001 (patent law change 1993) | ||
OR01 | Other related matters | ||
C17 | Cessation of patent right | ||
CX01 | Expiry of patent term |
Expiration termination date: 20120626 Granted publication date: 19960207 |