CN111309188B - Touch key shielding method and device and capacitive touch equipment - Google Patents

Touch key shielding method and device and capacitive touch equipment Download PDF

Info

Publication number
CN111309188B
CN111309188B CN202010256673.9A CN202010256673A CN111309188B CN 111309188 B CN111309188 B CN 111309188B CN 202010256673 A CN202010256673 A CN 202010256673A CN 111309188 B CN111309188 B CN 111309188B
Authority
CN
China
Prior art keywords
capacitive touch
touch key
shielding
capacitance value
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010256673.9A
Other languages
Chinese (zh)
Other versions
CN111309188A (en
Inventor
李坚
张光宇
余明火
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth RGB Electronics Co Ltd
Original Assignee
Shenzhen Skyworth RGB Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth RGB Electronics Co Ltd filed Critical Shenzhen Skyworth RGB Electronics Co Ltd
Priority to CN202010256673.9A priority Critical patent/CN111309188B/en
Publication of CN111309188A publication Critical patent/CN111309188A/en
Application granted granted Critical
Publication of CN111309188B publication Critical patent/CN111309188B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0416Control or interface arrangements specially adapted for digitisers
    • G06F3/0418Control or interface arrangements specially adapted for digitisers for error correction or compensation, e.g. based on parallax, calibration or alignment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/044Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by capacitive means

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Switches That Are Operated By Magnetic Or Electric Fields (AREA)

Abstract

The embodiment of the application discloses a shielding method and device of a touch key and capacitive touch equipment, which are applied to the capacitive touch equipment connected with external equipment through magnetic contact points; the method comprises the following steps: detecting whether a capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, and if not, shielding the touch key function of the capacitive touch device; if yes, detecting whether the touch device is connected with an external device or not through a magnetic contact of the capacitive touch device, and if yes, shielding the touch key function. The application can meet the operation and use requirements of the capacitive touch equipment connected with the external equipment through the magnetic contact, so that stable information interaction transmission with strong anti-interference capability can be realized after the capacitive touch equipment and the external equipment are connected through the magnetic contact.

