Watch detection method
Technical Field
The invention relates to a watch detection method, in particular to a screen-free intelligent watch detection method.
Background
In the prior application CN2020101224950, a method for detecting a screenless smart watch is disclosed, in the actual operation, because the functions of the watch are more and some function codes are simpler, there may be some requests for entering by mistake and detection by mistake in the long-press and short-press operations, that is, when the person who takes the watch is not the detection person, there is also a possibility that the detection step (which can be compared with the engineering mode of the mobile phone) can be entered by long-press.
In the case of banks or other situations where multiple verifications are required, there is a "vault model" that is: one person holds the password of the safe deposit box, and the other person holds the password of the safe deposit box, and the person must enter the room with the safe deposit box through the password of the safe deposit box, so that double verification is realized.
Disclosure of Invention
In view of the above, the present invention provides a method for detecting a wristwatch, which can obtain device internal information through a case of the wristwatch when wireless communication is unavailable, and which can prevent people other than detection people from entering a detection mode.
The specific technical scheme of the invention is as follows:
a method of detection for a smart watch, the method comprising:
presetting an M-bit key function initial password, an N-bit test initial code and N-bit function codes of various functions; all the functional codes and the initial codes have different numbers with the same number; the method comprises the following steps:
k1, carrying out a first operation on the hand table key, and entering a password verification step:
k2, inputting the first digit code of the M digit key function initial password: performing second operation on the watch, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the first digit is equal to the numerical value of the M-digit key function initial password in the digit; carrying out third operation on the watch key;
k3, inputting the code of the second digit of the M-digit key function initial password: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the second digit is equal to the numerical value of the M-digit key function initial password in the digit; carrying out third operation on the watch key;
k4, if M is larger than 2, inputting the codes of all digits after the second digit in sequence, and carrying out the third operation on the hand table keys;
k5, matching the inputted M-bit code with the M-bit key function initial password, if the matching is successful, entering the following detection step of K6, restoring the M-bit code to the M-bit key function initial password and terminating the password verification step; if the matching is unsuccessful, directly restoring the M-bit code number to the M-bit key function initial password and terminating the password verification step;
in the password verification step, in the counting process of the counter, if the number of a certain digit after the counter is increased by 1 is equal to the number of the M-digit key function initial password in the digit, the counter is increased by 1; if the number of the code in a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the number of the code of the M-digit key function initial password in the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
K6, entering a detection step, said detection step comprising:
s1, inputting the code of the first digit: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the first digit is equal to the numerical value of the function code of the function required to be detected by the user in the digit; carrying out third operation on the watch key;
s2, inputting a second digit code: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the second digit is equal to the numerical value of the function code of the function required to be detected by the user in the digit; carrying out third operation on the watch key;
s3, if the initial code is N digits larger than 2, sequentially inputting codes of all digits after the second digit, and performing a third operation on the hand-table keys;
s4, matching the input N-digit code with the function code, if the matching is successful, the watch executes the function corresponding to the function code, and restores the N-digit code to the initial code and terminates the detection step; if the matching is unsuccessful, directly restoring the N-bit code number to the initial code and terminating the detection step;
in the detecting step, in the counting process of the counter, if the number of a certain number of bits after the counter is increased by 1 is equal to the number of the initial code at the number of the bits, the counter is increased by 1; if the code number of a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the code number of the initial code of the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
Furthermore, the watch is a single-key watch.
Furthermore, the third operation is long-time pressing of a key.
Further, the long-press key is pressed for a time longer than 2 seconds.
Further, the first operation and the second operation are short-press keys.
Further, the second operation is a short press for more than 0.2 seconds and less than 2 seconds.
Further, in the password verification step or the detection step, if the time duration between any two times of key operations of the watch is longer than 5 seconds, the M-bit code number is directly restored to the M-bit key function initial password, the N-bit code number is directly restored to the N-bit test initial code, and the password verification step or the detection step is terminated.
By the mode, on equipment without a screen, the current state of the equipment can be effectively read by a method of combining the key passwords, when the equipment has a problem, more useful information can be found, the direction of solving the problem is reduced, the efficiency of solving the problem is improved, in addition, the passwords can be set through a 'vault mode', the probability that the misoperation passwords can be matched is 1/(2 9 2) =1/5832, and the probability that the basic version long press enters is 1/2 (namely the previous application of the applicant), so the method is safer, and the user can not easily press the passwords.
Drawings
FIG. 1 is a flow chart of an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are a part of the embodiments of the present invention, but not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, and "a" and "an" generally include at least two, but do not exclude at least one, unless the context clearly dictates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
Sometimes, the condition that Bluetooth cannot be connected exists in the screen-free watch, and at this time, a user cannot acquire information of the watch by Bluetooth binding with the watch. For a watch with a fault, once the Bluetooth binding fails, an operator or a developer has no way to start to detect the watch. In the prior art, except that a watch provided with a USB interface can be judged through a mobile terminal, a developer does not have any relevant solution at present for watches without screens (users cannot interact with the screens) and USB interfaces (no way to connect with terminals such as computers and the like).
The invention aims to provide a method for detecting various items of internal information of equipment under the conditions that no screen is provided, only keys are pressed, and wireless communication is unavailable. And in a manner similar to the function of a vault, other people except the detection personnel cannot enter the detection step.
As shown in fig. 1, the initial password of the 3-digit key function is 000, the initial password is pressed for a short time, the step ② is performed to tell that the device is going to input the first password a next, the short pressing is performed, a is increased by 1, the step ② is performed after the addition is completed, the step a is increased by 1 again, the step ② is performed again, the step ③ is performed to tell that the first password X is confirmed, the device is to wait for the input of the second password B, the step ④ B is increased by 1 after the addition is completed, the step ③ is performed after the addition is performed again, the step ④ B is increased by 1 again after the long pressing is performed to tell that the first password X is confirmed, the step ③ is performed after the addition is completed, the step 850 is performed to tell that the device is confirmed after the second password B is confirmed, the step Z is performed to wait for the input of the third password Z, the short pressing is performed again, the step ② C is increased by 1, the step ② is performed after the second password B is confirmed, the step ⑥ C1 is performed, the step ⑤ is performed again, the step 583 is performed again, the step ② is performed after the initial password is completed, the step 3 is performed again, the step ② is performed, the step is performed again, the step 3 is performed again, the step is performed, the step ② is performed, the step is performed again, the.
The function codes and initial codes of various functions of the watch are preset, wherein the function codes and the initial codes are preferably 3 digits, and the initial codes are preferably 000.
Entering step ⑨, telling the device that the first password X is to be input next, pressing for a short time, entering step ⑩ X plus 1, returning to step ⑨ after the addition is completed, pressing for a short time again, entering step ⑩, adding X plus 1, returning to step ⑨ after the addition is completed, pressing for a long time, entering step ⑪, telling the device that the first password X is confirmed, waiting for the second password Y to be input, pressing for a short time, entering step ⑫ Y plus 1, returning to step ⑪ after the addition is completed, pressing for a short time, entering step ⑫ Y plus 1, returning to step ⑪ after the addition is completed, pressing for a long time, entering step ⑩ after the second password Y is confirmed, telling the device that the second password Y is confirmed, waiting for the third password Z to be input, pressing for a short time, entering step ⑩ Z plus 1, returning to step ⑩ after the addition is completed, pressing for a short time again, entering step 633Z 1, returning to step ⑩ after the key is added, entering step Z2Z plus 1 after the step 6865, returning to step 366, and returning to step 367, if the password matching is completed, and if the password matching is completed, the password is completed.
Each time short press and long press, the program will be recorded, until the corresponding password combination is satisfied, the corresponding test function will not be executed, so the function can be added without affecting the normal use of the client.
The method is described in detail below with respect to several functions (detection steps).
Example one
The function is for obtaining the state that the bluetooth is connected, because the wrist-watch does not have the connection status of screen display bluetooth, at this moment, the user can't know whether the bluetooth of wrist-watch has connected.
The functions are as follows: and acquiring the Bluetooth connection state.
The initial code 000 is preset.
Function code for bluetooth connection status 321.
The detection method comprises the following steps:
initializing password 000, entering detection step ⑨, pressing the key for 3 times in short, the first password X being 3, pressing the key for 3 times in long after confirming the first password, entering step ⑪, pressing the key for 2 times in short, the second password Y being 2, pressing the key for 3 times in long after confirming the second password, entering step ⑬, pressing the key for 1 time in short, the third password Z being 1, pressing the key for 1 time in long again after confirming the third password, entering step ⑮, confirming that the third password is input completely, jumping to step ⑯ because the input password is matched with the function code 321 stored in the program in advance, successfully matching, executing step ⑰, if the Bluetooth is connected, rotating the pin counterclockwise for 1 turn, if the Bluetooth is not connected, rotating the pin clockwise for 2 turns, the tester knows that the current Bluetooth state of the device is disconnected, and after the pin is rotated completely, jumping back to step ①, recovering the input password being 000, and the way of executing the function of the test process can be customized.
Example two
Function name: and acquiring the percentage of the electric quantity.
Initial code: 000; function code: 411.
As a result: the functions performed after matching are ten times 30 degrees of the hour hand rotation electric quantity (the size between every two scale marks is 30 degrees), and one time 30 degrees of the minute hand rotation electric quantity.
Initializing the password to 000, entering step ⑨, pressing the key for 4 times in short, the first password X being 4, pressing the key for long after confirming the first password, entering step ⑪, pressing the key for 1 time in short, the second password Y being 1, pressing the key for long after confirming the second password, entering step ⑬, pressing the key for 1 time in short, the third password Z being 1, pressing the key for long again after confirming the third password, entering step ⑮, confirming that the third password has been determined to have been input, jumping to step ⑯ because the input password matches with the password "411" stored in the program in advance, and executing step ⑰, if the power is 98%, rotating the hour hand for 270 ° (9X 30 °), rotating the minute hand for 240 ° (8X 30 °), the tester can obtain the power percentage according to the rotation angle of the hour hand and the minute hand, and when the hand has been rotated, completing the function execution, jumping to step ①, and recovering the input password to 000.
EXAMPLE III
Function name: and setting a factory restoration function.
An initial code 111; password: 999.
As a result: the function executed after matching is that the hour hand and the minute hand rotate for one circle at the same time and represents the successful factory restoration.
The procedure is that the initial password is 000, step ⑨ is entered, then the key is pressed for 8 times for a short time, at this time the first password X is 9, the long press is entered into step ⑪ after the first password is confirmed, at this time the key is pressed for 8 times for a short time, at this time the second password Y is 9, the long press is entered into step ⑬ after the second password is confirmed, at this time the key is pressed for 8 times for a short time, at this time the third password Z is 9, the long press is again entered after the third password is confirmed, step ⑮ is entered, it is confirmed that the third password is input completely, since 3 passwords are filled, step ⑯ is skipped, since the entered password matches with the password "999" stored in the program in advance, step ⑰ is successfully performed, the program will resume the flow of factory function, rotate a circle, tell the tester that the password is pressed successfully and confirm that the flow is completed, when the pin is rotated, the function is restarted, step ① is skipped, and the entered password is restored to 000.
Example four
In the counting process of the counter, if the number of codes is already 9 in the accumulation process of the counter, at this time, 1 is added, theoretically, the number of codes is changed into 0 and advances by 1, however, the method is not simple counting, and needs code number matching, the number of codes of each digit is independent, and the conditions of carry and bit reduction do not exist, so that the method is specially set to change from 9 to 0 and cannot advance by 1;
meanwhile, just because the code number matching is needed, the condition that the code number of the functional code at a certain bit number is equal to the code number of the initial code is not allowed to exist, namely if the code number of the certain bit number is equal to the code number of the initial code at the bit number after the counter is increased by 1, the counter is increased by 1; therefore, in the counting process, assuming that the initial code is 1, the counting process is repeated for 2, 3, 4, 5, 6, 7, 8, 9, 0, 2, the number of values in each counting period is 9, but not 10, and the number value of the initial code in the number of bits is skipped in the counting process.
If the initial code of a certain number of bits is 0, if the number of codes is already 9, the number is increased by 1 again, the number should be changed to 0 without carry, but since 0 is the initial code, the number of the initial code needs to be increased by 1 again to 1, and 0 is skipped.
After 1 is added, the code number of a certain bit number is equal to the code number of the initial code in the bit number, and then the counter is added by 1; if the code number of a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the code number of the initial code of the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.