CN1075221A - The detection method of keyboard monolithic computer ghost key and the arrangement method of special function keys - Google Patents

The detection method of keyboard monolithic computer ghost key and the arrangement method of special function keys Download PDF

Info

Publication number
CN1075221A
CN1075221A CN 92105201 CN92105201A CN1075221A CN 1075221 A CN1075221 A CN 1075221A CN 92105201 CN92105201 CN 92105201 CN 92105201 A CN92105201 A CN 92105201A CN 1075221 A CN1075221 A CN 1075221A
Authority
CN
China
Prior art keywords
key
ghost
terrible
row
working storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 92105201
Other languages
Chinese (zh)
Other versions
CN1030943C (en
Inventor
陈振文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Silitek Corp
Original Assignee
Silitek Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silitek Corp filed Critical Silitek Corp
Publication of CN1075221A publication Critical patent/CN1075221A/en
Application granted granted Critical
Publication of CN1030943C publication Critical patent/CN1030943C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M11/00Coding in connection with keyboards or like devices, i.e. coding of the position of operated keys
    • H03M11/003Phantom keys detection and prevention

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention provides the detection method of a kind of keyboard single-chip micro computer ghost key (GHOST) and the arrangement method of special function keys, it relates to uses special software processing mode, make it possible to find out apace the generation of terrible key (GHOST), and save the design tactics and the special keys unique arrangement method of program storage capacity.

Description

The detection method of keyboard monolithic computer ghost key and the arrangement method of special function keys
The invention provides a kind of keyboard single-chip micro computer, the detection method of ghost key (GHOST) and the arrangement method of special function keys, it relates to uses special software processing mode, make it possible to find out apace the generation of terrible key (GHOST), and save the design tactics and the special keys unique arrangement method of program storage capacity.
Present each key of all keyboard scans, all be to come each key of layout in the mode of matrix, and this arranged mode is pressed three above buttons at the same time, and when three keys occur in as the relative position of well word again, the situation that has so-called terrible key (GHOST) immediately occurs, as Fig. 1, and present technology addresses this is that dual mode is generally arranged.
One, on each key, adds a diode (as Fig. 2), so just, can remove because press three keys simultaneously, and each key that makes well word relevant position is responded to simultaneously and produce terrible key (GHOST), but this processing mode, all to add a diode on each key, material and processing cost will improve a lot, be eliminated gradually.
Two, utilize the processing mode of single-chip micro computer to judge whether that three keys are pressed simultaneously, if having the triple bond and terrible key (GHOST) screening that then will take place at last to smear, technical method is disclosed in down altogether:
1.US PAT NO:4420744 number
The method of its use is, selects two row in matrix, and key is pressed relatively to judge whether to show in two row each not, repeats each row of comparison, up to each combination mistake relatively all.
2. Taiwan PAT NO:77103440 number (Hongji Computer Co., Ltd)
The method of its use is: cross determination methods, promptly with each standard of behaviour, when judgement has two keys to be pressed, then may there's something fishy key (GHOST) take place, judge that more same listing has or not key to be pressed, then send bleep if having, after the state for the treatment of is removed, carry out new scanning more again.
First kind of mode: be terrible key (GHOST) tupe of a standard, but too many because of wherein judging, so institute is time-consuming oversize, if sweep trace a lot (being that bond number is too many) then has the anxiety of erroneous judgement, so extensively be not used.
The second way: comparatively save time, but judgment mode is different with the normal scan Program path, so waste program storage, general whose type keyboard of mark must have AT/XT, the function that PS2 is compatible, and each key three groups of different sign indicating numbers should be arranged is SET1, SET2, SET3, the 3rd group of (SET3) each key can be set separately again, and the keyboard of grand base, having partial function to omit, promptly is the not enough reason of program storage with 2KROM, and the also possibility of more nonelastic variation of this mode, (, two words only can occur) in the well block.
Therefore, the purpose of this invention is to provide a kind of fast, can save the situation that program storage has method that elasticity the changes key (GHOST) that detects whether there's something fishy in the signal that scrambler produces again concurrently, it can make right judgement in the short time, send serge serge sign indicating number, can continue to scan other key again, and if on the part key, added diode, can promote again function to simultaneously by three keys in territory, well block and there is not an ability of terrible key (GHOST) appearance.(three words can occur).
Just diagram detailed description function of the present invention and structure are as follows:
Fig. 1 is the pattern that general keyboard ghost key takes place,
Fig. 2 eliminates the keyboard hardware wiring diagram of terrible key for having keyboard now,
Fig. 3 is the hardware circuit figure of single-chip micro computer of the present invention,
Fig. 4 is the arrangement of special function keys of the present invention,
Fig. 5 is a single-chip micro computer keyboard software process flow diagram of the present invention (),
Fig. 6 is a single-chip micro computer keyboard software process flow diagram of the present invention (two),
Fig. 7 is a single-chip micro computer keyboard software process flow diagram of the present invention (three),
Fig. 8 is a single-chip micro computer keyboard software process flow diagram of the present invention (four),
Fig. 9 is a single-chip micro computer keyboard software process flow diagram of the present invention (five),
Figure 10 is a single-chip micro computer keyboard software process flow diagram of the present invention (six),
Figure 11 is a single-chip micro computer keyboard software process flow diagram of the present invention (seven),
Figure 12 is a single-chip micro computer keyboard software process flow diagram of the present invention (eight),
Figure 13 is a single-chip micro computer keyboard software process flow diagram of the present invention (nine).
See also Fig. 3, under normal condition, when promptly not having button, every row all are in high level state because of being connected to a lifting resistance on the circuit, as shown in Figure 3.Every sweep trace then allows in regular turn low level state, scanning in regular turn, and the cycle of scanning be decided to be every 4ms and sweep 8 lines, promptly 8 ms can scan and finish 16 lines, every row has 8 keys, and 16 (row) can form 128 keys (8 * 16=128 key), so a scan period is 8ms.
When key is pressed, read in capable state and will be " 0 ", all the other are " 1 ", and whenever show 8 keys, i.e. 8 bits, if have only a key to be pressed, then all be considered as not having the situation of terrible key (GHOST), withdraw from determining program, continue to carry out other program, if when the above situations generation of two keys is arranged, immediately current state is stored in the working storage, utilize original scanning subroutine, rescan each row, and do the logical processing with the data that are stored in the working storage, if judgment data is when having situation more than a key (promptly have two bits for " 1 ") again, then be considered as terrible key (GHOST), finish the back until each row of scanning and then do not withdraw from determining program, continue to carry out if all there is the situation that two keys are depressed.
If there is the key more than two to be pressed, during the situation of (promptly have more than two bit for " 1 "), then be called terrible key (GHOST), stop to repeat out the function of word immediately, the timer of setting-500ms, send serge serge sign indicating number (using original word timer work that repeats out) every 500ms, and continue scanning, if when the user presses other other key again, if not in the zone of well word, still send font, after the situation for the treatment of terrible key (GHOST) is removed, again will be with normal scanning flow process action.
The present invention has a special advantage in addition, when even using the less single-chip micro computer in I/O pin position to design keyboard, as long as use 14 sweep traces, can reach the effect of avoiding terrible key (GHOST), uses 14 sweep traces, can be controlled to 112 keys.
(being YO-YD) as shown in Figure 4, and general known technology will be avoided terrible key (GHOST), just must 16 sweep traces of use, but the present invention also can be used in 16 sweep trace work.CTRL(L shown in Fig. 4), CTRL(R), SHIFT(R), ALT(R), ALT(L) waiting 6 keys is special function keys, and according to the definition of keyboard, any two keys and other any one key are combined, all must not there's something fishy the generation of key (GHOST).And present technology uses 13 or 14 sweep traces all can't meet this requirement, reach just to use 16 sweep traces could not! Yet utilization the present invention clearly can reach requirement easily.
Fig. 5 to Figure 13 is the software flow pattern of keyboard of the present invention, is described as follows:
Fig. 5: judge which kind of pattern main frame is, and judge whether keyboard is forbidden, judge that impact damper has no datat during as permission, have data then to send sign indicating number, no datat is then carried out keyboard scan.
Fig. 6: system issues orders to keyboard, and judges the order pattern, determines each command job of back execution.
Fig. 7: keyboard scan is also set mark, after each key situation of judgement keyboard also compares, carries out jumping key handling procedure or execution and repeats out word processor.
Fig. 8: carry out to jump the key handling procedure and judge and have or not terrible key, key then judges heavily covers the word situation as there's something fishy, and cancellation repeats out word function setting 500ms bleep timer if having then, if no terrible key is then carried out female key subroutine, and the searching key.
Fig. 9: the determining program of terrible key, earlier current state is deposited in the working storage, cancellation main sweep mark, the scanning index refers to next line, then calls the scanning subroutine again, relatively the state of new state and working storage.
Figure 10: judge whether to be mode 3, judge whether in this way to send and remove sign indicating number,, call special keys in this way and handle subroutine as not judging whether to be special keys.
Figure 11: judge each key situation,,, then set and repeat out word mark as repeating out word as then calling the special keys handling procedure for special keys.
Figure 12: send key, then call the networking subroutine if any connecting the networking, then do not call the numeral program of sending as having, the coding mode that send that goes automatically to be judged as which kind of system is also carried out.
Figure 13: set female key and mark of correlation, judge whether female key and sub-key are pressed, and carry out the function of Macintosh.
By above disclosing, the work flow of program is used common former scanning pattern more as can be seen, so can save many program memory space; It uses a special working storage and a logical to handle again, the row judgement has or not two above keys to retain again, judge terrible key (GHOST), so according to " with " definition 0+0=0,0+1=0,1+0=0, so 1+1=1 is when only having four keys to exist simultaneously when judging, ghost key (GHOST) just can occur, so in the zone of matrix specific (special) requirements as shown in Figure 4, can add diode in territory, well block, pressing 3 keys continuously, also unlikely there's something fishy that key (GHOST) occurs, this is that prior art is beyond one's reach, the unique analog timer that uses of the present invention is controlled do the timing that bleep is sent in addition, makes keyboard when the terrible key of chance (GHOST) beeps, can remake the work of scanning again, the user can send font work normally if press other key again, and this also is to be beyond one's reach in the known technology.
In conjunction with the above, the method disclosed in the present can positively reach purpose of the present invention, and its application technology and known technology also have evident difference, and that advantage of the present invention also exceeds than known technology is a lot of, is one to possess initiative new invention.

Claims (2)

1, the detection method of a kind of keyboard single-chip micro computer ghost key (GHOST) and the arrangement method of special function keys is characterized in that comprising step:
At the beginning of the scanning, every row all connect high level through resistance, and every thereafter row in the mode of 8 of 4ms scannings, scans successively successively, and scanning result is stored in the working storage;
When having detected key and be pressed down, judge the state of working storage, be considered as not having terrible key if having only a bit to be zero, continue to carry out next action, to improve judging efficiency;
If when working storage is zero more than two bits, then utilize former scanning subroutine, rescan each row, and do with working storage " with " (AND) handle, judge the data of working storage inside again, be zero if having only a bit, then continue this action, all judge up to other row and finish;
Be terrible key if there is on two above bit be zero, scan former row again and do with working storage " with " (AND) handle, be zero if still have two above bits, then really be that terrible key occurs, if there is not then normally execution;
During there's something fishy key, stop to repeat out the function of word immediately,, sending serge serge sign indicating number, and after continuing scanning and treating that terrible key situation is eliminated, then normally carry out with former timer settings 500ms timing.
2, the method for claim 1, be characterised in that: it the zone of terrible key can not occur in particular requirement, adds diode, through the flow process of aforementioned software, can eliminate local terrible key, can accomplish that then only the sweep trace more than 13 or 14 can reach the purpose that particular key does not have terrible key generation.
CN 92105201 1992-02-07 1992-06-25 Detection method for GHOST of keyboard single chip microcomputer and arrangement method of special function key Expired - Lifetime CN1030943C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US832,382 1977-09-12
US83238292A 1992-02-07 1992-02-07

Publications (2)

Publication Number Publication Date
CN1075221A true CN1075221A (en) 1993-08-11
CN1030943C CN1030943C (en) 1996-02-07

Family

ID=25261485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 92105201 Expired - Lifetime CN1030943C (en) 1992-02-07 1992-06-25 Detection method for GHOST of keyboard single chip microcomputer and arrangement method of special function key

Country Status (2)

Country Link
CN (1) CN1030943C (en)
GB (1) GB2263990B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1075645C (en) * 1996-08-28 2001-11-28 旭丽股份有限公司 Method for extending functional key in keyboard
CN101257309B (en) * 2007-03-01 2011-11-30 达方电子股份有限公司 Input device and control method
CN101686060B (en) * 2008-09-25 2013-06-19 旭丽电子(广州)有限公司 Control circuit and configuration method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8159372B2 (en) 2007-10-16 2012-04-17 Microsoft Corporation Keyboard with plural key switch matrices to detect ghosting

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1075645C (en) * 1996-08-28 2001-11-28 旭丽股份有限公司 Method for extending functional key in keyboard
CN101257309B (en) * 2007-03-01 2011-11-30 达方电子股份有限公司 Input device and control method
CN101686060B (en) * 2008-09-25 2013-06-19 旭丽电子(广州)有限公司 Control circuit and configuration method

Also Published As

Publication number Publication date
GB2263990B (en) 1995-05-03
GB9301046D0 (en) 1993-03-10
CN1030943C (en) 1996-02-07
GB2263990A (en) 1993-08-11

Similar Documents

Publication Publication Date Title
EP0072471B1 (en) Keyboard unit control system
CN1732509A (en) Method and system for providing a disambiguated keypad
EP0077658A3 (en) Keyboard scanning and interface method and circuit
CN1030943C (en) Detection method for GHOST of keyboard single chip microcomputer and arrangement method of special function key
CN1286419A (en) Method for processing multiple keys in key input apparatus
CN2669264Y (en) Keyboard scanning circuit
CA2006230A1 (en) Method and apparatus for validating character strings
GB2263991A (en) Computer keyboard
CN1335549A (en) Intuitive nine-check option input method for intelligent terminal
CN1285660A (en) Multi-contact switch and portable data terminal using same
US6642858B1 (en) Apparatus for inputting opening and closing parentheses simultaneously by single keystroke and method for the same
CN206863547U (en) A kind of button scan round circuit
CN1517860A (en) System and method of self-defined keyboard functional key execuable by computer
CN1434361A (en) Data processor
CN1289996C (en) Software type keyboard input converting method
CN1222860C (en) Character input method and system suitable for multiple input methods
CN1501237A (en) Computer instantaneous starting system and method
CN2390234Y (en) Programmable keyboard
CN2209352Y (en) Chinese-English computer learning machine keyboard
CN1369762A (en) Dual-purpose computer keyboard and its method for automatically detecting interface state
CN1082205C (en) Method and device for simulating keyboard key on controller
AU609448B2 (en) Keyboard crosspoint encoder having pseudo-n-key rollover
CN2643389Y (en) Keyboard group
CN1087450C (en) Method and apparatus for keyboard and diode selecting interface circuit
CN1258133C (en) Keyboard control device capable of changing keyboard code promptly

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C15 Extension of patent right duration from 15 to 20 years for appl. with date before 31.12.1992 and still valid on 11.12.2001 (patent law change 1993)
OR01 Other related matters
C17 Cessation of patent right
CX01 Expiry of patent term

Expiration termination date: 20120626

Granted publication date: 19960207