Description

Touch key shielding method and device and capacitive touch equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to a method and an apparatus for shielding a touch key, and a capacitive touch device.
Background
The capacitive touch key is widely applied to various terminals, but because the capacitive touch key has a certain response after being close to an external object, the device is inevitably caused to cause unintended misoperation when being contacted by other external devices. Especially when the capacitive touch equipment is connected with other external equipment such as intelligent terminals of controllable touch key equipment and is matched with the external equipment, the capacitive touch equipment is easily interfered by the intelligent terminals, and the problem that normal use is affected due to false triggering is caused.
Disclosure of Invention
In view of the above problems, the present application aims to provide a method and a device for shielding a touch key, and a capacitive touch device.
In one embodiment, the application provides a shielding method of a touch key, which is applied to a capacitive touch device connected with an external device through a magnetic contact; the method comprises the following steps:
detecting whether a capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, and if not, shielding the touch key function of the capacitive touch device;
if yes, detecting whether the capacitive touch device is connected with the external device or not through the magnetic contact of the capacitive touch device, and if yes, shielding the touch key function.
In one embodiment, the shielding touch key functions of the capacitive touch device includes:
and receiving a user key instruction acquired by the external equipment connected through the magnetic contact.
In one embodiment, after the step of detecting whether the capacitance value corresponding to the capacitive touch key is increased to the preset capacitance value, the step of:
if the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, detecting whether the capacitance values corresponding to a plurality of capacitive touch keys are increased at the same time, and if so, shielding the touch key function;
if not, executing the step of detecting whether the external equipment is connected or not.
In one embodiment, the detecting whether there are a plurality of capacitance values corresponding to the capacitive touch keys at the same time further includes:
if the increase of the capacitance values corresponding to the capacitive touch keys is not detected, detecting whether the capacitance values corresponding to the capacitive touch keys are kept unchanged in preset time, and if so, shielding the touch key function;
if not, executing the step of detecting whether the external equipment is connected or not.
In one embodiment, an infrared sensor is arranged in the capacitive touch device, and the infrared sensor is located beside the magnetic contact and is separated from the capacitive touch key area by a preset distance;
the method further comprises the steps of:
when the infrared induction intensity sensed by the infrared sensor is detected to be greater than or equal to a preset intensity threshold value within a preset detection distance, determining that the external equipment is close to and shields the touch key function; otherwise, executing the step of detecting the capacitance value corresponding to the capacitive touch key.
In one embodiment, the application also provides a shielding device of the touch key, which is applied to the touch equipment connected with the external equipment through the magnetic contact;
the device comprises:
the first key detection module is used for detecting whether the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value or not;
the shielding module is used for shielding the touch key function of the capacitive touch equipment if the capacitance value corresponding to the capacitive touch key is not increased to a preset capacitance value;
the first connection detection module is used for detecting whether the capacitive touch device is connected with the external device or not through the magnetic contact of the capacitive touch device if the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value;
the shielding module is further used for shielding the touch key function if the magnetic attraction contact of the capacitive touch device detects that the capacitive touch device is connected with the external device.
In one embodiment, the application also provides a capacitive touch device, which is used for being connected with an external device through a magnetic contact;
the capacitive touch device further comprises a memory storing a computer program and a processor implementing the steps of the method of shielding the touch keys when the processor executes the computer program.
In one embodiment, the method further comprises an infrared sensor arranged beside the magnetic contact and separated from the capacitive touch key area by a preset distance, and the processor realizes a shielding method of the touch key when executing the computer program.
In one embodiment, the capacitive touch device is a speaker, a desk lamp, or a light-controlled switch.
In one embodiment, the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the touch key masking method.
The shielding method and device for the touch keys and the capacitive touch equipment provided by the application have the following technical effects:
the shielding method, the device and the capacitive touch equipment of the touch key are applied to the capacitive touch equipment connected with the external equipment through the magnetic contact, and detect whether the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value or not in the adsorption connection process of the external equipment, and shield the key function of the capacitive touch equipment if the capacitance value is not increased to the preset capacitance value. If yes, detecting whether the touch device is connected with an external device or not through a magnetic contact of the capacitive touch device, and if yes, shielding the touch key function. According to the embodiment of the application, various judgment factors can be combined to prevent misjudgment, so that when the capacitive touch device is in contact connection with the external device through the magnetic contact, misoperation caused by external devices and other external objects is filtered, and meanwhile, the situation that after connection, the capacitive touch device is prevented from being influenced by mistriggering of a touch key caused by adsorption and lamination of the external device can be ensured. The application can meet the operation and use requirements of the capacitive touch equipment connected with the external equipment through the magnetic contact, so that stable information interaction transmission with strong anti-interference capability can be realized after the capacitive touch equipment and the external equipment are connected through the magnetic contact.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings that are required for the embodiments will be briefly described, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope of the present application. Like elements are numbered alike in the various figures.
FIG. 1 is a flow chart of a method for shielding a touch key according to an embodiment of the application;
FIG. 2 is a schematic flow chart of a method for shielding a touch key according to an embodiment of the application;
FIG. 3 is a schematic diagram showing connection between an external device and a capacitive touch device in a method for shielding a touch key according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a shielding device for touch keys according to an embodiment of the present application;
fig. 5 shows a schematic structural diagram of a capacitive touch device in one embodiment of the application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments.
The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
The terms "comprises," "comprising," "including," or any other variation thereof, are intended to cover a specific feature, number, step, operation, element, component, or combination of the foregoing, which may be used in various embodiments of the present application, and are not intended to first exclude the presence of or increase the likelihood of one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used merely to distinguish between descriptions and should not be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the application belong. The terms (such as those defined in commonly used dictionaries) will be interpreted as having a meaning that is the same as the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in connection with the various embodiments of the application.
Referring to fig. 3, the present application is applicable to a capacitive touch device 10 having a magnetic attraction function, and a capacitive touch key 320 disposed on a surface of the device where a magnetic attraction contact 310 is located. When the capacitive touch device 10 is not connected with the external device 20 in a sucking way, the capacitive touch device 10 itself realizes function control, and when the capacitive touch device is connected with the external device 20 through the magnetic contact 310, the external device 20 bears the function control task of the sucked capacitive touch device 10, namely the function control task is executed by the external device.
Referring to fig. 1, in one implementation, the present application provides a method for shielding a touch key, which is applied to a capacitive touch device connected to an external device through a magnetic contact; the method comprises the following steps:
step S110: detecting whether the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, and if not, shielding the touch key function of the capacitive touch device.
In the process that the external equipment and the capacitive touch equipment are in suction connection through the magnetic contact, a touch key of the capacitive touch equipment is touched by non-finger foreign objects such as a plane of the external equipment, and the quantity of charge transfer caused by two actions of touching by a finger is different, so that the capacitance value variation corresponding to the touch key is different. The increment of the corresponding capacitance value when a non-finger foreign object such as a plane of the external device touches the touch key is smaller than that when a finger touches the touch key. Therefore, a trigger response threshold, namely a preset capacitance value, can be set, and the unintentional operation is filtered by detecting the capacitance value variation corresponding to the touch key, if the capacitance value corresponding to the touch key is increased to the preset capacitance value, the touch of the finger of the user can be responded, and if the corresponding capacitance value does not reach the preset capacitance value, the touch of the finger of the non-user such as a plane of the external equipment can be shielded. Therefore, the influence of incorrect response on the normal operation of the equipment caused by the suction connection with the external equipment can be prevented.
The embodiment of the application has higher recognition sensitivity, can effectively and rapidly filter out misoperation on the capacitive touch key, and ensures that the capacitive touch device can respond to the instruction of the touch key by mistake in the process of sucking the capacitive touch device and the external device.
Step S120: if yes, detecting whether the touch device is connected with the external device or not through the magnetic attraction contact of the capacitive touch device, and if yes, shielding the touch key function of the capacitive touch device.
In order to prevent misjudgment, after the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, whether the capacitive touch device is connected with the external device or not can be detected through the magnetic contact of the capacitive touch device, so that even if the capacitive touch device and the external device are not completely attached, the attached capacitive touch device can timely shield the touch key function, the situation of false touch is effectively broken, and if the connection with the external device is not detected, a key instruction corresponding to the capacitive touch key is responded. The method comprises the steps of detecting whether a mode of connecting with external equipment exists through a magnetic attraction contact of the capacitive touch equipment, if so, detecting whether the voltage of an IO control port connected with the corresponding magnetic attraction contact changes, namely, whether a preset voltage value is reached, if so, indicating that the external equipment is connected, or detecting whether the IO control port connected with the corresponding magnetic attraction contact receives a handshake instruction sent by the external equipment, and if so, indicating that the external equipment is connected.
The shielding method of the touch key is applied to the capacitive touch device connected with the external device through the magnetic contact, and is used for detecting whether the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value or not in the adsorption connection process of the external device, and shielding the key function of the capacitive touch device if the capacitance value is not increased to the preset capacitance value. If yes, detecting whether the touch device is connected with an external device or not through a magnetic contact of the capacitive touch device, and if yes, shielding the touch key function. The embodiment of the application can combine multiple judging factors to prevent misjudgment, so that when the capacitive touch device is in contact connection with the external device through the magnetic contact, misoperation caused by external devices and other foreign objects is filtered, and meanwhile, the situation that after connection, the capacitive touch device is prevented from being influenced by mistriggering of a touch key caused by adsorption and lamination of the external device can be ensured. The application can meet the operation and use requirements of the capacitive touch equipment connected with the external equipment through the magnetic contact, so that stable information interaction transmission with strong anti-interference capability can be realized after the capacitive touch equipment and the external equipment are connected through the magnetic contact.
In a specific embodiment, the touch key function of the capacitive touch device is masked, and then comprises:
and receiving a user key instruction obtained by an external device connected with the magnetic contact.
According to the shielding method of the touch key, after the touch key function of the adsorbed capacitive touch device is shielded, the external device sends a user key instruction to the capacitive touch device, namely, the function of interaction with a user is transferred to the external device. The application is convenient for the external device to adsorb the capacitive touch device through the magnetic contact, thereby improving the stability and the effectiveness of the communication connection of the external device and the capacitive touch device, preventing the signal crosstalk of the touch key and ensuring the normal operation of the device.
In a specific embodiment, after "detecting whether the capacitance value corresponding to the capacitive touch key is increased to the preset capacitance value", the method further includes:
if the capacitance value corresponding to the capacitive touch key is increased to the preset capacitance value, detecting whether the capacitance values corresponding to the capacitive touch keys are increased at the same time, and if so, shielding the touch key function.
If not, executing the step of detecting whether the external equipment is connected or not.
In the process that the external device and the capacitive touch device are attracted through the magnetic attraction contact, namely when the external device is pressed on the capacitive touch device, the situation that the capacitance values corresponding to the capacitive touch keys are increased at the same time exists, namely the situation that the touch keys are touched at the same time is indicated. In normal operation, there is no action that a plurality of keys are pressed down simultaneously, so that even if the capacitance value corresponding to the detected capacitive touch key is increased to a preset capacitance value, in order to eliminate external interference factors and prevent erroneous judgment, whether the capacitance value corresponding to the plurality of capacitive touch keys is increased simultaneously can be detected, if yes, no response is made to shield the touch key function, if not, whether the connection with an external device is detected through the magnetic attraction contact of the capacitive touch device, if yes, the touch key function is shielded, otherwise, a key instruction corresponding to the capacitive touch key can be responded.
The embodiment of the application can further reduce the false triggering condition of the touch key on the adsorbed capacitive touch device caused by the covering action when the external device is connected with the capacitive touch device through the magnetic contact, and can improve the detection precision.
In a specific embodiment, the "detecting whether there are a plurality of capacitive touch keys corresponding to increased capacitance values" further includes:
if the increase of the capacitance values corresponding to the capacitive touch keys is not detected, whether the capacitance values corresponding to the capacitive touch keys are kept unchanged is detected within preset time, and if yes, the touch key function is shielded.
If not, executing the step of detecting whether the external equipment is connected or not.
The embodiment of the application only responds to the loosening transient state in the action of pressing the capacitive touch key, and the capacitive touch key is restored to the original value in a short time after the capacitance value corresponding to the capacitive touch key is increased. The external device is pressed down and not loosened after the capacitive touch device is adsorbed by the magnetic contact, and the capacitance value corresponding to the capacitive touch key is kept unchanged. Therefore, in the embodiment of the application, if the increase of the capacitance values corresponding to the plurality of touch keys is not detected, in order to further eliminate the misjudgment caused by external interference factors, whether the capacitance values corresponding to the capacitive touch keys are kept unchanged can be detected within a preset time, and if so, no response is made to shield the touch key function. If not, detecting whether the touch key is connected with the external device or not through the magnetic attraction contact of the capacitive touch device, if so, shielding the touch key function, and if not, responding to a key instruction of the corresponding capacitive touch key. Wherein the preset time is preferably 4s-6s.
The embodiment of the application can further reduce the false triggering condition of the touch key on the adsorbed capacitive touch device caused by the covering action when the external device is connected with the capacitive touch device through the magnetic contact, and can improve the detection precision and has stronger anti-interference capability.
Referring to fig. 3, in a specific embodiment, an infrared sensor 330 is disposed in the capacitive touch device 10, and the infrared sensor 330 is located beside the magnetic attraction contact 310 and spaced apart from the capacitive touch key area 340 by a predetermined distance;
the method further comprises the steps of:
when the infrared induction intensity sensed by the infrared sensor is detected to be greater than or equal to a preset intensity threshold value within a preset detection distance, determining that the function of the external equipment for approaching and shielding the touch key exists; otherwise, executing the step of detecting the capacitance value corresponding to the capacitive touch key.
The number of the infrared sensors 330 is at least one. The infrared sensor 330 is built in the capacitive touch device 10, and when an object is arranged on the surface of the capacitive touch device and the touch device is closer to the surface, the sensed infrared sensing intensity is stronger, so that the capacitive touch device 10 can be triggered to shield a touch key function when an external object approaches to within a preset detection distance by reasonably setting a threshold value. Wherein the preset detection distance is preferably 4cm-6cm. When the capacitive touch device 10 is connected to the external device through the magnetic contact 310, the capacitive touch device 10 is gradually close to the external device 20, and the infrared induction intensity is detected to be greater than or equal to the preset intensity threshold within the preset detection distance, it is determined that the external device 20 is close to and shields the touch key function. For example, when the infrared sensing intensity is greater than or equal to the preset threshold, the flag position 1 indicates that the external device 20 is determined to be close to shield the touch key function, and the subsequent detection step of the capacitance value corresponding to the capacitive touch key is not needed, otherwise, the subsequent relevant detection step is entered, so that misjudgment caused by external factors is prevented. The infrared sensor 330 is located beside the magnetic contact 310 and is separated from the capacitive touch key area 340 by a preset distance, so as to avoid the normal operation range of the human hand, or the infrared induction intensity caused by the operation of the human hand in the touch key area 340 is insufficient to reach the preset intensity threshold, so as to realize effective distinction.
The embodiment of the application has the advantages that the detection mode is simple and easy to realize, the program redundancy can be reduced, and whether the external equipment 20 is to be magnetically attracted to the capacitive touch equipment 10 or not can be effectively and rapidly judged, so that the touch key function is shielded in time, the additional detection process is omitted, and the detection sensitivity is improved. And simultaneously, when the external device 20 is sucked with the sucked capacitive touch device 10 through the contact, false triggering response is prevented.
In order to further explain the shielding method of the touch key according to the embodiment of the present application, as shown in fig. 2, when the capacitive touch key according to the embodiment of the present application is connected to an external device through a magnetic contact, in order to prevent the capacitive touch key on the capacitive touch device from being affected by incorrect response after being pressed by the external device, the method may be performed as follows:
step S2: and detecting whether the infrared induction intensity sensed by the infrared sensor is greater than or equal to a preset intensity threshold within a preset detection distance, if not, entering a step S4, and if so, entering a step S14.
Step S4: detecting whether the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, if not, entering step S14, and if yes, entering step S6.
Step S6: and detecting whether the capacitance values corresponding to the capacitive touch keys are increased at the same time, if so, entering a step S14, and if not, entering a step S8.
Step S8: and detecting whether the capacitance value corresponding to the capacitive touch key is kept unchanged within a preset time, if so, entering a step S14, otherwise, entering a step S10.
Step S10: and detecting whether the capacitive touch device is connected with external equipment or not through the magnetic attraction contact of the capacitive touch device, if so, entering a step S14, and if not, entering a step S12.
Step S12: and executing the key instruction.
Step S14: shielding the touch key function.
According to the shielding method of the touch key, disclosed by the embodiment of the application, a plurality of judgment factors can be combined to prevent misjudgment, so that when the capacitive touch device is in contact connection with the external device through the magnetic contact, misoperation caused by external devices and other external objects is filtered, and meanwhile, the situation that after connection, the capacitive touch device cannot be influenced by mistriggering of the touch key caused by adsorption and lamination of the external device can be ensured. The application can meet the operation and use requirements of the capacitive touch equipment connected with the external equipment through the magnetic contact, so that stable information interaction transmission with strong anti-interference capability can be realized after the capacitive touch equipment and the external equipment are connected through the magnetic contact.
Referring to fig. 4, in an embodiment, the application further provides a shielding device for a touch key, which is applied to a touch device connected with an external device through a magnetic contact;
the device comprises:
the first key detection module 410 is configured to detect whether a capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value.
The shielding module 420 is configured to shield a touch key function of the capacitive touch device if a capacitance value corresponding to the capacitive touch key is not increased to a preset capacitance value.
The first connection detection module 430 is configured to detect whether the capacitive touch device is connected to the external device through the magnetic contact of the capacitive touch device if the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value.
The shielding module 420 is further configured to shield the touch key function if the magnetic attraction contact of the capacitive touch device detects that the capacitive touch device is connected to the external device.
In a specific embodiment, the method further comprises:
the receiving module is used for receiving a user key instruction acquired by external equipment connected through the magnetic contact.
In a specific embodiment, the method further comprises:
and the second key detection module is used for detecting whether the capacitance values corresponding to the capacitive touch keys are increased or not if the capacitance values corresponding to the capacitive touch keys are increased to the preset capacitance values.
And the shielding module is also used for shielding the touch key function if the increase of the capacitance values corresponding to the capacitive touch keys is detected.
And the second connection detection module is used for detecting whether the capacitive touch device is connected with the external device or not through the magnetic attraction contact of the capacitive touch device if the increase of the capacitance values corresponding to the capacitive touch keys is not detected.
In a specific embodiment, the method further comprises:
and the third key detection module is used for detecting whether the capacitance values corresponding to the capacitive touch keys are increased or not if the capacitance values corresponding to the capacitive touch keys are increased to the preset capacitance values.
And the shielding module is also used for shielding the touch key function if the increase of the capacitance values corresponding to the capacitive touch keys is not detected.
And the third connection detection module is used for detecting whether the capacitive touch device is connected with the external device or not through the magnetic contact of the capacitive touch device if the increase of the capacitance values corresponding to the capacitive touch keys is detected.
In a specific embodiment, an infrared sensor is arranged in the capacitive touch device, and the infrared sensor is located beside the magnetic attraction contact and is separated from the capacitive touch key area by a preset distance.
Further comprises: the infrared sensing detection module is used for determining that the external equipment is close to and shields the touch key function when the infrared sensing intensity sensed by the infrared sensor is larger than or equal to a preset intensity threshold value within a preset detection distance; otherwise, executing the step of detecting the capacitance value corresponding to the capacitive touch key.
For specific limitation of the shielding device of the touch key, reference may be made to the limitation of the shielding method of the touch key hereinabove, and the description thereof will not be repeated here. The above-mentioned modules in the shielding device for the touch key may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
Referring to fig. 5, in an embodiment, the present application further provides a capacitive touch device, which is used to connect with an external device through a magnetic attraction contact 510.
The capacitive touch device comprises a memory storing a computer program and a processor implementing the steps of the method of shielding a touch key when the processor executes the computer program.
It should be noted that, the specific limitation of the method for shielding the touch key in the embodiment of the present application may refer to the limitation of the method for shielding the touch key in each embodiment, which is not described herein.
Referring to fig. 5, in a specific embodiment, the method further includes an infrared sensor 530 disposed beside the magnetic contact 510 and spaced apart from the capacitive touch key area 520 by a predetermined distance, and the processor implements the steps of the method for shielding the touch key when executing the computer program.
It should be noted that, the specific limitation of the infrared sensor 530 in the embodiment of the present application may refer to the specific limitation of the infrared sensor in the capacitive touch device in the above embodiment, and will not be described herein.
The capacitive touch device provided by the embodiment of the application has a simple structure and is easy to realize, and the infrared sensor 530 can be used for effectively and quickly judging whether the external device is to be magnetically attracted to the capacitive touch device, so that the touch key function is shielded in time, an additional detection process is omitted, and the detection sensitivity is improved. Meanwhile, when the external equipment and the absorbed capacitive touch equipment are in contact suction connection, false triggering response is prevented.
In a specific embodiment, the capacitive touch device is a speaker, a desk lamp, a light-controlled switch, or the like.
In one embodiment, the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the touch key masking method.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus embodiments described above are merely illustrative, for example, of the flow diagrams and block diagrams in the figures, which illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules or units in various embodiments of the application may be integrated together to form a single part, or the modules may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a smart phone, a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application.

Claims (8)

1. The shielding method of the touch key is characterized by being applied to capacitive touch equipment connected with external equipment through magnetic contact points; the method comprises the following steps:
detecting whether a capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, and if not, shielding the touch key function of the capacitive touch device;
if yes, detecting whether the capacitive touch device is connected with the external device or not through a magnetic contact of the capacitive touch device, and if yes, shielding the touch key function;
after the "detecting whether the capacitance value corresponding to the capacitive touch key is increased to the preset capacitance value", the method further includes:
if the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value, detecting whether the capacitance values corresponding to a plurality of capacitive touch keys are increased at the same time, and if so, shielding the touch key function;
if not, executing the step of detecting whether the external equipment is connected with the external equipment;
the step of detecting whether the capacitance values corresponding to the capacitive touch keys are increased simultaneously further comprises the following steps:
if the increase of the capacitance values corresponding to the capacitive touch keys is not detected, detecting whether the capacitance values corresponding to the capacitive touch keys are kept unchanged in preset time, and if so, shielding the touch key function;
if not, executing the step of detecting whether the external equipment is connected or not.
2. The method of shielding a touch key of the capacitive touch device according to claim 1, wherein shielding a touch key function of the capacitive touch device, after that comprises:
and receiving a user key instruction acquired by the external equipment connected through the magnetic contact.
3. The method for shielding a touch key according to any one of claims 1 or 2, wherein an infrared sensor is disposed in the capacitive touch device, and the infrared sensor is located beside the magnetic contact and is spaced from the capacitive touch key area by a preset distance;
the method further comprises the steps of:
when the infrared induction intensity sensed by the infrared sensor is detected to be greater than or equal to a preset intensity threshold value within a preset detection distance, determining that the external equipment is close to and shields the touch key function; otherwise, executing the step of detecting the capacitance value corresponding to the capacitive touch key.
4. The shielding device of the touch key is characterized by being applied to capacitive touch equipment connected with external equipment through magnetic contact points;
the device comprises:
the first key detection module is used for detecting whether the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value or not;
the shielding module is used for shielding the touch key function of the capacitive touch equipment if the capacitance value corresponding to the capacitive touch key is not increased to a preset capacitance value;
the first connection detection module is used for detecting whether the capacitive touch device is connected with the external device or not through the magnetic contact of the capacitive touch device if the capacitance value corresponding to the capacitive touch key is increased to a preset capacitance value;
the shielding module is further used for shielding the touch key function if the magnetic attraction contact of the capacitive touch device detects that the capacitive touch device is connected with the external device;
the first key detection module is further configured to detect whether the capacitance values corresponding to the capacitive touch keys are increased at the same time if the capacitance values corresponding to the capacitive touch keys are increased to a preset capacitance value;
the shielding module is further used for shielding the touch key function if the fact that the capacitance values corresponding to the capacitive touch keys are increased is detected;
the first connection detection module is further used for executing the step of detecting whether the external equipment is connected or not if the increase of the capacitance values corresponding to the capacitive touch keys is not detected;
the first key detection module is further configured to detect whether the capacitance values corresponding to the capacitive touch keys remain unchanged within a preset time if no increase in the capacitance values corresponding to the capacitive touch keys is detected;
the shielding module is further configured to shield the touch key function if it is detected that the capacitance value corresponding to the capacitive touch key is kept unchanged within a preset time;
and the first connection detection module is further configured to perform the step of detecting whether the external device is connected if the capacitance value corresponding to the capacitive touch key is not detected to be unchanged within the preset time.
5. The capacitive touch device is characterized by being connected with external equipment through magnetic contact points;
the capacitive touch device comprising a memory storing a computer program and a processor implementing the steps of the method of any one of claims 1 or 2 when the computer program is executed.
6. The capacitive touch device of claim 5, further comprising an infrared sensor disposed adjacent to the magnetically attractable contact and spaced a predetermined distance from the capacitive touch key area, the processor implementing the steps of the method of claim 3 when executing the computer program.
7. The capacitive touch device of claim 5, wherein the capacitive touch device is a speaker, a desk lamp, or a light-controlled switch.
8. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, implements the steps of the method of any of claims 1 or 2.
CN202010256673.9A 2020-04-02 2020-04-02 Touch key shielding method and device and capacitive touch equipment Active CN111309188B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010256673.9A CN111309188B (en) 2020-04-02 2020-04-02 Touch key shielding method and device and capacitive touch equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010256673.9A CN111309188B (en) 2020-04-02 2020-04-02 Touch key shielding method and device and capacitive touch equipment

Publications (2)

Publication Number Publication Date
CN111309188A CN111309188A (en) 2020-06-19
CN111309188B true CN111309188B (en) 2023-11-17

Family

ID=71146151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010256673.9A Active CN111309188B (en) 2020-04-02 2020-04-02 Touch key shielding method and device and capacitive touch equipment

Country Status (1)

Country Link
CN (1) CN111309188B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113778368A (en) * 2021-08-31 2021-12-10 维沃移动通信有限公司 Base equipment, control method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1797305A (en) * 2004-11-23 2006-07-05 微软公司 Reducing accidental touch-sensitive device activation
CN104363012A (en) * 2014-10-16 2015-02-18 北京集创北方科技有限公司 Portable terminal and implementing method for pressing key of side of capacitor type touch screen by touching
CN104364745A (en) * 2012-06-15 2015-02-18 三星电子株式会社 Apparatus and method for proximity touch sensing
CN105045422A (en) * 2015-06-29 2015-11-11 魅族科技(中国)有限公司 Control method of button device, button device and terminal
CN105320386A (en) * 2014-07-31 2016-02-10 惠普发展公司,有限责任合伙企业 Controlling forms of input of a computing device
CN106095282A (en) * 2016-05-31 2016-11-09 珠海市魅族科技有限公司 The touch operation method of key device, key device and terminal
CN108540670A (en) * 2018-04-22 2018-09-14 孝感峰创智能科技有限公司 A kind of electronic equipment control method, electronic equipment and computer readable storage medium
CN110703947A (en) * 2019-09-30 2020-01-17 Oppo(重庆)智能科技有限公司 Touch screen correction method and device, electronic equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140368455A1 (en) * 2011-03-15 2014-12-18 Logitech Europe Sa Control method for a function of a touchpad
JP6497941B2 (en) * 2015-01-09 2019-04-10 キヤノン株式会社 Electronic device, control method and program thereof, and recording medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1797305A (en) * 2004-11-23 2006-07-05 微软公司 Reducing accidental touch-sensitive device activation
CN104364745A (en) * 2012-06-15 2015-02-18 三星电子株式会社 Apparatus and method for proximity touch sensing
CN105320386A (en) * 2014-07-31 2016-02-10 惠普发展公司,有限责任合伙企业 Controlling forms of input of a computing device
CN104363012A (en) * 2014-10-16 2015-02-18 北京集创北方科技有限公司 Portable terminal and implementing method for pressing key of side of capacitor type touch screen by touching
CN105045422A (en) * 2015-06-29 2015-11-11 魅族科技(中国)有限公司 Control method of button device, button device and terminal
CN106095282A (en) * 2016-05-31 2016-11-09 珠海市魅族科技有限公司 The touch operation method of key device, key device and terminal
CN108540670A (en) * 2018-04-22 2018-09-14 孝感峰创智能科技有限公司 A kind of electronic equipment control method, electronic equipment and computer readable storage medium
CN110703947A (en) * 2019-09-30 2020-01-17 Oppo(重庆)智能科技有限公司 Touch screen correction method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111309188A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
US9274652B2 (en) Apparatus, method, and medium for sensing movement of fingers using multi-touch sensor array
US9116571B2 (en) Method and system of data input for an electronic device equipped with a touch screen
CN109976500B (en) Fingerprint identification device, mobile terminal and awakening method of fingerprint identification device
KR101572331B1 (en) Touch sensing system and method for providing proximity sensing function using touch screen panel
US8421757B2 (en) Touch sensor with a plurality of touch sensor sections
US7031886B1 (en) Methods and systems for detecting noise in a position sensor using minor shifts in sensing frequency
CN103324373B (en) A kind of method preventing conducting liquid from causing touch-screen misoperation
WO2018107903A1 (en) Control method and device for touch screen of mobile terminal, mobile terminal, and storage medium
CN103473015A (en) Anti-addiction method and terminal
EP2327008A2 (en) Differential sensing for a touch panel
CN103761010B (en) Touch identification method and device and touch operation structure
CN107407998B (en) Method for interacting with an electronic and/or computer device implementing a capacitive control surface and a peripheral surface, interface and device implementing the method
JP7417629B2 (en) Touch key assembly, control circuit and electronic device
CN106411310B (en) Touch key, response method and system
CN111309188B (en) Touch key shielding method and device and capacitive touch equipment
KR20170013388A (en) Terminal, protective case and induction method
CN106527831B (en) Mutual hover protection for touch screens
WO2014020380A1 (en) Method for performing touch detection and touch detection module therefor
CN103218083A (en) Touch screen false point and false identification prevention method
CN105487697B (en) Method and device for preventing touch screen key failure
CN102386904A (en) Response method and system of capacitive sensing touch key and touch equipment
CN106775393A (en) The touch operation control method and device of terminal
CN106126099B (en) Information processing method and electronic equipment
CN110308850B (en) Proximity sensing control method and control device for equipment
CN104951160A (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant