CN110275623A - The triggering method and equipment of button value - Google Patents

The triggering method and equipment of button value Download PDF

Info

Publication number
CN110275623A
CN110275623A CN201810215617.3A CN201810215617A CN110275623A CN 110275623 A CN110275623 A CN 110275623A CN 201810215617 A CN201810215617 A CN 201810215617A CN 110275623 A CN110275623 A CN 110275623A
Authority
CN
China
Prior art keywords
key
value
key value
virtual
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810215617.3A
Other languages
Chinese (zh)
Other versions
CN110275623B (en
Inventor
南雄超
王洪虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Loongson Technology Corp Ltd
Original Assignee
Loongson Technology Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Loongson Technology Corp Ltd filed Critical Loongson Technology Corp Ltd
Priority to CN201810215617.3A priority Critical patent/CN110275623B/en
Publication of CN110275623A publication Critical patent/CN110275623A/en
Application granted granted Critical
Publication of CN110275623B publication Critical patent/CN110275623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0238Programmable keyboards

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The triggering method and equipment of button value provided by the invention, by judging whether the target key of user's triggering has virtual key according to the virtual key function for prestoring each key;In the case where the target key of user's triggering has virtual key, the virtual key of the target key is obtained, and the virtual key is sent to electronic product, so that the electronic product executes corresponding operating according to the virtual key of the target key;In the case where the target key of user's triggering does not have virtual key, the true key assignments of the target key is sent to electronic product, so that the electronic product executes corresponding operating according to the true key assignments of the key.In this way, so that the button value of keyboard is effectively extended, meet user's use demands.

Description

Triggering method and device for key values of keys
Technical Field
The present invention relates to computer technologies, and in particular, to a method and an apparatus for triggering key values of a key.
Background
The keyboard is a main device for interaction between a user and the electronic product, and the electronic product can execute functions corresponding to keys by pressing the keys on the keyboard.
In the prior art, each key of the keyboard corresponds to a real key value, generally speaking, the real key value is set by a keyboard manufacturer when the keyboard leaves a factory, and when an electronic product monitors a keyboard event and receives the real key value input by the keyboard, an operation corresponding to the real key value is executed to realize a corresponding function.
However, due to different use habits of users, the existing technical scheme of fixing the real key value by setting the keys by the keyboard manufacturer cannot meet the use requirements of the users.
Disclosure of Invention
The invention provides a method and equipment for triggering key values of keys, aiming at the problem that the key functions in the prior art cannot meet the use requirements of users.
On one hand, the triggering method of the key value of the key provided by the invention comprises the following steps:
judging whether a target key triggered by a user has a virtual key value or not according to a pre-stored virtual key value function of each key;
if so, acquiring a virtual key value of the target key according to the virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to an electronic product, so that the electronic product executes corresponding operation according to the real key value.
In an optional implementation manner, before determining whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key, the triggering method further includes:
monitoring keyboard events;
when a key pressing event is monitored, locking a current display window;
when a key bounce event is monitored, the virtual key value or the real key value of the target key is sent to an electronic product, and meanwhile, the triggering method further comprises the following steps:
and releasing the current display window.
In one optional implementation manner, the determining, according to a pre-stored virtual key value function of each key, whether a target key triggered by a user has a virtual key value includes:
acquiring a real key value of a target key triggered by a user;
judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value;
obtaining the virtual key value of the target key according to the virtual key value function of the target key, which specifically comprises:
and when the function value is not null, determining the obtained function value as the virtual key value of the target key.
In one optional implementation manner, the determining, according to a pre-stored virtual key value function of each key, whether a target key triggered by a user has a virtual key value includes:
acquiring a real key value of a target key triggered by a user;
calling a virtual key value function corresponding to the real key value to obtain a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are stored locally in advance;
obtaining the virtual key value of the target key according to the virtual key value function of the target key, which specifically comprises:
and when the function value is not null, determining the obtained function value as the virtual key value of the target key.
In one optional implementation manner, the determining, according to a pre-stored virtual key value function of each key, whether a target key triggered by a user has a virtual key value includes:
acquiring a real key value of a target key triggered by a user;
inquiring whether a virtual key value function corresponding to the real key value is prestored locally; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, the local at least prestores the virtual key value function of some keys;
obtaining the virtual key value of the target key according to the virtual key value function of the target key, which specifically comprises:
calling a virtual key value function corresponding to the real key value and obtaining a function value;
and determining the obtained function value as a virtual key value of the target key.
In an optional implementation manner, before sending the virtual key value to the electronic product, the sending includes:
establishing a virtual key value sending sub-thread;
the sending the virtual key value to an electronic product includes:
and sending the virtual key value of the target key to an electronic product through the virtual key value sending sub-thread.
In an optional implementation manner, while the virtual key value is sent to the electronic product, the triggering method further includes:
sending a real key value invalid instruction of the target key to the electronic product through the virtual key value sending sub-thread, so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, the electronic product determines to execute corresponding operation only according to the virtual key value based on the real key value invalid instruction of the target key; or,
intercepting the sending operation of the real key value through the virtual key value sending sub-thread so that the electronic product only receives the virtual key value and executes corresponding operation according to the virtual key value.
In another aspect, the present invention provides a triggering device for a key value, including:
the key value acquisition unit is used for judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key; when it is determined that a target key triggered by a user has a virtual key value, the key value obtaining unit is further configured to obtain the virtual key value of the target key according to a virtual key value function of the target key;
the communication unit is used for sending the virtual key value to an electronic product when the key value acquisition unit determines that a target key triggered by a user has the virtual key value, so that the electronic product can execute corresponding operation according to the virtual key value of the target key; and the key value obtaining unit is further configured to send a real key value of the target key to an electronic product when determining that the target key triggered by the user does not have the virtual key value, so that the electronic product executes a corresponding operation according to the real key value of the key.
In one optional embodiment, the triggering device further comprises a monitoring unit;
before the key value acquisition unit judges whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key, the monitoring unit is used for monitoring a keyboard event;
the key value acquisition unit is also used for locking and locking the current display window when the monitoring unit monitors a key pressing event, and releasing the current display window when the monitoring unit monitors a key bouncing event; the communication unit is also used for sending the virtual key value or the real key value of the target key to an electronic product when the monitoring unit monitors a key bounce event.
In an optional implementation manner, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; when the function value is not empty, determining the obtained function value as a virtual key value of the target key;
or, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; calling a virtual key value function corresponding to the real key value to obtain a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are stored locally in advance; when the function value is not empty, determining the obtained function value as a virtual key value of the target key;
or, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; inquiring whether a virtual key value function corresponding to the real key value is prestored locally; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, the local at least prestores the virtual key value function of some keys; calling a virtual key value function corresponding to the real key value and obtaining a function value; and determining the obtained function value as a virtual key value of the target key.
In an optional implementation manner, the triggering device further includes a thread establishing unit;
the thread establishing unit is used for establishing a virtual key value sending sub-thread before the communication unit sends the virtual key value of the target key to the electronic product;
and the communication unit transmits the virtual key value of the target key to an electronic product through the virtual key value transmitting sub-thread.
In an optional implementation manner, the communication unit is further configured to send a real key value invalidation instruction of the target key to the electronic product through the virtual key value sending sub-thread, so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, based on the real key value invalidation instruction of the target key, it is determined that a corresponding operation is performed only according to the virtual key value;
or, the communication unit is further configured to intercept the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and execute a corresponding operation according to the virtual key value.
In another aspect, the present invention provides a triggering device for a key value, including: a processor and a memory for storing processor-executable instructions;
wherein the processor is configured to:
judging whether a target key triggered by a user has a virtual key value or not according to a pre-stored virtual key value function of each key;
if so, acquiring a virtual key value of the target key according to the virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to an electronic product, so that the electronic product executes corresponding operation according to the real key value.
According to the triggering method and the triggering device for the key value of the key, whether a target key triggered by a user has a virtual key value is judged according to the pre-stored virtual key value function of each key; when the target key is determined to have the virtual key value, the virtual key value of the target key is obtained according to the virtual key value function of the target key, and the virtual key value is sent to the electronic product so that the electronic product can execute corresponding operation according to the virtual key value; when the target key does not have the virtual key value, the real key value of the target key is sent to the electronic product so that the electronic product can execute corresponding operation according to the real key value.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic flowchart of a method for triggering key values of a key according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method for triggering key values of a key according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of another method for triggering key values of keys according to a second embodiment of the present invention;
fig. 4 is a schematic flowchart of a further method for triggering key values according to a second embodiment of the present invention;
fig. 5 is a schematic structural diagram of a triggering device for key values according to a third embodiment of the present invention.
Fig. 6 is a schematic diagram of a hardware structure of a triggering device for key values according to a third embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The keyboard is a main device for interaction between a user and the electronic product, and the user presses each key on the keyboard to enable the electronic product to execute the function corresponding to the key.
The real key value of the key generally refers to a character string for distinguishing each key, which is a fixed value set by a keyboard manufacturer when the keyboard is shipped from a factory. In the existing triggering process of key values, when a user presses a key, the keyboard sends a real key value corresponding to the key to a port of an electronic product, so that the electronic product can monitor a keyboard event triggered by the user and send the received real key value to application software or an application program borne by the electronic product. And then the application software or the application program executes corresponding operation and function according to the received real key value.
However, due to different usage habits of users, the existing triggering method of key values of keys cannot meet the personalized use requirements of users, for example:
when a program in the electronic product is set to execute operation a when the real key value corresponding to the left Ctrl key is received, that is, the user can only trigger the left Ctrl key to cause the program to execute operation a. When the user wants to use other keys, such as the left Shift key, to make the program execute operation a, the user needs to modify the relevant files in the program system configuration. In many cases, such as a system based on an engineering single chip microcomputer, the program does not provide the modification function, and therefore a new triggering mode of key values of keys in a keyboard is urgently needed to meet the use requirements of users.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Example one
Fig. 1 is a schematic flowchart of a method for triggering key values according to an embodiment of the present invention.
As shown in fig. 1, the method for triggering a key value of a key includes:
step 101, judging whether a target key triggered by a user has a virtual key value or not according to a pre-stored virtual key value function of each key;
if yes, go to step 102; if not, go to step 103.
102, acquiring a virtual key value of a target key according to a virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value of the target key;
and 103, sending the real key value of the target key to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the target key.
It should be noted that the main execution body of the method for triggering a key value provided in the embodiment of the present invention is a trigger device for a key value, and the trigger device for a key value may be installed in each electronic product under each operating system, or may be independently installed in a local device and interact with an electronic product arranged at a remote location. The electronic products include, but are not limited to, smart phones, smart terminals with physical or virtual keyboards, desktop computers, tablet computers, and the like. In addition, the program loaded in the trigger device of the key value of the key can be written by languages such as C/C + +, Java, Shell or Python.
Specifically, the triggering device of the key value determines whether the target key with the key pressing event has the corresponding virtual key value according to the pre-stored virtual key value function of each key. The virtual key value function may be a function expression, a calculation expression, or a conversion expression for representing a correspondence between a real key value and a virtual key value of the key, which is generally preset by a user, and the setting mode may be multiple: setting a virtual key value function for each key, setting the function value of the virtual key value function of the key needing to trigger the virtual key value function as a virtual key value, and setting the function value of the virtual key value function of the key not needing to trigger the function as null; or, the virtual key value function is set only for the key which needs to trigger the virtual key value function, and the key which does not need to trigger the function does not set the virtual key value function. Of course, other arrangements are possible, and the invention is not limited in this regard.
In addition, the virtual key value of the key is similar to the real key value of the key in a representation mode but different in representation content, and the specific key value can be set by a user according to the actual situation, which is not limited by the invention. Taking the left Ctrl key and the left Shift key as examples, the true key value of the left Ctrl key is 0x11, and the true key value of the left Shift key is 0x10, and if a user wishes to implement the function of the left Ctrl key by using the left Shift key, it is necessary to set a corresponding virtual key value function for the left Shift key, so that when the left Shift key is triggered, the virtual key value 0x11 of the left Shift key is sent to the port of the electronic product.
Meanwhile, it can be known that the virtual key value function of each key is preset by the user and stored in the trigger device of the key value, and the virtual key value function can be stored specifically in a virtual key value function list mode, that is, the real key value and the virtual key value function of each key with the virtual key value are in one-to-one correspondence and stored; the virtual key value functions are stored in the same function library, and are inquired and called in a preset inquiry calling mode. That is, according to the pre-stored virtual key value function of each key, it can be determined whether the target key has the corresponding virtual key value.
Then, when the target key is determined to have the virtual key value, the virtual key value of the target key can be determined according to the virtual key value function of the target key, and the virtual key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the virtual key value of the target key; and when the target key is determined not to have the virtual key value, sending the real key value of the target key to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the target key.
In the prior art, the operation of sending a key value to an electronic product is generally implemented by a main thread: when a user presses a key, the trigger device establishes a main thread to send a real key value corresponding to the key to a port of an electronic product through the main thread, so that application software or an application program in the electronic product executes corresponding operation and functions according to the real key value.
In the application, whether the target key has the virtual key value or not needs to be judged, and the virtual key value or the real key value is sent to the electronic product according to the judgment result, so that on the basis of the existing main thread, when the target key has the virtual key value, a virtual key value sending sub-thread is further established, so that the virtual key value of the target key can be sent to the electronic product through the virtual key value sending sub-thread. When the target key has the virtual key value, the target key is sent to the electronic product through the virtual key value sending sub-thread so that the electronic product can execute corresponding operation according to the virtual key value; and when the target key does not have the virtual key value, sending the real key value of the target key to the electronic product through the main thread so that the electronic product can execute corresponding operation according to the real key value.
Preferably, under the condition that the target key has the virtual key value, the virtual key value sending sub-thread can intercept the real key value sent by the main thread, so that the electronic product only receives the virtual key value; or, the virtual key value sending sub-thread sends a virtual key value and simultaneously sends a real key value invalid instruction of a target key to the electronic product, so that the electronic product executes corresponding operation only according to the virtual key value under the condition that the electronic product simultaneously receives the virtual key value of the target key and the real key value of the target key; or, the sending operation of the real key value can be intercepted through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value and executes corresponding operation according to the virtual key value.
Taking the foregoing application scenarios as examples: in the prior art, when a program in an electronic product receives a true key value 0x11 of a left Ctrl key, operation a is executed; in the embodiment of the present invention, a user may pre-store a virtual key value function X of the left Shift key in the trigger device of the key value, and configure the virtual key value of the left Shift key to be the same value as the real key value of the left Ctrl key, that is, 0X11, by using the virtual key value function X. Once the user triggers the left Shift key, the trigger device of the key value will judge and obtain the conclusion that the left Shift key has the virtual key value, and then the trigger device will obtain the virtual key value 0x11 of the left Shift key according to the left Shift key, and directly send the virtual key value 0x11 to the program of the electronic product, so that the program in the electronic product executes corresponding operations according to 0x11, that is, the function that the user triggers the left Shift key to realize corresponding operations of the left Ctrl key is completed, it is needless to say that, in the process, the trigger device can send the virtual key value 0x11 of the left Shift key to the electronic product, and at the same time, can also send the real key value invalid instruction of the left Shift key to the electronic product, so that the electronic product executes corresponding operations only according to 0x11 based on the real key value invalid instruction; or, in the process, the trigger device intercepts the sending operation of the real key value of the left Shift key, so that the electronic product only receives the virtual key value 0x11 of the left Shift key, and executes the corresponding operation according to 0x 11. Correspondingly, when the user triggers the left Ctrl key, the triggering device directly sends the real key value 0x11 of the left Ctrl key to the program of the electronic product under the condition that it is determined that the left Ctrl key does not have the virtual key value, so that the program of the electronic product can execute corresponding operations according to 0x11, that is, when the user triggers the left Ctrl key, the function of corresponding operations of the left Ctrl key itself is realized.
In other words, in the above embodiment, the user can trigger the left Ctrl key or the left Shift key, and the program of the electronic product executes corresponding operations according to 0x11 and implements corresponding functions, so that the method can facilitate key operations by users with different operation habits, meet user requirements, and solve the problems in the prior art that the key values are all fixed real key values preset in the factory, so that the user is inconvenient to use, and the key functions cannot be effectively expanded.
In one optional implementation manner, when the electronic product runs, the triggering device based on the key values of the keys of the electronic product can also monitor a keyboard event, lock the current display window of the electronic product when the key pressing event is monitored, execute the virtual key value function according to the prestored keys, and judge whether the target key triggered by the user has a virtual key value; and when a key bounce event is monitored, sending the virtual key value or the real key value of the target key to an electronic product, and releasing the current display window.
Specifically, the keyboard event may include a key press event and a key bounce event, where the key press event may specifically refer to a user clicking a virtual keyboard on a touch screen and triggering a key instruction on the virtual keyboard, or may refer to a user pressing a key in an entity keyboard or a key in an entity input device in a physical pressing manner; correspondingly, the key-up event may specifically refer to an instruction that is triggered by a user after the key-down event and causes the keys in the input device, such as the virtual keyboard or the physical keyboard, to return to the original state, and may be implemented by the key position of the user's finger leaving the virtual keyboard, or by the key-up and returning to the original state when the user's finger leaves the keys of the physical keyboard or the physical input device, which is not limited in the present invention.
And then, when the trigger device of the key value monitors a key pressing event triggered by a user, locking the current display window until the key bounce event is monitored, and releasing the current window. That is, in the current display window locked state, the trigger device cannot monitor key pressing events of other keys, that is, for the trigger device, only whether one target key has a virtual key value or not can be determined at each time, and in this way, confusion caused by simultaneous determination of whether multiple keys have virtual key values is avoided.
In the triggering method for key values of keys provided in this embodiment, whether a target key triggered by a user has a virtual key value is determined according to a virtual key value function of each pre-stored key; under the condition that a target key triggered by a user has a virtual key value, acquiring the virtual key value of the target key, and sending the virtual key value to the electronic product so that the electronic product executes corresponding operation according to the virtual key value of the target key; and under the condition that the target key triggered by the user does not have the virtual key value, the real key value of the target key is sent to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the key. By the mode, the key values of the keys of the keyboard are effectively expanded, and the use requirements of users are met.
Example two
On the basis of the first embodiment, in order to further explain the triggering method of the key value provided by the present invention, fig. 2 to fig. 4 are respectively three triggering methods of the key value provided by the present invention.
Fig. 2 is a schematic flowchart of a method for triggering key values according to a second embodiment of the present invention. As shown in fig. 2, the method includes:
step 201a, acquiring a real key value of a target key triggered by a user;
step 202a, judging whether a virtual key value function corresponding to the real key value of the target key exists.
If not, the target key does not have the virtual key value, and step 205a is executed; if yes, go to step 203 a.
Step 203a, a virtual key value function corresponding to the real key value of the target key is called to obtain a function value, and whether the function value is empty is judged.
If yes, the target key does not have a virtual key value, and step 205a is executed; if not, the target key has a virtual key value, and step 204a is executed.
And 204a, determining the obtained function value as a virtual key value of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value.
Step 205a, the real key value of the target key is sent to the electronic product, so that the electronic product executes corresponding operation according to the real key value of the target key.
It should be noted that, similar to the embodiment, the main execution body of the method for triggering a key value provided in the second embodiment is a triggering device for a key value, and the triggering device for a key value may be installed in each electronic product under each operating system, or may be independently installed in a local device and interact with an electronic product arranged at a remote end. The electronic products include, but are not limited to, smart phones, smart terminals with physical or virtual keyboards, desktop computers, tablet computers, and the like. In addition, the program loaded in the trigger device of the key value of the key can be written by languages such as C/C + +, Java, Shell or Python.
Specifically, the triggering device of the key value determines whether the target key with the key pressing event has the corresponding virtual key value according to the pre-stored virtual key value function of each key. The virtual key value function may be specifically a function expression, a calculation expression, or a conversion expression for representing a correspondence between a real key value and a virtual key value of the key, which is preset by a user, and the setting mode may be multiple: setting a corresponding virtual key value function for each key, setting the function value of the virtual key value function of the key needing to trigger the virtual key value function as a virtual key value, and setting the function value of the virtual key value function of the key not needing to trigger the function as null; or, the virtual key value function is set only for the key which needs to trigger the virtual key value function, and the key which does not need to trigger the function does not set the virtual key value function. Of course, other arrangements are possible, and the invention is not limited in this regard.
Different from the first embodiment, in the method for triggering key values of keys shown in fig. 2, whether a target key triggered by a user has a virtual key value is determined according to a pre-stored virtual key value function of each key, which may specifically include steps 201a to 203a described above, and whether the target key has a virtual key value function and whether a function value is empty is determined by two steps of determining, so that the embodiment shown in fig. 2 can determine whether the target key triggers the virtual key value function no matter which of the two setting manners is adopted.
Specifically, after the user triggers the target key, the trigger device first obtains the true key value of the target key in a manner similar to that in the prior art, which is not described in detail in this embodiment. And then, the trigger equipment of the key value determines whether a virtual key value function corresponding to the real key value of the target key exists or not according to the virtual key value functions of the pre-stored keys. And when a virtual key value function corresponding to the target key exists, calling the virtual key value function to obtain a function value, and judging whether the function value is null, so that when the virtual key value function corresponding to the target key exists and the obtained function value is not null, the triggering device sends the virtual key value to the electronic product, otherwise, the triggering device sends the real key value of the target key to the electronic product. Therefore, in the second embodiment, whether the corresponding virtual key value function exists or not and whether the function value of the virtual key value function is empty or not are determined, so that whether the virtual key value of the key is triggered or not is determined, the determination accuracy is also improved, and misoperation caused by misdetermination is avoided.
Unlike the previous embodiments, fig. 3 and 4 respectively provide two alternative embodiments for the different ways in which the user sets the virtual key-value function:
fig. 3 is a schematic flowchart of another method for triggering key values of a key according to a second embodiment of the present invention. As shown in fig. 3, the method includes:
step 201b, acquiring a real key value of the target key triggered by the user.
Step 202b, calling a virtual key value function corresponding to the real key value and obtaining a function value, and judging whether the function value is empty.
If the function value is null, the target key does not have a virtual key value, and step 204b is executed; if the function value is not null, the target key has a virtual key value, and step 203b is executed.
Step 203b, determining the obtained function value as a virtual key value of the target key, and sending the virtual key value to an electronic product, so that the electronic product executes corresponding operation according to the virtual key value.
And step 204b, sending the real key value of the target key to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the target key.
Unlike the foregoing embodiments, the embodiment shown in fig. 3 is particularly directed to a case where each key is provided with one virtual key value function, in this case, a function value of the virtual key value function of the key that needs to trigger the virtual key value function is set as a virtual key value, and a function value of the virtual key value function of the key that does not need to trigger the function is set as null, that is, the virtual key value function is set in a manner that the virtual key value functions of all keys are locally pre-stored.
For example, in the process of setting the virtual key function, a user may edit the virtual key value function of each key one by one on a setting interface or a designated interface, and the virtual key value function may be pre-stored in the local function library, and the user only needs to call and store the setting as required.
Furthermore, according to different requirements of users, virtual key value functions are generally divided into two types, one type corresponds to a virtual key value function with a virtual key value function, namely, a function value obtained by calling and operating the virtual key value function of the type is a virtual key value desired by the user; the other type corresponds to a virtual key function that does not have a virtual key function, i.e., the function value obtained by calling and running such a virtual key function should be null. In the process of setting the virtual key value function by the user, if the user does not finish setting the virtual key value functions of all keys, the trigger equipment can correspondingly prompt the user to remind the user of finishing the setting; further, after the device is reminded, if the user still does not want to set the virtual key-value functions of some keys, the trigger device may default to that the user does not need to trigger the virtual key-value functions on the keys, and at this time, the trigger device will directly set the virtual key-value functions of the keys as the virtual key-value functions with empty function values.
Therefore, in the embodiment, the virtual key value function corresponding to the real key value is called to obtain the function value, and whether the function value is empty is judged, so that the virtual key value function is triggered. Compared with the embodiment shown in fig. 2, the calling speed and the triggering speed are faster, and the triggering efficiency is improved.
Fig. 4 is a schematic flowchart of another method for triggering key values according to a second embodiment of the present invention. As shown in fig. 4, the method includes:
step 201c, acquiring a real key value of a target key triggered by a user;
step 202c, inquiring whether a virtual key value function corresponding to the real key value is prestored locally.
If not, the target key does not have the virtual key value, and step 204c is executed; if yes, the target key has a virtual key value, and step 203c is executed.
Step 203c, calling a virtual key value function corresponding to the real key value and obtaining a function value, determining the obtained function value as a virtual key value of the target key, and sending the virtual key value to the electronic product so that the electronic product can execute corresponding operations according to the virtual key value.
And step 204c, sending the real key value of the target key to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the target key.
Unlike the foregoing embodiments, the embodiment shown in fig. 4 is directed to a setting manner in which a user sets a virtual key value function for a key that needs to trigger the virtual key value function, and a key that does not need to trigger the function does not set the virtual key value function. In this case, the key that needs to trigger the virtual key function has the virtual key function pre-stored locally, and the key that does not need to trigger the function does not have any virtual key function pre-stored locally. That is, the virtual key function of at least part of the keys is locally pre-stored.
For example, in the process of setting the virtual key value functions, a user may edit the virtual key value functions of the keys required to have the virtual key value functions one by one on a setting interface or a designated interface, and similarly, the virtual key value functions may be pre-stored in the local function library, and the user only needs to call and store the settings as required.
Further, unlike the foregoing embodiment, the virtual key function in this embodiment is a function having a virtual key function, that is, a function value obtained by calling and operating such a virtual key function should be a virtual key desired by a user. In the process of setting the virtual key value function by the user, if the user finishes setting the virtual key value function of partial keys, corresponding prompt can be carried out on the user so as to avoid the user from omitting the setting of the keys; further, after the device is reminded, if the user still does not want to set the virtual key function of some keys, the user may default that the user does not need to trigger the virtual key function on the keys, and does not perform other processing.
Therefore, in the embodiment, whether a virtual key value function corresponding to the real key value is prestored locally is queried, and the virtual key value function corresponding to the real key value is directly called to obtain the function value, so that the obtained function value is determined as the virtual key value of the target key. Compared with the embodiment shown in fig. 2, the calling speed and the triggering speed are faster, the triggering efficiency is improved, and compared with the embodiment shown in fig. 3, the method occupies a smaller storage space and is more suitable for electronic products with weaker processing capability and storage capability.
Optionally, on the basis of the embodiments shown in fig. 2 to 4, the triggering method further includes, as in the first embodiment: monitoring keyboard events; correspondingly, when a key pressing event is monitored, the current display window is locked, and whether a target key triggered by a user has a virtual key value or not is judged according to the pre-stored virtual key value function of each key; and when a key bounce event is monitored, sending the virtual key value or the real key value of the target key to an electronic product, and releasing the current display window.
In the triggering method for key values of keys provided in the second embodiment, on the basis of the first embodiment, whether the target key has the corresponding virtual key value function is judged first, and then whether the function value of the virtual key value function is empty is judged, so that whether the target key triggered by the user has the virtual key value is judged, the judgment accuracy is effectively improved, and the misoperation caused by misjudgment is avoided.
EXAMPLE III
Fig. 5 is a schematic structural diagram of a triggering device for a key value provided in a third embodiment of the present invention, and as shown in fig. 5, the triggering device for a key value includes:
a key value obtaining unit 10, configured to determine whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key; when it is determined that a target key triggered by a user has a virtual key value, the key value obtaining unit is further configured to obtain the virtual key value of the target key according to a virtual key value function of the target key;
when the key value obtaining unit 10 determines that the target key triggered by the user has the virtual key value, the communication unit 20 is configured to send the virtual key value to the electronic product 30, so that the electronic product 30 executes a corresponding operation according to the virtual key value of the target key; otherwise, the communication unit 20 is configured to send the true key value of the target key to the electronic product 30, so that the electronic product 30 performs a corresponding operation according to the true key value of the target key.
The trigger device of the key value can be installed in each electronic product under each operating system, and can also be independently installed in the local device and interacted with the electronic product arranged at the far end. The electronic products include, but are not limited to, smart phones, smart terminals with physical or virtual keyboards, desktop computers, and tablet computers. In addition, the program in the trigger device of the key value of the key can be written by C/C + +, Java, Shell or Python and other languages.
In one optional embodiment, the triggering device further comprises a monitoring unit; before the key value obtaining unit 10 determines whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key, the monitoring unit is configured to monitor a keyboard event; the key value obtaining unit 10 is further configured to lock and lock the current display window when the monitoring unit monitors a key press event, and release the current display window when the monitoring unit monitors a key bounce event; the communication unit 20 is further configured to transmit the virtual key value or the real key value of the target key to the electronic product 30 when the monitoring unit monitors a key up event.
In an optional implementation manner, the key value obtaining unit 10 is specifically configured to: acquiring a real key value of a target key triggered by a user; judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; when the function value is not empty, determining the obtained function value as a virtual key value of the target key;
alternatively, the key value obtaining unit 10 is specifically configured to: acquiring a real key value of a target key triggered by a user; calling a virtual key value function corresponding to the real key value to obtain a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are stored locally in advance; when the function value is not empty, determining the obtained function value as a virtual key value of the target key;
alternatively, the key value obtaining unit 10 is specifically configured to: acquiring a real key value of a target key triggered by a user; inquiring whether a virtual key value function corresponding to the real key value is prestored locally; if yes, the target key has a virtual key value; if not, the target key has no virtual key value; wherein, the local at least prestores the virtual key value function of some keys; calling a virtual key value function corresponding to the real key value and obtaining a function value; and determining the obtained function value as a virtual key value of the target key.
In one optional implementation, the trigger device establishing unit; the thread establishing unit is configured to establish a virtual key value sending sub-thread before the communication unit 20 sends the virtual key value of the target key to the electronic product 30; the communication unit 20 transmits the virtual key value of the target key to the electronic product 30 through the virtual key value transmitting sub-thread.
In an optional implementation manner, the communication unit 20 is further configured to send a real key value invalidation instruction of the target key to the electronic product 30 through the virtual key value sending sub-thread, so that when the electronic product 30 receives the virtual key value of the target key and the real key value of the target key at the same time, based on the real key value invalidation instruction of the target key, it is determined that a corresponding operation is performed only according to the virtual key value; or, the communication unit 20 is further configured to intercept the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product 30 only receives the virtual key value, and execute a corresponding operation according to the virtual key value.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and corresponding beneficial effects of the system described above may refer to the corresponding process in the foregoing method embodiments, and are not described herein again.
In other embodiments, fig. 6 is a schematic diagram of a hardware structure of a triggering device for a key value according to a third embodiment of the present invention. As shown in fig. 6, the triggering device of the key value may be specifically a non-transitory computer-readable storage medium including instructions, including:
a processor 32 and a memory 31 for storing processor-executable instructions;
wherein the processor 32 is configured to:
judging whether a target key triggered by a user has a virtual key value or not according to a pre-stored virtual key value function of each key;
if so, acquiring a virtual key value of the target key according to the virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to an electronic product, so that the electronic product executes corresponding operation according to the real key value.
The memory 31 may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. And processor 32 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital signal processor architectures (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessor architectures or other electronic components.
The above-mentioned instructions can be written by using languages such as C/C + +, Java, Shell, Python, etc., which is not limited in this embodiment.
In the triggering device for key values of keys provided in the third embodiment, whether a target key triggered by a user has a virtual key value is judged according to a virtual key value function of each pre-stored key; under the condition that a target key triggered by a user has a virtual key value, acquiring the virtual key value of the target key, and sending the virtual key value to the electronic product so that the electronic product executes corresponding operation according to the virtual key value of the target key; and under the condition that the target key triggered by the user does not have the virtual key value, the real key value of the target key is sent to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the key. By the mode, the key values of the keys of the keyboard are effectively expanded, and the use requirements of users are met.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (13)

1. A method for triggering key values is characterized by comprising the following steps:
judging whether a target key triggered by a user has a virtual key value or not according to a pre-stored virtual key value function of each key;
if so, acquiring a virtual key value of the target key according to the virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to an electronic product, so that the electronic product executes corresponding operation according to the real key value.
2. The method for triggering key values according to claim 1, wherein before determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key, the method further comprises:
monitoring keyboard events;
when a key pressing event is monitored, locking a current display window;
when a key bounce event is monitored, the virtual key value or the real key value of the target key is sent to an electronic product, and meanwhile, the triggering method further comprises the following steps:
and releasing the current display window.
3. The method for triggering key values of keys according to claim 1 or 2, wherein the step of determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key comprises:
acquiring a real key value of a target key triggered by a user;
judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value;
obtaining the virtual key value of the target key according to the virtual key value function of the target key, which specifically comprises:
and when the function value is not null, determining the obtained function value as the virtual key value of the target key.
4. The method for triggering key values of keys according to claim 1 or 2, wherein the step of determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key comprises:
acquiring a real key value of a target key triggered by a user;
calling a virtual key value function corresponding to the real key value to obtain a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are stored locally in advance;
obtaining the virtual key value of the target key according to the virtual key value function of the target key, which specifically comprises:
and when the function value is not null, determining the obtained function value as the virtual key value of the target key.
5. The method for triggering key values of keys according to claim 1 or 2, wherein the step of determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key comprises:
acquiring a real key value of a target key triggered by a user;
inquiring whether a virtual key value function corresponding to the real key value is prestored locally; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, the local at least prestores the virtual key value function of some keys;
obtaining the virtual key value of the target key according to the virtual key value function of the target key, which specifically comprises:
calling a virtual key value function corresponding to the real key value and obtaining a function value;
and determining the obtained function value as a virtual key value of the target key.
6. The method for triggering key values according to claim 1 or 2, wherein before sending the virtual key value to an electronic product, the method comprises:
establishing a virtual key value sending sub-thread;
the sending the virtual key value to an electronic product includes:
and sending the virtual key value of the target key to an electronic product through the virtual key value sending sub-thread.
7. The method for triggering key values according to claim 6, wherein the method for triggering key values further comprises, while sending the virtual key values to the electronic product:
sending a real key value invalid instruction of the target key to the electronic product through the virtual key value sending sub-thread, so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, the electronic product determines to execute corresponding operation only according to the virtual key value based on the real key value invalid instruction of the target key; or,
intercepting the sending operation of the real key value through the virtual key value sending sub-thread so that the electronic product only receives the virtual key value and executes corresponding operation according to the virtual key value.
8. A trigger device for key values, comprising:
the key value acquisition unit is used for judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key; when it is determined that a target key triggered by a user has a virtual key value, the key value obtaining unit is further configured to obtain the virtual key value of the target key according to a virtual key value function of the target key;
the communication unit is used for sending the virtual key value to an electronic product when the key value acquisition unit determines that a target key triggered by a user has the virtual key value, so that the electronic product can execute corresponding operation according to the virtual key value of the target key; and the key value obtaining unit is further configured to send a real key value of the target key to an electronic product when determining that the target key triggered by the user does not have the virtual key value, so that the electronic product executes a corresponding operation according to the real key value of the key.
9. The key value triggering device of claim 8, further comprising a monitoring unit;
before the key value acquisition unit judges whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key, the monitoring unit is used for monitoring a keyboard event;
the key value acquisition unit is also used for locking and locking the current display window when the monitoring unit monitors a key pressing event, and releasing the current display window when the monitoring unit monitors a key bouncing event; the communication unit is also used for sending the virtual key value or the real key value of the target key to an electronic product when the monitoring unit monitors a key bounce event.
10. The trigger device of key value according to claim 8 or 9, wherein the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; when the function value is not empty, determining the obtained function value as a virtual key value of the target key;
or, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; calling a virtual key value function corresponding to the real key value to obtain a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are stored locally in advance; when the function value is not empty, determining the obtained function value as a virtual key value of the target key;
or, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; inquiring whether a virtual key value function corresponding to the real key value is prestored locally; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, the local at least prestores the virtual key value function of some keys; calling a virtual key value function corresponding to the real key value and obtaining a function value; and determining the obtained function value as a virtual key value of the target key.
11. The trigger device of key values according to claim 8 or 9, characterized by further comprising a thread establishing unit;
the thread establishing unit is used for establishing a virtual key value sending sub-thread before the communication unit sends the virtual key value of the target key to the electronic product;
and the communication unit transmits the virtual key value of the target key to an electronic product through the virtual key value transmitting sub-thread.
12. The device for triggering key assignment according to claim 11, wherein the communication unit is further configured to send a real key assignment invalidation command of the target key to the electronic product through the virtual key assignment sending sub-thread, so that when the electronic product receives the virtual key assignment of the target key and the real key assignment of the target key at the same time, the electronic product determines to execute a corresponding operation only according to the virtual key assignment based on the real key assignment invalidation command of the target key;
or, the communication unit is further configured to intercept the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and execute a corresponding operation according to the virtual key value.
13. A trigger device for key values, comprising: a processor and a memory for storing processor-executable instructions;
wherein the processor is configured to:
judging whether a target key triggered by a user has a virtual key value or not according to a pre-stored virtual key value function of each key;
if so, acquiring a virtual key value of the target key according to the virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to an electronic product, so that the electronic product executes corresponding operation according to the real key value.
CN201810215617.3A 2018-03-15 2018-03-15 Method and device for triggering key values of keys Active CN110275623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810215617.3A CN110275623B (en) 2018-03-15 2018-03-15 Method and device for triggering key values of keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810215617.3A CN110275623B (en) 2018-03-15 2018-03-15 Method and device for triggering key values of keys

Publications (2)

Publication Number Publication Date
CN110275623A true CN110275623A (en) 2019-09-24
CN110275623B CN110275623B (en) 2023-08-08

Family

ID=67958580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810215617.3A Active CN110275623B (en) 2018-03-15 2018-03-15 Method and device for triggering key values of keys

Country Status (1)

Country Link
CN (1) CN110275623B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110941352A (en) * 2019-11-28 2020-03-31 北京海泰方圆科技股份有限公司 Keyboard generation method, security information input method and device and mobile terminal
CN111628781A (en) * 2020-06-17 2020-09-04 玉林师范学院 Matrix keyboard based on RS232 serial port communication
CN112203082A (en) * 2020-09-27 2021-01-08 深圳创维-Rgb电子有限公司 Data driving frame test method of virtual key value, television and readable storage medium

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH086695A (en) * 1994-06-22 1996-01-12 Oki Electric Ind Co Ltd Recognition and processing method for extended key code
CN1268833A (en) * 1999-03-24 2000-10-04 英业达集团(上海)电子技术有限公司 Method of mobile telephone virtual keyboard
CN1282195A (en) * 1999-07-22 2001-01-31 英业达集团(上海)电子技术有限公司 Mobile telephone handset with remote control function and its remote control function treatment method
TW436723B (en) * 1998-12-24 2001-05-28 Inventec Corp Virtual keypad method of mobile phone
US20040189508A1 (en) * 2003-03-28 2004-09-30 Universal Electronics Inc. System and method for using an universal remote control to access extended operational functions of a device
CN101729816A (en) * 2009-12-11 2010-06-09 惠州Tcl移动通信有限公司 User defined shortcut remote controller and implementation method thereof
CN102096998A (en) * 2009-12-10 2011-06-15 中国联合网络通信集团有限公司 Remote control information receiving and processing method and system as well as digital television receiving device
CN102299985A (en) * 2010-06-25 2011-12-28 上海三旗通信科技有限公司 Full keyboard adopting extension I/O (Input/Output) mode for mobile phone
CN102622156A (en) * 2011-01-26 2012-08-01 腾讯科技(深圳)有限公司 Method, device and system for acquiring virtual keyboards
CN102707893A (en) * 2012-05-21 2012-10-03 上海华勤通讯技术有限公司 Display system and display method for virtual keyboard of mobile terminals
CN102790918A (en) * 2012-08-17 2012-11-21 中国科学院声学研究所 Smart television and method for receiving remote controller input by smart television
CN102915113A (en) * 2012-08-24 2013-02-06 深圳创维-Rgb电子有限公司 Method and apparatus for supporting data input
CN103000008A (en) * 2012-12-13 2013-03-27 青岛海信宽带多媒体技术有限公司 Method and apparatus for responding remote signals of remote receiving equipment
US20130300944A1 (en) * 2012-05-10 2013-11-14 Samsung Electronics Co., Ltd. Method and system for controlling function of display device using remote controller
CN103631507A (en) * 2012-08-27 2014-03-12 腾讯科技(深圳)有限公司 Method and device for providing virtual keyboard
CN105100844A (en) * 2015-08-04 2015-11-25 恬家(上海)信息科技有限公司 Remote controller and realization method thereof
WO2016045503A1 (en) * 2014-09-25 2016-03-31 阿里巴巴集团控股有限公司 Remote controller key matching and signal processing method and apparatus
CN105516771A (en) * 2015-12-11 2016-04-20 Tcl海外电子(惠州)有限公司 Television remote controller and television set
CN105677200A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Mobile terminal control method and device and mobile terminal
CN105867812A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 Method and device for adjusting keys of virtual keyboard
CN105915991A (en) * 2016-06-02 2016-08-31 深圳创维-Rgb电子有限公司 Television button combined processing method and system
CN107515719A (en) * 2016-06-16 2017-12-26 中兴通讯股份有限公司 A kind of triggering method of virtual key, device and terminal

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH086695A (en) * 1994-06-22 1996-01-12 Oki Electric Ind Co Ltd Recognition and processing method for extended key code
TW436723B (en) * 1998-12-24 2001-05-28 Inventec Corp Virtual keypad method of mobile phone
CN1268833A (en) * 1999-03-24 2000-10-04 英业达集团(上海)电子技术有限公司 Method of mobile telephone virtual keyboard
CN1282195A (en) * 1999-07-22 2001-01-31 英业达集团(上海)电子技术有限公司 Mobile telephone handset with remote control function and its remote control function treatment method
US20040189508A1 (en) * 2003-03-28 2004-09-30 Universal Electronics Inc. System and method for using an universal remote control to access extended operational functions of a device
CN102096998A (en) * 2009-12-10 2011-06-15 中国联合网络通信集团有限公司 Remote control information receiving and processing method and system as well as digital television receiving device
CN101729816A (en) * 2009-12-11 2010-06-09 惠州Tcl移动通信有限公司 User defined shortcut remote controller and implementation method thereof
CN102299985A (en) * 2010-06-25 2011-12-28 上海三旗通信科技有限公司 Full keyboard adopting extension I/O (Input/Output) mode for mobile phone
CN102622156A (en) * 2011-01-26 2012-08-01 腾讯科技(深圳)有限公司 Method, device and system for acquiring virtual keyboards
US20140047374A1 (en) * 2011-01-26 2014-02-13 Tencent Technology (Shenzhen) Company Limited Method, device and system for acquiring virtual keyboard
US20130300944A1 (en) * 2012-05-10 2013-11-14 Samsung Electronics Co., Ltd. Method and system for controlling function of display device using remote controller
CN102707893A (en) * 2012-05-21 2012-10-03 上海华勤通讯技术有限公司 Display system and display method for virtual keyboard of mobile terminals
CN102790918A (en) * 2012-08-17 2012-11-21 中国科学院声学研究所 Smart television and method for receiving remote controller input by smart television
CN102915113A (en) * 2012-08-24 2013-02-06 深圳创维-Rgb电子有限公司 Method and apparatus for supporting data input
CN103631507A (en) * 2012-08-27 2014-03-12 腾讯科技(深圳)有限公司 Method and device for providing virtual keyboard
CN103000008A (en) * 2012-12-13 2013-03-27 青岛海信宽带多媒体技术有限公司 Method and apparatus for responding remote signals of remote receiving equipment
WO2016045503A1 (en) * 2014-09-25 2016-03-31 阿里巴巴集团控股有限公司 Remote controller key matching and signal processing method and apparatus
CN105100844A (en) * 2015-08-04 2015-11-25 恬家(上海)信息科技有限公司 Remote controller and realization method thereof
CN105516771A (en) * 2015-12-11 2016-04-20 Tcl海外电子(惠州)有限公司 Television remote controller and television set
CN105677200A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Mobile terminal control method and device and mobile terminal
CN105867812A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 Method and device for adjusting keys of virtual keyboard
CN105915991A (en) * 2016-06-02 2016-08-31 深圳创维-Rgb电子有限公司 Television button combined processing method and system
CN107515719A (en) * 2016-06-16 2017-12-26 中兴通讯股份有限公司 A kind of triggering method of virtual key, device and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨强, 黄勇锋: "Win32扩展功能键盘程序的编写", 微型电脑应用, no. 07, pages 53 - 54 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110941352A (en) * 2019-11-28 2020-03-31 北京海泰方圆科技股份有限公司 Keyboard generation method, security information input method and device and mobile terminal
CN110941352B (en) * 2019-11-28 2021-05-18 北京海泰方圆科技股份有限公司 Keyboard generation method, security information input method and device and mobile terminal
CN111628781A (en) * 2020-06-17 2020-09-04 玉林师范学院 Matrix keyboard based on RS232 serial port communication
CN111628781B (en) * 2020-06-17 2023-07-14 玉林师范学院 Matrix keyboard based on RS232 serial port communication
CN112203082A (en) * 2020-09-27 2021-01-08 深圳创维-Rgb电子有限公司 Data driving frame test method of virtual key value, television and readable storage medium
CN112203082B (en) * 2020-09-27 2023-06-09 深圳创维-Rgb电子有限公司 Virtual key value data driving frame test method, television and readable storage medium

Also Published As

Publication number Publication date
CN110275623B (en) 2023-08-08

Similar Documents

Publication Publication Date Title
US10447843B2 (en) Method, device and storage medium for setting position of function setting key of mobile terminal
US20220155922A1 (en) Side-toolbar-display method, terminal, and storage medium
KR101357261B1 (en) Apparatus and method for creating a shortcut menu and mobile device including the apparatus
CN110275623A (en) The triggering method and equipment of button value
CN106775282A (en) Operate the method and device of terminal
WO2020093708A1 (en) Fingerprint capturing method, fingerprint capturing apparatus, electronic device, and storage medium
JP6967095B2 (en) Program startup method, device, device and storage medium
CN111708471B (en) Control processing method and related device
CN108762606B (en) Screen unlocking method and terminal equipment
KR102401467B1 (en) Button setting method, device and recording medium
CN110162249A (en) A kind of control application program image target method and device, equipment and storage medium
KR20230088427A (en) File transmission method, file transmission device and electronic device
CN106708408A (en) Method and device for preventing spurious triggering of touch keys and terminal
CN110837317A (en) Method, device and equipment for preventing user from mistakenly touching on display interface
CN111781997B (en) Output apparatus and control method
CN105786321B (en) A kind of function switching method and device
CN105786543A (en) Interface loading method and device
CN107888820A (en) A kind of control method of camera lens, device and terminal
US20140104229A1 (en) Method of displaying images via touching and electronic apparatus thereof
CN109107148B (en) Control method, control device, storage medium and mobile terminal
CN112346718B (en) Byte code compiling method, byte code compiling device and computer readable storage medium
CN111367406B (en) Method, device, equipment and medium for refreshing pull-down of applet window
US20150268841A1 (en) Method of Changing a User Interface to be a Dedicated SkypeTM Interface and Computer Program Product Thereof and Handheld Electronic Device
CN112083839A (en) Terminal operation method, terminal and device with storage function
CN108124174B (en) Television and television application control method and device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100095 Building 2, Longxin Industrial Park, Zhongguancun environmental protection technology demonstration park, Haidian District, Beijing

Applicant after: Loongson Zhongke Technology Co.,Ltd.

Address before: 100095 Building 2, Longxin Industrial Park, Zhongguancun environmental protection technology demonstration park, Haidian District, Beijing

Applicant before: LOONGSON TECHNOLOGY Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant